4 CBLM Templates
4 CBLM Templates
4 CBLM Templates
Sector : ELECTRONICS
Qualification Title : COMPUTER SYSTEMS SERVICING NC II
Unit of Competency : SET-UP COMPUTER NETWORK
The unit of competency Install and Configure Computer Systems.” Contains the
knowledge, skills and attitudes required for a Computer Systems Servicing NC II course.
You are required to go through a series of learning activities in order to complete each
of the learning outcomes of the module. In each learning outcome there are Information
Sheets, Operation Sheets, and Activity Sheets. Follows these activities on your own and
answer the Self-Check at the end of each learning activity.
If you have questions, don’t hesitate to ask your teacher for assistance.
You may already have some of the knowledge and skills covered in this module
because you have:
If you have can demonstrate to your teacher that you are competent in a
particular skill or skills, talk to him/her about having formally recognized so don’t
have to do the same training again. If you have qualification of Certificate of
competency from previous trainings show it to your teacher. If the skills you acquired
are still current and relevant to this module, they may become part of the evidence
you can present for RPL. If you are not sure about the currency of your skills, discuss
it with your trainer.
Inside this material you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.
BASIC COMPETENCIES
1. Participate in workplace Participate in workplace
500311105
communication communication
2. Work in a team
Work in a team environment 500311106
environment
3. Practice career
Practice career professionalism 500311107
professionalism
4. Practice occupational
Practice occupational health and safety
health and safety 500311108
procedures
procedures
COMMON COMPETENCIES
1. Apply quality standards Apply quality standards ELC315202
2. Perform computer
Perform computer operations ELC311203
operations
3. Perform mensuration and
Perform mensuration and calculation ELC311201
calculation
4. Prepare and interpret
Prepare and interpret technical drawing ELC311202
technical drawing
5. Use hand tools Use hand tools ELC724201
6. Terminate and connect
Terminate and connect electrical wiring
electrical wiring and ELC724202
and electronic circuits
electronic circuits
7. Test electronic
Test electronic components ELC724205
components
CORE COMPETENCIES
1. Install and configure
Install and configure computer systems ELC724331
computer systems
2. Set-up Computer
Set-up Computer Networks ELC724332
Networks
3. Set-up Computer Servers Set-up Computer Servers ELC724333
4. Maintain and Repair Computer
Maintain and Repair ELC724334
Computer Systems and Systems and Networks
MODULE CONTENT
MODULE DESCRIPTOR:. This unit covers the outcomes required in setting-up computers
networks for LANs and small-office home-office (SOHO) systems. It consists of competencies
to install network cables, set network configuration, set router/Wi-Fi/ wireless access
point/repeater configuration as well as to inspect and test the configured computer networks.
LEARNING OUTCOMES:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design and
actual installation site.
2. Network materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked against systems requirements.
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct operation
and safety.
Daniel McTech (June 20, 2017). what are the functions of the switch hub modem and
router to the networking?, Retrieved (August 2018)
From https://broadcaststormblog.wordpress.com/2016/03/30/1-1-purpose-and-
functions-of-network-devices-routers-switches-bridges-and-hubs/
ASSESSMENT CRITERIA
1. Installed network cables
2. Cable routes are determined and planned in accordance with network design and
actual installation site.
3. Network materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked against systems requirements
4. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct
operation and safety.
5. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
6. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
7. Network cables and cable raceway are installed in accordance with established
procedures and installation requirements
8. Installation work is performed and is checked to ensure no unnecessary damage has
occurred and complies with requirements
9. OHS standards and 5S principles are followed according to enterprise requirements
10. Excess components and materials are disposed of based on WEEE directives and
3Rs waste management program.
CONDITION
The students/trainees must be provided with the following:
1. Tools:
- Crimping Tools
- LAN Tester
- RJ45 jack (terminated)
- UTP Cables
- Cable raceway
- RJ45 Terminal Box
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Install network cables & arrange to the raceways.
2. Configuring Client Device Systems & set-up peer to peer wireless
connection.
The following sections discuss the types of cables used in networks and
other related topics.
Multiple Choice: Circle the correct response for each question. Make
sure that your answer clearly.
A. DSL/cable-ready router
B. hub
C. wireless network
D. router
8. In order to connect a PC to a network, the PC must have a(n):
A. wireless mouse.
B. modem
C. ISP
D. network interface card.
4. Which should you do AFTER you start up the Network Setup Wizard?
5. Installing a home network allows you to share which of the following resources?
Steps/Procedure:
1. Strip the cable jacket about 1.5 inch down from the end.
2. Spread the four pairs of twisted wire apart. For Cat 5e, you can
use the pull string to strip the jacket farther down if you need
to, then cut the pull string. Cat 6 cables have a spine that will
also need to be cut.
3. Carefully insert the wires all the way into the modular
connector, making sure that each wire passes through the
appropriate guides inside the connector.
4. Push the connector inside the crimping tool and squeeze the
crimper all the way down.
5. Repeat steps 1-6 for the other end of the cable.
6. To make sure you've successfully terminated each end of the
cable, use a cable tester to test each pin.
Assessment Method:
• Hands-on
• Direct observation
• Practical demonstration
Steps/Procedure:
7. Strip the cable jacket about 1.5 inch down from the end.
8. Spread the four pairs of twisted wire apart. For Cat 5e, you can
use the pull string to strip the jacket farther down if you need
to, then cut the pull string. Cat 6 cables have a spine that will
also need to be cut.
9. Carefully insert the wires all the way into the modular
connector, making sure that each wire passes through the
appropriate guides inside the connector.
10. Push the connector inside the crimping tool and squeeze the
crimper all the way down.
11. Repeat steps 1-6 for the other end of the cable.
12. To make sure you've successfully terminated each end of the
cable, use a cable tester to test each pin.
Assessment Method:
• Hands-on
• Direct observation
• Practical demonstration
Questioning
Portfolio
Written
The evidence must show that the trainee…
Computer Networks concepts / / / /
Network cable installation / / / /
Copper cable splicing and cable testing / / / /
# of
Objectives/Content
Knowledge Comprehension Application items/
area/Topics
% of test
Computer Networks
10 10 0 20%
concepts
Network cable
10 10 10 40%
installation
Copper cable
splicing and cable 10 10 30 40%
testing
TOTAL 30 30 40 100%
Multiple Choice:
1. How many digits of the DNIC (Data Network Identification Code) identify the country?
A. first three
B. first four
C. first five
D. first six
2. A station in a network forwards incoming packets by placing them on its shortest output queue. What
routing algorithm is being used?
B. flooding
C. static routing
D. delta routing
3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps
modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a
communication line using 9-bit frames is approximately equal to?
A. 0.003
B. 0.009
C. 0.991
D. 0.999
B. Bridge
C. Repeater
D. Modem
5. Which of the following condition is used to transmit two packets over a medium at the same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet.
Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
7. What are the most commonly used transmission speeds in BPS used in data communication?
A. 300
B. 1200
C. 2400
D. 9600
C. 255.255.0.0
D. 255.255.255.0
B. protocols
C. gateway
D. multiplexer
provides communication between the Internet Protocol Software on one machine and the Internet
B.
Protocol Software on another
reports error conditions to the original source, the source must relate errors to individual application
C.
programs and take action to correct the problem
12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type
of device(s) are needed to connect them? Choose the most correct answer.
A. Modem
B. Cable
D. Router
13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A. cannot talk at once
14. How many hosts are attached to each of the local area networks at your site?
A. 128
B. 254
C. 256
D. 64
a technique used by protocols in which a lower level protocol accepts a message from a higher level
B.
protocol and places it in the data portion of the low level frame
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for
C.
transmission across a network that cannot handle the original datagram size
C. the condition when two or more stations attempt to use the same channel at the same time
D. a collection of interconnected functional units that provides a data communications service among
17. Avalanche photodiode receivers can detect hits of transmitted data by receiving
A. 100 photons
B. 200 photons
C. 300 photons
D. 400 photons
C. a form of TDMA in which circuit switching is used to dynamically change the channel assignments
19. When you ping the loopback address, a packet is sent where?
A. On the network
B. Down through the layers of the IP architecture and then up the layers again
20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
21. Which of the following device is used to connect two systems, especially if the systems use different
protocols?
A. hub
B. bridge
C. gateway
D. repeater
22. The synchronous modems are more costly than the asynchronous modems because
A. they produce large volume of data
23. A distributed network configuration in which all data/information pass through a central computer is
A. bus network
B. star network
C. ring network
D. Point-to-point network
24. Which of the following TCP/IP protocol allows an application program on one machine to send a
datagram to an application program on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
B. simplex lines
C. mixedband channel
B. a TCP/IP high level protocol for transferring files from one machine to another
27. If you get both local and remote echoes, every character you type will appear on the screen
A. once
B. twice
C. three times
D. never
28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
B. coaxial cable
C. fiber-optic cable
D. microwaves
30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
B. WINS Proxy
C. DHCP Server
D. PDC
B. zero
C. nonzero
33. Which of the following statements is correct for the use of packet switching?
the subdivision of information into individually addressed packets in conjunction with alternative
A. routing arrangement enabled the transmission path to be altered in the event of congestion or
individual link failure
the employment of additional intelligence within the network enabled more sophisticated error
B.
control and link control procedures to be applied
by employing wide bandwidth circuits for the trunk networks substantial economies through
C.
extensive sharing of capacity could be achieved.
B. 80
C. 79
D. 70
36. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'.
If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the
contention?
A. 7 slots
B. 5 slots
C. 10 slots
D. 14 slots
37. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a
speed of 1200 BPS?
A. 10
B. 12
C. 120
D. 1200
B. a dedicated line
C. a ground station
B. Switching alternating
D. Extranets
40. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all
communications with the host?
A. 16 - bits
B. 32 - bits
C. 48 - bits
D. 64 - bits
_______1. A network interface card (NIC) is an expansion card or a PC Card that connects your computer to
a network and provides the doorway for information to flow in and out.
_______2. A switch is a device that connects multiple computers into a network in which multiple
communications links can be in operation simultaneously.
_______3. A firewall is software and/or hardware that protects a computer or network from intruders.
_______4. A wireless network access point is a device that allows computers to access a wired network
using radio waves.
_______5. Bluetooth technology provides entirely wireless connections for all kinds of communication
devices.
_______6. An international virtual private network uses services offered by only one telephone company at a
time.
_______7. Broadband is a high-capacity telecommunications pipeline capable of providing high-speed
Internet service.
_______8. A telephone modem is a device that connects your computer to your phone line so that you can
access another computer or network.
_______9. A client/server network is a network in which only one computer is a server and provides services
to the other computers, which are called clients.
_______10. A communications protocol (protocol) is a set of rules that every computer follows to transfer
information.
_______11. Wireless communications media transmits information over a closed, connected path.
_______12. A WAN covers a large geographic distance, such as a state, a country, or even the entire world.
_______13. A MAN covers a limited geographic distance, such as an office, building, or a group of
buildings in close proximity to each other.
_______14. A satellite is a type of wired communications media.
_______15. Coaxial cable (coax) has one central wire surrounded by insulation, a metallic shield, and final case
of insulating material.
_______16. Infrared is a wireless communications medium that uses light waves to transmit signals or
information
_______17. A repeater is a device that receives a radio signal, strengthens it, and sends it on.
_______18. A virtual private network establishes a virtual Internet network that consists of you, your
customers, and suppliers.
_______19. Bandwidth refers to the capacity of the communications line.
_______20 A private network is a network on which your organization competes for time with others.
General Instruction:
Safety Questions
4. Appropriate personal protective equipment is used and OHS
policies and procedures are followed?
5. OHS standards and 5S principles are followed according to
enterprise requirements
Contingency Questions
7. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
Job Role/Environment Questions
8. Excess components and materials are disposed of based on
WEEE directives and 3Rs waste management program.
Rules and Regulations
9. Connect the router's WAN port to your internet source, such
as a DSL or cable modem, using the first network cable
10. Connect one of the router's LAN ports (most routers have
four LAN ports) to the computer using the second network
cable.
The candidate’s underpinning Satisfactory Not
knowledge was: Satisfactory
Facilitator:
Mr. Eliaquim G. Jesto
Mr. Ben Andrew J. Galindo
Encoder:
o Mr. Ralf John D. Pacapat
This work was produced with funding provided by the Electronics sector of
Computer Systems Servicing NC II @ TESDA Regional Training Center