CSS G12 Module 7 Q1
CSS G12 Module 7 Q1
CSS G12 Module 7 Q1
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted
to locate and seek permission to use these materials from their respective copyright owners. The
publisher and authors do not represent nor claim ownership over them.
I. Introduction:
This module covers the Remote Desktop Services accelerates and extends desktop and
application deployments to any device, improving remote worker efficiency, while helping to keep
critical intellectual property secure and simplify regulatory compliance. Remote Desktop Services
enables virtual desktop infrastructure (VDI), session-based desktops, and applications, allowing users
to work anywhere.
II. Objectives
At the end of the lesson you are
expected to:
Terminal Server - is a server or network device that enables connections to multiple client
systems to connect to a LAN network without using a modem or a network interface.
Forest - This allows any Terminal Server in the forest to attain a license
Internet Protocol Address (IP Address) - is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication.
Domain Name Services (DNS Server)- A DNS server is a computer server that contains a
database of public IP addresses and their associated hostnames, and in most cases serves to
resolve, or translate, those names to IP addresses as requested.
Computer network(or network)- It is a group of devices connected to each other. Networks
may be classified into a wide variety of characteristics, such as the medium used to transport
the data, communications protocol used, scale, topology, benefit, and organizational scope.
LAN (local area network) - A computer network that interconnects computers in a limited
area such as a home, school, computer laboratory, or office building using network media.
Server - A computer system in a network that is shared by multiple users.
IV. Pre-Test
MULTIPLE CHOICE:Choose the letter of the correct answer and write it in your answer sheet.
3. Which of the following does the Desktop Protocol NOT carry between a
terminal server and a client?
a. Keystroke
b. Mouse movements
c. Display Information
d. Application Data
4. When a terminal services installation does not have a TS Licensing Server
installed, client can still connect to the terminal server for _______ days.
a. 10 c. 90
b. 30 d. 120
V. Learning Activities
Figure 1
Figure 2
Step 3: Pick the license mode As with past Terminal Server licensing, there are two license options:
per device and per user (see Figure 4).
Figure 4
Step 4: Allowing access to
Terminal Server (not
required) Select which users
to give access to the local
terminal services. This
component is not required for
RDS to work. If you choose to
install "Remote Desktop
Session Host" as I have, you
will get this prompt (see
Figure 5).
Figure 5
Figure 6
Step 6: Configure license
scope (see Figure 7) Just as
with Terminal Server of the
past, you can configure the
scope of the license server.
You have the following two
options:
1. Domain: This limits the
licensing to only servers in
the domain.
2. Forest: This allows any
Terminal Server in the
forest to attain a license.
Figure 7
Step 7: Assigning the SSL certificate for Remote Desktop Gateway (see Figure 8) The Remote
Desktop Gateway uses Secure Sockets Layer (SSL) to tunnel and encrypt traffic from the client. This
functionality requires a certificate. There are two options for certificates:
1. Specify a certificate from the certificate store.
2. Produce a self-signed certificate.
Figure 8
Figure 9
Install and configure network access and protection policies (see Figure 10 and Figure 11)
This is used to configure and enforce network access polices such as IPsec and network access
protection from the client. This feature can also be used to define different policies based on users'
connectivity (dial-up or virtual private network).
Figure 10 Figure 11
Step 9: Install IIS and Remote
Desktop Web Access Remote
Desktop Web Access requires
Internet Information Services (IIS),
so the next two screens are for
installing and configuring IIS. Figure
12 is an overview screen, while
Figure 13 is the configuration screen.
FFigure 12
Figure 13
Step 10: The final steps At this point, you're done. The last two screens just let you know what
you're installing
Figure 14), and a final screen (see Figure 15) lets you know whether any additional steps like
rebooting are required.
Figure 14
Figure 15
1
1. What is the platform of choice for building virtualization solutions for every end
customer need, including delivering individual virtualized applications, providing
secure mobile and remote desktop access, and providing end users the ability to run
their applications and desktops from the cloud?
2. This isa computer system in a network that is shared by multiple users.
3. This is a server or network device that enables connections to multiple client
systems to connect to a LAN network without using a modem or a network interface.
4. This limits the licensing to only servers in the domain.
5. This allows any Terminal Server in the forest to attain a license.
1. __________________________________
2. __________________________________
3. __________________________________
4. __________________________________
5. __________________________________
6. __________________________________
Practice Task #3 “ESSAY”
1. Discuss the importance of Remote Desktop Services.
8. Which of the following does the Desktop Protocol NOT carry between a
terminal server and a client?
a. Keystroke c.Display Information
b. Mouse movements d. Application Data
Practice Task #1
1
“CROSSWORD PUZZLE”
S
R E M O T E D E S K T O P S E R V I C E S
R O
V M F
E A O
T E R M I N A L S E R V E R
N E
S
T
POST-TEST
I - IDENTIFICATION II - Multiple Choice
1. A 6. C
2. B 7. D
3. C 8. A
4. D 9. D
5. E 10. B
References
https://www.google.com/search?q=Computer+Hardware+Servicing+Module
Tesda CSS CBLM/ Louie Francia& Emmanuel Bauca
Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter “Introduction to Information
Technology” 3rd Edition- 2005 at Rosewood Drive, Denver, John Wisley and
Sons(Asia) Pte. Ltd
Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero
“Technology and Livelihood Education- Information and Communications
Technology Learners Manual – Grade 7 & 8”
Rosalie P. Lujero, Ronaldo V. Ramilo “Technology and Livelihood
EducationInformation and Communications Technology Learners Manual –
Computer Hardware Servicing Grade 9” 70
Electronic Resources: “Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
“File Sharing” Retrieved from http://www.techopedia.com/definition/16256/file-
sharing
“Fundamentals of PC repair” Retrieved from http://www.ustudy.in/ce/hard/u1