0% found this document useful (0 votes)
3 views

CSS-10-QUARTER-2-Module-8- Copy

This document is a module for Grade 10 students in the Philippines focusing on Network and Security within the Technology and Livelihood Education curriculum. It aims to equip learners with skills in configuring computer systems and networks while emphasizing the importance of network security and safety procedures. The module includes various learning activities, assessments, and guidelines for both facilitators and learners to enhance their understanding and application of the subject matter.

Uploaded by

Jonathan Alug
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

CSS-10-QUARTER-2-Module-8- Copy

This document is a module for Grade 10 students in the Philippines focusing on Network and Security within the Technology and Livelihood Education curriculum. It aims to equip learners with skills in configuring computer systems and networks while emphasizing the importance of network security and safety procedures. The module includes various learning activities, assessments, and guidelines for both facilitators and learners to enhance their understanding and application of the subject matter.

Uploaded by

Jonathan Alug
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

10 Republic of the Philippines

Department of Education
Region III-Central Luzon
Division of Tarlac Province
TARLAC NATIONAL HIGH SCHOOL
Macabulos Drive, San Roque Tarlac City

TECHNOLOGY AND LIVELIHOOD EDUCATION

Information and Communications Technology


Computer System Servicing

Configuring Computer System and Network (2)

QUARTER 2
Module 8-Week 8
(NETWORK AND SECURITY)
Technology and Livelihood Education – Information and Communications Technology
(Computer System Servicing) – Grade 10 Alternative Delivery Mode,
Quarter 2 – Module 8: NETWORK AND SECURITY
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such agency
or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this module are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Published by the Department of Education
Development Team of the Module
Author: Giovanni Ryan A. Derequito
Editors: Emmanuel Yap
Grace T. Palahang
Reviewers: Mary Jane R. Cardente, PhD Illustrator/Lay-out
Artist: Giovanni Ryan A. Derequito Management Team:
Chairperson:
Arturo B. Bayocot, PhD, CESO III
Regional Director
Co-Chairpersons:
Victor G. De Gracia Jr., PhD, CESO V
Assistant Regional Director

Randolph B. Tortola, PhD, CESO IV


Schools Division Superintendent

Shambaeh A. Usman, PhD


Assistant Schools Division Superintendent
Mala Epra B. Magnaong, Chief ES, CLMD Neil
A. Improgo, PhD, EPS-LRMS Bienvenido U.
Tagolimot, Jr., EPS-ADM

Members: Elbert R. Francisco, PhD, Chief ES, CID


Mary Jane R.Cardente, PhD, EPS in Tech. and Livelihood Educ. Rejynne
Mary L. Ruiz, PhD, LRMDS Manager
Jeny B. Timbal, PDO II
Shella O. Bolasco, Division Librarian II

Printed in the Philippines by


Department of Education – Division of Bukidnon
Office Address: Fortich Street, Sumpong, Malaybalay City
Telefax: (088)813-3634
E-mail Address: bukidnon@deped.gov.ph
Website: depedbukidnon.net.ph
TECHNOLOGY AND LIVELIHOOD EDUCATION

Information and Communications Technology


Computer System Servicing

Configuring Computer System and Network (2)

QUARTER 2
Module 8-Week 8
(NETWORK AND SECURITY)
Introductory Message
For the Facilitator:
Welcome to the Technology and Livelihood Education-Information and
Communications Technology – (Computer System Servicing) Grade 10
Alternative Delivery Mode (ADM) Module on Configuring Computer Systems
and Networks!
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic constraints
in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in
the body of the module:

Notes to the Teacher


This contains helpful tips or strategies
that will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use


this module. You also need to keep track of the learners' progress while
allowing them to manage their own learning. Furthermore, you are expected
to encourage and assist the learners as they do the tasks included in the
module.
For the Learner:
Welcome to the Technology and Livelihood Education- Information and
Communications Technology – (Computer Systems Servicing) Grade 10
Alternative Delivery Mode (ADM) Module on Configuring Computer Systems
and Networks!
The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time.
Your academic success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and
time. You will be enabled to process the contents of the learning resource
while being an active learner.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to
learn in the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the
answers correct (100%), you may
decide to skip this module.
What’s In This is a brief drill or review to help
you link the current lesson with the
previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such
as story, song, poem, problem opener,
activity or situation.

What Is It This section provides a brief discussion


of the lesson. This aims to help you
discover and understand new concepts
and skills.
What’s More This comprises activities for independent
practice to solidify your understanding
and skills of the topic. You may check
the answers to the exercises using the
Answer Key at the end of the module.
.
What I Have Learned This includes questions or blank
sentence/paragraph to be filled in to process what
you learned from the lesson.
What I Can Do This section provides an activity which will
help you transfer your new knowledge or skill into
real life situations or concerns.

Assessment This is a task which aims to evaluate your level of


mastery in achieving the learning competency.
Additional Activities In this portion, another activity will be given to
you to enrich your knowledge or skill of the lesson
learned. This also tends retention of learned
concepts.
Answer Key This contains answers to all activities in the
module.

At the end of this module you will also find:


References This is a list of all sources used in developing this
module.
The following are some reminders in using this module:
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it.
Lesson

8 NETWORK AND SECURITY

Learning Competencies and Objectives

 Enable network security to the computer systems


 Configure file and printer sharing
 Follow OHS procedures in configuring computer systems and networks;
 Test computer systems and networks in accordance with the job requirements
Accomplish technical reports on the test conducted

Content Standard Performance Standard

The learner demonstrates The learner independently


understanding of the underlying demonstrates skills in configuring
concepts and principles on computer systems and networks as
configuring computer systems and prescribed by TESDA Training
networks. Regulations.

What I Need to Know


This module will allow the students to learn the Network security to the computer
system. Enabling the network security of the computer system by understanding of the
policies and practices adopted to prevent and monitor unauthorized access, misuse,
modification, or denial of a computer network and network-accessible resources.

It secures the network, as well as protecting and overseeing operations


being
done.

This will define the Network Security and its different types what is
suitable for installations to enable it to the computer system.

The students will learn on how to configure of file and printer sharing as one
of the most effective ways to manage computer settings as a network
administrator. The File and Printer Sharing setting needs to be enabled in
your work-sharing network domain before you can use network printers or
transfer files between computers operating system feature that enables the
computer to communicate to each other and send print jobs to your printer.
All computers should be part of the main network and the same Workgroup
or Homegroup for File and Printer Sharing to work properly. The students will
understand the terms “File Sharing” and “Printer Sharing.”
The students will learn the steps in configuring a file sharing and printer sharing.
This module is designed to teach the students to learn the safety and
precautions by setting activities or guidelines for inspection and testing the
computer systems and networks.
It outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in
the workplace which the students will understand very well the importance
of its procedure:

1. Follow Occupational Health and Safety (OHS) Procedures in Testing


Systems and networks.
2. Test computer systems and networks in accordance with the job
requirements.
3. Accomplish technical reports on the tests conducted.

The students will have an overview of regulating requirements and


workstation risk assessment to identify the hazards enhance the procedure
to avoid untoward incidents. Its procedure includes the task, responsibilities,
and rules in the workplace.

What I Know (Pre-Test)

Multiple Choice

Direction: Encircle the letter of the correct answer.

1. Which of the following is correct regarding Class B Address of IP address?


a. Network bit-14,Host bit-16 c. Network bit-18,Host bit-16
b. Network bit-16,Host bit-14 d. Network bit-12,Host bit-14
2. What is the use of Bridge in Network?
a. To connect LANS c. to control Network Speed
b. to separate LANS d. All of the above
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Network congestion occurs
a. In case of traffic overloading
b. When sysytems Terminates
c. When connection between two no2des terminates
d. None of the mentioned
5. Which of the following applets does not belong to Performance and
maintenance category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following wizard is used to configure windows for vision,
hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. What is the benefit of the Networking?.
a. File Sharing c. Easier Backups
b. Easier access to resources d. All of the above
8. Which of the following is the most commonly used networking cable category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. ADSL is the abbreviation of
a. Asymmetric Dual Subscriber Line
b. Asymmetric Digital System Line
c. Asymmetric Dual System Line
d. Asymmetric Digital Subscriber Line
10.What Ethernet cable is used to connect two devices directly?
a. Cross-Over c. both A and B
b. Straight-through d. None of the options
11.Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12.In which of the following IP address does 192.168.1.105 belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer
to reach a specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14.Bridge works in which layer of the OSI model?
a. Application layer c. Network layer
b. Transport layer d. Datalink layer
15. Which data communication method is used to transmit the data over a serial
communication link?
a. Simplex c. Full duplex
b. Half-duplex d. all of the above
What I Need to Know
Welcome to the next lesson on this module Network and Security.
At the end of this lesson you will be able to apply the knowledge
and skills on network security. This skill is essential for you to identify the
viruses and threats on the computer.

At the end of this lesson you are expected to:

 Inspect networking devices and connectors;


 Enable network security

What I Know

Direction: Match the meanings in column A with the terms in column B


to identify the term/word being described.

A B
1) attached to small pieces
of computer code,
a. accidental threats
software and
documents.
b. antivirus software
2) when an employee
c. data encryption
intends to cause damage
d. firewall
3) it is technical a worm e. malicious threats
4) Software designed to f. traffic
detect, disable and g. trojan horse
remove viruses
5) when user damages data h. virus
or equipment i. VPN
unintentionally
6) data being transported on a j. WPA
network
7) an encryption system k. WEP
that protects data
8) a self-replicating program l. Worm
that is
harmful to network
9) it involves using codes
and ciphers
10) a way of protecting a
computer from intrusion
through the ports
What’s In

You need to understand computer and network security. Failure to


implement proper security procedures can affect users, computers, and
the general public. Private information, company secrets, financial data,
computer equipment, and items about national security are placed at risk
if proper security procedures are not followed.

What’s New

Computer and network security help keep data and equipment safe
by giving only the appropriate people access. Everyone in an organization
should give high priority to security, because everyone can be affected by
a breach in security.
An attack that intentionally degrades the performance of a
computer or network can also harm an organization’s productivity. Poorly
implemented security measures that allow unauthorized access to
wireless network devices demonstrate that physical connectivity is not
necessary for security breaches by intruders.

What Is It
Security Attacks 7
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security

 Physical:
Events or attacks that steal, damage, or destroy such---
equipment as
servers, switches, and wiring.
 Data:
Events or attacks that remove, corrupt, deny access to, allow

access to, or steal information.


Threats to security can come from inside or outside an organization,
and the level of potential damage can vary greatly. Potential threats
include the following:
 Internal: Employees who have access to data, equipment,
and the network. Internal attacks can be
characterized as follows:
o Malicious threats are when an employee intends to cause damage.
o Accidental threats are when the user damages data or
equipment unintentionally.
 External: Users outside an organization who do not have authorized
access to the network or resources. External attacks can be
characterized as follows:
o Unstructured attacks, which use available resources, such
as passwords or scripts, to gain access to and run
programs designed to vandalize.
o Structured attacks, which use code to access operating
systems and software.
Physical loss or damage to equipment can be expensive, and data loss
can be detrimental to your business and reputation. Threats against data
are constantly changing as attackers find new ways to gain entry and
commit their crimes.
Types of Computer Threats

Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
securoty.html

Viruses, Worms, and Trojan Horses

A virus is attached to small pieces of computer code, software, or


document. The virus executes when the software is run on a computer. If
the virus spreads to other computers, those computers could continue to
spread the virus. A virus is transferred to another computer through e-
mail, file transfers, and instant messaging. The virus hides by attaching
itself to a file on the computer. When the file is accessed, the virus
executes and infects the computer. A virus has the potential to corrupt or
even delete files on your

A worm is a self-replicating program that is harmful to networks. A


worm uses the network to duplicate its code to the hosts on a network,
often without any user intervention.
A Trojan horse technically is a worm. It does not need to be attached
to other software. Instead, a Trojan threat is hidden in software that
appears to do one thing, and yet behind the scenes it does another.
Security Procedures
Regular testing provides details of any possible weaknesses in the
current security plan that should be addressed. A network has multiple
layers of security, including physical, wireless, and data.

Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software

Virus protection software, also known as antivirus software, is software


designed to detect, disable, and remove viruses, worms, and Trojans
before they infect a computer. Many organizations establish a written
security policy stating that employees are not permitted to install any
software that is not provided by the company.

Enabling Windows 7 Firewall


1.Open Windows Firewall by clicking the Start button , and then clicking
Control Panel. In the search box, type firewall, and then click Windows
Firewall.

2. In the left pane, click Turn Windows Firewall on or off. If you're


prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off link in
Windows Firewall.

3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
If you want the firewall to prevent all programs from
communicating, including programs that you have previously allowed to
communicate through the firewall, select the Block all incoming connections,
including those in the list of allowed programs check box

9
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption
can help prevent attackers from monitoring or recording traffic between
resources and computers. A virtual private network (VPN) is an encryption
system that protects data as though it resides on a private network.

Port Protection

Every communication using TCP/IP is associated with a port


number. HTTPS, for instance, by default uses port 443. A firewall is a way
of protecting a computer from intrusion through the ports.

With port protection, the user can control the type of data
sent to a computer by selecting which ports will be open and which will be
secured. Data being transported on a network is called traffic.
How to Enable Firewall for Windows XP?

1. Click Start Button then choose Control Panel


2. Click the Network and Internet Connections option.
3. Then click the Network Connections option.
4. Double click the icon labeled “Local Area Connection”. The icon
may have a number after it, for example “Local Area Connection
5” Click on Properties button.
5. On the “Advance “ tab select “Protect my computer and network
by limiting or preventing access to this computer from the
Internet.
6. Click Settings, then on the ICMP tab select “Allow incoming echo
request”. Enabling Windows 7 Firewall
1. Open Windows Firewall by clicking the Start button, and then
click Control Panel. In the search box, type firewall, and then click
Windows Firewall.
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type
the password or provide confirmation. Turn Windows Firewall on
or off link in Windows Firewall.
3. Click Turn on Windows Firewall under each network location that
you want to help protect, and then click OK.

If you want the firewall to prevent all programs from


communicating, including programs that you have previously allowed to
communicate through the firewall, select the Block all incoming
connections, including those in the list of allowed programs check box.

13
Wireless Security Techniques
Traffic flows through radio waves in wireless networks, so it is easy
for attackers to monitor and attack data without having to connect to a
network physically.
When installing wireless services, you should apply the following
wireless security techniques immediately to prevent unwanted access to the
network:

o Wired Equivalent Privacy (WEP) was the first-generation security


standard for wireless network. Attackers quickly discovered that 64-
bit WEP encryption was easy to break
o Change the default administration password.
o Disable the broadcasting of the Service Set Identifier (SSID) to hide
it from other users
o Use MAC filtering to protect the network from other users.
o Change the default values of the SSID by entering the setup
program for the access point and renaming the SSID.
o Update to the latest available firmware.
o Install or activate a firewall, and adjust the settings to eliminate all
traffic except the desired network settings.
o Update to the latest available firmware.
o Install or activate a firewall, and adjust the settings to eliminate all
traffic except the desired network settings.
An attacker can access data as it travels over the radio signal.
However, you can use a wireless encryption system to encode data and
thereby prevent unwanted capture and use of the data. The following list
describes the different levels of wireless security, from most secure to
least secure.

 Lightweight Extensible Authentication Protocol (LEAP): Also called


EAP- Cisco, LEAP is a wireless security protocol created by Cisco to
address the weaknesses in WEP and WPA
 Wi-Fi Protected Access (WPA): An improved version of WEP. It was
created as a temporary solution until 802.11i (a security layer for
wireless systems) was fully implemented
 WEP 128: An enhanced encryption protocol combining a 104-bit key
and a 24- bit initialization vector.
 WEP 64: The first-generation security standard for wireless network.
 No security: Although you can elect to implement no security
whatsoever, you leave your wireless network completely
vulnerable to attack.

14
What’s More

A. Configure Windows XP Firewall


Directions: In this hands-on activity you will explore the Windows XP
Firewall and configure some advanced settings. There are essential
questions that you need to answer while performing the activity.
Step 1

 Navigate to the Windows XP Firewall:


 Start > Control Panel > Security Center
 The Firewall indicator shows the status of the firewall. The normal
setting is “ON”.

Figure 1. Windows Security Center

15
 Access the controller for the firewall by clicking Windows
Firewall at the bottom of the window.

16
Step 2

Figure 2. Windows Firewall General Tab Window


Essential Questions:
In the space below, state why turning off the Windows Firewall is not advised.

B. Create a network using WEP

Directions: Create a network profile using WEP shared key authentication:


1. Open Network and Sharing Center by clicking the button , and
then clicking Control Panel. In the search box, type network, and then
click Network and Sharing Center.
2. Click Set up a new connection or . Enable Firewall for Windows X
3. Click Manually connect to a wireless network, and then click .
4. On the Enter information for the wireless network you want to add
page, under Security type, select .
5. Complete the rest of the page, and then click
6. .Click settings.
7. Click the tab, and then, under Security type, click Shared.
8. Click , and then click Close.

19
What I Have Learned

Direction: Fill in the blank with the word that make the statement correct.
1. Computer and help keep data and equipment safe by
giving only the appropriate people access.
2. A primary responsibilities include data and network security.
3. Computer are created with malicious intent and sent by
attacker
s
4. A is transferred to another computer through e-mail, file
transfers, and instant messaging.
5. Security plan policies should be constantly updated to reflect the latest
to a network

What I Can Do

Research Firewalls

Directions: In this activity, you will use the Internet, newspaper, or a


local store to gather information about hardware and software firewalls.
1. Using the Internet, research two different hardware firewalls.
Based on your research, complete the table below
Company/Hardware Website Cost Subscription Length Hardware
Name URL Features
(Month/Year/Lifetime)

2. Which hardware firewall would you purchase? List reasons for your choice.
3. Using the Internet, research two different software firewalls.
Based on your research, complete the table below.
Company/Hardware Website Cost Subscription Length Hardware
Name URL Features
(Month/Year/Lifetime)

4. Which software firewall would you purchase? List reasons for your choice.

20
Assessment

Direction: Match column A with column B in order to identify the


term/word being described.

A B
1. attached to small pieces of
computer code, software
a. accidental threats
and documents.
b. antivirus software
2. when an employee intends
c. data encryption
to cause damage
d. firewall
3. it is technical a worm e. malicious threats
f. traffic
4. Software designed to g. trojan horse
detect, disable and
remove viruses h. virus
5. when user damages data i. VPN
or equipment
unintentionally j. WPA
6. data being transported on k. WEP
a network
7. an encryption system that l. Worm
protects data
8. a self-replicating
program that is
harmful to network
9. it involves using codes and
ciphers
10. a way of protecting a
computer from
intrusion through
the ports

21
Additional Activities

A. Network Security Study


Directions: Using different references available such as articles, books,
internet and publications, investigate and search for the advantages and
disadvantages of network security.

Advantages Disadvantages
1.

2.

3.

4.

5.

6
B. Modified True or False

Directions: Write security if the underlined word on the subsequent


statement makes it true and virus it makes the statement a false one,
then write the correct term/word to correct it.
1.Computer and network security help keep the data and equipment safe.

2.A technician’s secondary responsibilities include data and network security.

3.Threats to security can come from inside and outside the organization.

4.Computer viruses are created and sent by attackers who have malicious
intent.

5.A virus is transferred to another computer through e-mail, file transfer and
instant messaging

C. Acrostic

Direction: Give the meaning of the acronyms given below:


1. VPN-
2. SSID-
3. WEP-
4. WPA-
5. WTLS-

REFERENCES
Books and Articles and Printed Materials:

Rosalie P. Lucero et al, Basic Education Curriculum, Technology and


Livelihood Education Grade 10 “Computer Hardware Servicing” Learners
Materials
Electronic Resources:
Ping Tim Fisher” Retrieved from
http://pcsupport.about.com/od/commandlinereference/p/pingcom
mand.htm-

“Puzzles for Activities” Retrieved from


http://puzzlemaker.discoveryeducation.com/CrissCrossSetupF
orm.asp

7
“System Configuration utility” Retrieved from
http://moderncomputerskillsandtraining.com/?
page_id=2950-

“Turn On the Windows Firewall” Retrieved from


http://windows.microsoft.com/en- ph/windows/turn-windows-firewall-
onoff#turn-windows-firewall-on-off=windows-7

“Windows Registry” Retrieved from


http://pcsupport.about.com/od/termsr/p/registrywindows.htm-
- http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture
%20Slides/ITE
_PC_v40_Chapter2.pdf

“Occupational Safety Precautions”

Retrieved from “peer to peer networking”

Retrieved from
http://h10025.www1.hp.com/ewfrf/wc/document?
cc=us&lc=en&dlc=en &docname=bph05694-

“Ping Tim Fisher” Retrieved from


http://pcsupport.about.com/od/commandlinereference/p/pingcom
mand.htm-

“Puzzles for Activities” Retrieved from


http://puzzlemaker.discoveryeducation.com/CrissCrossSetupF
orm.asp

“System Configuration utility” Retrieved from


http://moderncomputerskillsandtraining.com/?
page_id=2950-

“Turn On the Windows Firewall” Retrieved50from


http://windows.microsoft.com/en- ph/windows/turn-windows-firewall-
onoff#turn-windows-firewall-on-off=windows-7

“Windows Registry” Retrieved from


8
http://pcsupport.about.com/od/termsr/p/registrywindows.htm--
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chap

9
1
0
1
1

You might also like