0% found this document useful (0 votes)
83 views24 pages

3rd Grading - CSS LAS 11-5-8

COMPUTER SYSTEM SERVICING

Uploaded by

myrna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views24 pages

3rd Grading - CSS LAS 11-5-8

COMPUTER SYSTEM SERVICING

Uploaded by

myrna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

11

TECHNOLOGY AND
LIVELIHOOD EDUCATION
COMPUTER SYSTEM
SERVICING
Quarter 3 – Week 5-8
Learning Activity Sheets (LAS)

SCHOOLS DIVISION OF DINAGAT ISLANDS

Computer System Servicing 11/12


Ikalawang Kwarter – Mga Gawain sa Pagkatuto
Ikatatlong Set
Unang Edisyon, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit. Such agency or office may, among other
things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use
these materials from their respective copyright owners. The publisher and
authors do not represent nor claim ownership over them.

Published by Schools Division of Dinagat Islands

Development Team of the Learning Activity Sheets

Writers: Myrna C. Maglipac


Editor: Myrna C. Maglipac
Reviewers: Juan Dela Cruz, Juan Dela Cruz
Layout Artist: Fernando O. Galito, Jovelyn Abe
Management Team:
Schools Division Superintendent FELISA G. LARANJO, PhD, CESO VI
OIC, Assistant Schools Division Superintendent LEONEVEE V. SILVOSA
Chief Education Supervisor, SGOD MILA O. GERALDINO, PhD
Chief Education Supervisor, CID LOPE C. PAPELERAS, PhD
Education Program Supervisor, SHS/TVL EDELIZA F. SEGUIS
Education Program Supervisor, LRMS MICHAEL PASO, PhD
Project Development Officer II
SDO Librarian II

Printed in the Philippines by ______________________________

Department of Education – Learning Resource Management Section


Office Address: White Beach, Dinagat, Dinagat Islands
E-mail Address: [email protected],
[email protected]
Telephone no.: Sample number

WEEK 5 Installing network cables

Pangalan: _________________________________ Pangkat: ___________________________

Objectives: Set network configuration

2
1. Configure Network Interface Card (NIC) in accordance with the network
design

Code: TLE_IACSS9-12ICSS-IIa-j-34

Time Allotment: 1 Week

PRE - TEST: True or False

DIRECTIONS: State your agreement or disagreement with the statement below.


Write True if you agree and False if you disagree.

________1. Protective Eyewear enclose or protect the nose area in order to prevent
particulates, infectious fluids, or chemicals
________2. Uni-tester is an electronic device for measuring instrument that
combines several measurement and functions
________3. Fliers are hand tool used to hold objects firmly for bending or physical
compression
________4. A screw is a tool for driving screws and often rotating other machine
elements with the mating drive system
________5. A Soldering Gun is a tool for soldering metals using tin-based solder to
achieve a highly conductive contact.

Key Concept: Configure Client Device Systems

LEARNING OBJECTIVES: After reading this Information Sheet, you should be able to:
1. Identify the different tools and equipment used in computer systems and networks
2. Determine the different use and functions of these tools and equipment’s TOOLS
AND EQUIPMENTS One important thing to consider before executing a well-planned
computer installation is that one must be knowledgeable in the different tools and
equipment’s used in computer systems and networks. Furthermore, the idea on how
these tools and equipment’s are properly used is another important consideration in
installing computer systems.

Hardware Tools/Equipment’s and their


Illustrations
Functions
Protective Eyewear
Enclose or protect the eye area in order to prevent
particulates, infectious fluids, or chemicals from striking
the eyes
Multi-tester or Multi-meter
A multi-meter or a multi-tester, also known as a VOM
(Volt-Ohm meter), is an electronic measuring instrument
that combines several measurement functions in one
unit
Pliers (Assorted)

3
Pliers is a hand tool used to hold objects firmly, for
bending, or physical compression.

Screwdriver

A screwdriver is a tool for driving screws and often


rotating other machine elements with the mating drive
system
Soldering Gun

A soldering gun is a tool for soldering metals using


tinbased solder to achieve a highly conductive contact

Desoldering Tool

Desoldering tools are used for removing the molten


solder so that the joint may be separated.

Allen Wrench
A hex key, Allen key, or Allen wrench (also known by
various other synonyms) is a tool of hexagonal cross-
section used to drive bolts and screws that have a
hexagonal socket in the head (internalwrenching
hexagon drive)
Flashlight
A flashlight (or torch in British English) is a hand-held
portable electric-powered light source. Usually the light
source is a small incandescent light bulb or light-
emitting diode (LED)
IC Insertion and Extraction Tool

Used for extracting and inserting BIOS Chip

Mirror
In hardware servicing a mirror is used for inspecting the
peripherals
Tweezers
Tweezers are tools used for picking up objects too small
to be easily handled with the human hands

Antistatic Wrist Strap


An antistatic wrist strap, ESD wrist strap, or ground
bracelet is an antistatic device used to safely ground a
person working on very sensitive electronic equipment,
to prevent the buildup of static electricity on their body,
which can result in electrostatic discharge (ESD)

4
Gloves

A gloves are garments for covering and protecting the


whole hand.
Printer
a printer is a peripheral which produces a text or
graphics of documents stored in electronic form, usually
on physical print media such as paper or
transparencies.
Computer
A computer is a programmable machine designed to
automatically carry out a sequence of arithmetic or
logical operations

Windows Operating System CD/DVD

An operating system is used as an intermediary between


hardware and software

Device Driver CD/DVD


An application used to install the device and peripherals
of a computer systems and networks
RS 232 pin insertion/extraction tool

RS232 and D-Sub Pin Insertion and Removal Tool

Crimping Tool
A crimping tool is a tool designed to crimp or connect a
connector to the end of a cable. For example, network
cables and phone cables are created using a crimping
tool to connect the RJ-45 and RJ11 connectors to the
end of the cable. In the picture to the right, is an
example of what a crimping tool looks like. This example
shows a tool capable of crimping both RJ-11 and RJ-45
connectors.
LAN Tester

A Device used for testing network cable connectivity

UTP Unshielded Twisted Pair Cat 5 Cable

A cable used for computer networking

RJ 45 Connector
A plastic connector used for UTP Cable to connect
computers in a network
Ethernet Switch
A network switch or switching hub is a computer
networking device that connects network segments or

5
network devices

ACTIVITY 1: IDENTIFICATION
Direction : Identify what is being ask, write on the space provided.

__________1. used as an intermediary between hardware and software.


__________2. a programmable machine designed to automatically carry out a sequence
of arithmetic or logical operations.
__________3. is a peripheral which produces a text or graphics of documents stored in
electronic form, usually on physical print media such as paper or
transparencies.

ACTIVITY 2: e-Connect!

DIRECTIONS: Match Column A with Column B. Connect the correct answer from
column A to Column B.

COLUMN A COLUMN B
1. Application A. are garments for covering and
2. Plastic Connector protecting the whole hand.
3. Gloves B. It is used to install the device and
peripherals of a computer
systems and networks.
C. used for UTP Cable to connect
computers in a network.
D. tools used for picking up objects
too small to be easily handled with
the human hands.

ACTIVTIY 3: Multiple choice.

Directions: Read and understand the statement and encircle the correct answer.

1. A tool designed to crimp or connect a connector to the end of a cable?


A. Antistatic Wrist Strap B. Crimping Tool C. Gloves D. Router
2. A peripheral which produces a text or graphics of documents stored in electronic
form, usually on physical print media such as paper or transparencies?
A. Cable B. Device C. Printer D. Switch
3. Device used to safely ground a person working on very sensitive electronic
equipment, to prevent the buildup of static electricity on their body, which can
result in electrostatic discharge
A. Antistatic Wrist Strap B. Cable C. Network Switch D. Gloves

ACTIVITY 4: True or False !

DIRECTIONS: State your agreement or disagreement with the statement below.


Write True if you agree and False if you disagree.

______1. In hardware servicing a mirror is used for inspecting the peripherals.

6
______2. UTP Unshielded Twisted Pair Cat 5 Cable is a cable used for printer
connector.

______3. Desoldering tools are used for removing the molten solder so that the joint
may be separated.

Reflection: . In every personal computer , do we need to connect Ethernet Switch?


Why?

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

POST TEST:
DIRECTIONS: State your agreement or disagreement with the statement below.
Write True if you agree and False if you disagree.

________1. Protective Eyewear enclose or protect the nose area in order to prevent
particulates, infectious fluids, or chemicals
________2. Uni-tester is an electronic device for measuring instrument that
combines several measurement and functions
________3. A Soldering Gun is a tool for soldering metals using tin-based solder to
achieve a highly conductive contact.
________4. Fliers are hand tool used to hold objects firmly for bending or physical
compression
________5. A screw is a tool for driving screws and often rotating other machine
elements with the mating drive system

ANSWERS KEY
PRE - TEST
1. FALSE
2. FALSE ACTIVITY 1 ACTIVITY 3
3. FALSE 1. Operating System 1. B
4. FALSE 2. Computer 2. C
5. TRUE 3. Printer 3. A
POST TEST
1. FALSE
ACTIVITY 2 ACTIVITY 4
2. FALSE
1. B 1. False
3. TRUE
2. C 2. False
4. FALSE 3. True
3. A
5. FALSE
Set router/Wi-fi/wireless access point/repeater
WEEK 6-8
configuration

Pangalan: _________________________________ Pangkat: ___________________________

7
Objectives: Configuring Wide Area Network (ACCESS POINT)

3.1 Configure client device systems settings in


accordance with manufacturer’s instructions and end user preference
3.2 Configure LAN in accordance with manufacturer’s instructions and network design
3.3 Configure WAN in accordance with manufacturer’s instructions and network design
3.4 Configure wireless settings in accordance with manufacturer’s instructions, network design, and
end-user preferences.
3.5 Configure security/firewall/advanced settings in accordance with manufacturers instruction and
end-user preferences

Code: TLE_IACSS9-12ICSS-IIa-j-35

Time Allotment: 3 Weeks

PRE - TEST: True or False

DIRECTIONS: State your agreement or disagreement with the statement below.


Write True if you agree and False if you disagree.

________1. A firewall is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
________2. Running a firewall on each PC on your network won't help control the
spread of malicious software on your network.
________3. In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules.
________4. In setting up Time, you cannot set time automatically.
________5. In setting up the Time Zone, you could use "Philippines" for the setting.

Key Concept: Configure Wide Area Network (ACCESS POINT)

A wide area network (WAN) is a telecommunications network or computer network


that extends over a large geographical distance. Wide area networks are often
established with leased telecommunication circuits. Business, education and
government entities use wide area networks to relay data to staff, students, clients,
buyers, and suppliers from various locations across the world. In essence, this mode
of telecommunication allows a business to effectively carry out its daily function
regardless of location. The Internet may be considered a WAN. Configure Wide Area
Network As we gather all the peripherals and equipment needed, we will proceed on
Configuring Wide Area Network. Same process with Router but this time we will use
Modem or the Access Point. See steps listed below:
1. Gather your Modem, Ethernet Cable and Personal Computer. Connect each
peripheral using the Ethernet Cable. Directly connect Modem to your Personal
Computer using the Ethernet Cable. This will just be use for the setting up
processes.
2. Reset the Modem. In resetting your Modem just click the small button at the back
and wait until all the icons in front of the Modem will Lights on.
3. Go to browser either “Google Chrome” or “I explorer”. And type in the default IP
Address of your Modem. Depends on Manufacturer. For this module, we will use

8
192.168.0.254. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and password.
4. Repeat the step shown on Configuring your Router. a. Go to Network Tab. Change
your IP address. Click Save then it will reboot. b. Go to DHCP tab and click Disable
Button. c. Unlike on Router we need to set up Wireless Tab on Modem. Click
Wireless Tab. Click on WPA/WPA2 – Personal (Recommended) then enter your
desired PSK Password. It must consist of alphanumeric characters. The browser
will reboot.

Configure Wireless Settings

A wireless network is a computer network that uses wireless data connections


between network nodes. Wireless networking is a method by which homes,
telecommunications networks and business installations avoid the costly process of
introducing cables into a building, or as a connection between various equipment
locations. Wireless telecommunications networks are generally implemented and
administered using radio communication.
A wireless local area network (WLAN) links two or more devices over a short distance
using a wireless distribution method, usually providing a connection through an
access point for internet access. The use of spreadspectrum or OFDM technologies
may allow users to move around within a local coverage area, and still remain
connected to the network. Products using the IEEE 802.11 WLAN standards are
marketed under the Wi-Fi brand name. Fixed wireless technology implements point-
topoint links between computers or networks at two distant locations, often using
dedicated microwave or modulated laser light beams over line of sight paths. It is often
used in cities to connect networks in two or more buildings without installing a wired
link. Configure wireless settings After configuring the Router and Modem we will now
proceed on setting up the wireless network.
1. First, we need to check whether you have a wireless adapter.
a. Select the Start button, type Device Manager in the search box, and then select
Device Manager.
b. Expand Network adapters.
c. Look for a network adapter that might have wireless in the name.

2. Setting up the modem and Internet connection After you have all the equipment,
you'll need to set up your modem and Internet connection. If your modem wasn't set
up for you by your Internet service provider (ISP), follow the instructions that came
with your modem to connect it to your PC and the Internet. If you're using Digital
Subscriber Line (DSL), connect your modem to a phone jack. If you’re using cable,
connect your modem to a cable jack.
3. Positioning the wireless router Put your wireless router somewhere where it will
receive the strongest signal with the least amount of interference. For better results,
follow these tips:
a. Place your wireless router in a central location. Place the router as close to the
center of your home as possible to increase the strength of the wireless signal
throughout your home.
b. Position the wireless router off the floor and away from walls and metal objects,
such as metal file cabinets. The fewer physical obstructions between your PC and
the router's signal, the more likely that you'll be using the router's full signal
strength. Securing your wireless network Security is always important; with a

9
wireless network, it's even more important because your network's signal could
be broadcast outside your home. If you

Setting Up Firewall with Advanced Security

The Windows Firewall with Advanced Security is a tool which gives you detailed control
over the rules that are applied by the Windows Firewall. You can view all the rules that
are used by the Windows Firewall, change their properties, create new rules or disable
existing ones. In this tutorial we will share how to open the Windows Firewall with
Advanced Security, how to find your way around it and talk about the types of rules
that are available and what kind of traffic they filter. A firewall is hardware or software
that can help protect your PC from unauthorized users or malicious software
(malware). Running a firewall on each PC on your network can help control the spread
of malicious software on your network and help protect your PCs when you're
accessing the Internet. Windows Firewall is included with this version of Windows.
1. One is to open the standard Windows Firewall window, by going to "Control Panel -
> System and Security -> Windows Firewall". Then, click or tap Advanced settings.

2. In Windows 7, another method is to search for the word firewall in the Start
Menu search box and click the "Windows Firewall with Advanced Security"
result.
3. In Windows 8.1, Windows Firewall with Advanced Security is not returned
in search results and you need to use the first method shared above for
opening it.
4. The Windows Firewall with Advanced Security looks and works the same
both in Windows 7 and Windows 8.1. To continue our tutorial, we will use
screenshots that were made in Windows 8.1.
5. What Are The Inbound & Outbound Rules?
a. In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules, which are enabled
depending on the location of the network you are connected to.
b. Inbound rules are applied to the traffic that is coming from the network
and the Internet to your computer or device. Outbound rules apply to the
traffic from your computer to the network or the Internet.
c. These rules can be configured so that they are specific to: computers,
users, programs, services, ports or protocols. You can also specify to

10
which type of network adapter (e.g. wireless, cable, virtual private
network) or user profile it is applied to.
d. In the Windows Firewall with Advanced Security, you can access all rules
and edit their properties. All you have to do is click or tap the appropriate
section in the left-side panel.
6. The rules used by the Windows Firewall can be enabled or disabled. The
ones which are enabled or active are marked with a green check-box in the
Name column. The ones that are disabled are marked with a gray check-
box.
7. If you want to know more about a specific rule and learn its properties,
right click on it and select Properties or select it and press Properties in the
column on right, which lists the actions that are available for your selection.
8. In the Properties window, you will find complete information about the
selected rule, what it does and in when it is applied. You will also be able to
edit its properties and change any of the available parameters.
9. What Are The Connection Security Rules?
a. Connection security rules are used to secure traffic between two
computers while it crosses the network. One example would be a rule
which defines that connections between two specific computers must be
encrypted
b. Unlike the inbound or outbound rules, which are applied only to one
computer, connection security rules require that both computers have
the same rules defined and enabled.
c. If you want to see if there are any such rules on your computer, click or
tap "Connection Security Rules"on the panel on the left. By default, there
are no such rules defined on Windows computers and devices. They are
generally used in business environments and such rules are set by the
network administrator.
10. What Does the Windows Firewall with Advanced Security Monitor? The
Windows Firewall with Advanced Security includes some monitoring
features as well. In the Monitoring section you can find the following
information: the firewall rules that are active (both inbound and outbound),
the connection security rules that are active and whether there are any
active security associations.
11. You should note that the Monitoring section shows only the active rules
for the current network location. If there are rules which get enabled for
other network locations, you will not see them in this section.

ACTIVITY 1: IDENTIFICATION
Direction : Identify what is being ask, write on the space provided.

__________2. Is a device that sends, receives, and translates information from the internet and makes it available
within the Local Area Network
__________3. Are networking hardware used to connect one network device to other network devices or to
connect two or more computers to share printers, scanners etc.
__________4. Is a way stations that control the traffic of data within a network, assigns a unique IP Address to
each computer.

11
ACTIVITY 2: e-Connect!

DIRECTIONS: Match Column A with Column B. Connect the correct answer from
column A to Column B.

COLUMN A COLUMN B
1. A firewall is hardware or software that A. Connection Security Rules
can help protect your PC from B. Inbound Rules
unauthorized users or malicious C. Firewall
software (malware). D. Fixed Wireless Technology
E. Monitoring Section
2. Applied to the traffic that is coming
from the network and the Internet to
your computer or device.
3. Monitoring section shows only the
active rules for the current network
location.

ACTIVTIY 3: Multiple choice.

Directions: Read and understand the statement and encircle the correct answer.

1. __________ has a standard set of Inbound and outbound rules in order to provide
the security you need.
A. Monitoring Section C. Properties Windows
B. Network Administrator D. Wireless Firewall
2. ___________is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
A. Advanced Security C. Fixed Wireless Technology
B. Firewall D. Wide Area Network
3. Wireless networking is a method by which homes, telecommunications networks
and business installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations
A. Configuring Wireless C. Network
B. Fixed Wireless Technology D. Wireless Networking

ACTIVITY 4: True or False !

DIRECTIONS: State your agreement or disagreement with the statement below.


Write True if you agree and False if you disagree.

______2. On Windows 10 OS, to set up the Time and Date go to the upper left of your taskbar.

______3. Setting up your Computer Name is important. This will serve as the Identity of your computer.

______4. In every personal computer, it is necessary to install a network driver

Reflection: what is Wireless Network?

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

12
_____________________________________________________________________________________
____________________________________________________________________________________

POST - TEST: True or False

DIRECTIONS: State your agreement or disagreement with the statement below.


Write True if you agree and False if you disagree.

________1. A firewall is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
________2. In setting up Time, you cannot set time automatically.
________3. Running a firewall on each PC on your network won't help control the
spread of malicious software on your network.
________4. In setting up the Time Zone, you could use "Philippines" for the setting.
________5. In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules.

ANSWERS KEY

PRE - TEST ACTIVITY 1 ACTIVITY 2 ACTIVITY 3


1. TRUE 1. Modem 1. C 1. D
2. FALSE 2. Ethernet Cable 2. B
3. TRUE 2. B
3. Router 3. E
4. FALSE 3. D
5. FALSE
POST TEST
ACTIVITY 4
1. TRUE
1. FALSE
2. FALSE 2. TRUE
3. FALSE 3. TRUE
4. FALSE
5. TRUE

13
WEEK 4 Set network configuration

Pangalan: _________________________________ Pangkat: ___________________________

Objectives: Setting network configuration

1.1Prepare customized installers in accordance with software utilization guide and


end user agreement.
1.2Carry out installation of portable applications in accordance with software
user guide and software license

Code: TLE_IACSS9-12ICSS-IIa-j-34

Time Allotment: 1 Week

14
PRE - TEST: Multiple Choice
Directions: Read and understand the statement and encircle the correct answer.

1. It is a great way to share files and devices between multiple computers.


A. Devices C. Local Area Network
B. Internet Connection D. Wide Area Network
2. In order to share an Internet connection between computers, you will first need
what type of connection (such as cable or DSL) to set up for your primary
computer?
A. Broadband Internet Connection C. Topological Network
B. Internet Connection D. Wide Area Network
3. It is a numerical label assigned to each device (e.g., computer, printer)
participating in a computer network that uses the Internet Protocol for
communication?
A. Address C. Password
B. Internet Protocol address (IP address) D. Username
4. What type of router is recommended, otherwise the speed for all devices will drop
the highest supported by all at that time?
A. MiMo Type C. L2TP
B. PPPoE Type D. L2TP
5. What is the most typical username?
A. Admin C. User
B. Administrator D.12345

Key Concept: Setting network configuration

A local-area network (LAN) is a computer network that spans a relatively small area.
Most LANs are confined to a single building or group of buildings, however, one LAN
can be connected to other LANs over any distance via telephone lines and radio waves

How to Create a Local Area Network (LAN)

A LAN, or local area network, is a great way to share files and devices between multiple
computers. If you have several computers in your home, setting up a network will
allow you to share an Internet connection, data, printers, and other devices between
your computers - all without wires. Fortunately, the process is simple, and you can
learn how to set up a LAN in your home by following a few easy steps.

Steps 1: Assess your needs in a network. The devices you use to set your network
up will determine your network's capabilities. You should address your needs in terms
of cost, security, connection speed, expandability (adding more computers or devices
later) and distance between computers. In general, you will need to keep all the
computers in the network within 100 yards (91 m) of each other.

Step 2 Ensure that your computers have wireless networking cards installed. In
order to communicate wirelessly with other computers in the network, each computer

15
must have a wireless networking card. If your computers are only a few years old, you
are almost guaranteed to already have one built-in, as this is a standard feature on all
computers being produced today. If you have an older computer, you may need to
purchase and install a networking card.

Step 3 Set up an Internet connection. While LANs can be set up simply to share files
between computers without Internet connectivity, there is little benefit to doing so
considering the cost of wiring the entire network. To share an Internet connection
between computers, you will first need a broadband Internet connection (such as cable
or DSL) set up for your primary computer. Contact a local Internet service provider
(ISP) to establish a connection if you don't already have one.

Step 4 Purchase a wireless router. You will need to broadcast your Internet
connection wirelessly, and for this, you need a router. When buying a router, make
sure you get one that is designed for your connection type (cable, DSL, etc.). You
should also consider the strength of the router's signal. The packaging will describe
how far you can expect the router's signal to broadcast. It will need to reach every
computer in your network.

Step 5 Install the router. To install the router, run your main Ethernet cable (the one
used for connecting your primary computer to the Internet) from your modem into the
router. Plug the router's power cord in, and then install any software that it came with
on each computer in the network. When you are finished, the router should begin
broadcasting your Internet connection wirelessly.

Step 6 Connect each computer to the wireless network. On each computer, find
the wireless network's name that you assigned during the software installation.
Connect to that network using the password that you created.

16
Step 7 Share files over the network. To make files on 1 computer accessible to users
on other computers, you must mark them as shared. In Windows, you can do this by
placing the files in the "Shared Documents" folder or by right-clicking on each file and
checking "Share this file" in the "Properties" menu. The process will differ slightly for
other operating systems.

Step 8 Connect to any devices in the network. To connect to devices such as


printers and scanners, these devices will also need to be able to communicate
wirelessly (this feature is not nearly as common on printers as on computers). To
connect to a device, simply locate the device's icon on the network drive on each
computer. Double-clicking on a printer's icon, for example, should install the printer
and enable it for future use.

Step 9 To check connectivity of the computers in the network run the command
prompt. Type the command ping (ipaddress of the computer to be checked) –t. Youu will
see the figure below if your ping was successful.

WIRELESS NETWORK DEVICES CONFIGURATION

An Internet Protocol address (IP address) is a numerical label assigned to each


device (e.g., computer, printer) participating in a computer network that uses the
Internet Protocol for communication

HOW TO SET UP WIRELESS ROUTER

STEP 1 Purchase a wireless router. Routers come in all shapes and sizes. Compare
features to find the router that is right for you. If you have more area that you need to
cover, or have lots of walls in your home, you’ll need a router that offers the option of
upgrading antenna(s) with high gain types - if not supplied in the box. If more than one
wireless device will be connecting at the same time at different speeds, a MiMo type
router is recommended, otherwise the speed for all devices will drop the highest
supported by all at that time.

17
 All modern routers should support 802.11n, or Wireless-N). This is the most
stable, offers the fastest speeds and is backwards compatible with older
standards such as 802.11g.

STEP 2 Connect your router to your modem. Routers and wireless routers enable
you to share your broadband internet connection with multiple devices. To do so, you
will need to connect your broadband modem to the router. For best results, place your
router near your modem.

 Connect the router and the modem with an Ethernet cable. Most routers come
packaged with a short Ethernet cable that you can use for this.
 Connect the modem to the WAN/Internet port on your router. It is usually
offset, and may be a different color from the LAN ports

STEP 3 Connect any devices you want to hard wire with CAT 5 (or better)
Ethernet cables. If you have computers that are close, or a video game console or TV,
you can connect them to the router via Ethernet. This will result in a more stable and
faster connection, and doesn’t require any extra configuration.
STEP 4 Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings. You
can disconnect this computer afterwards if you want to connect wirelessly

STEP 5 Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the router or
in the documentation. If you can’t find the router’s IP address anywhere, you can do a
web search for the router model to see what the default address is.

 IP addresses are formatted as four groups of up to three digits, separated by


periods.
 Most default IP addresses are 192.168.1.1, 192.168.0.1, or 192.168.2.1.

STEP 6 Open a web browser on the computer that is connected to the router.
Enter in the IP address of the router into the address bar and press Enter. Your
browser will attempt to connect to the router’s configuration menu.

 If your router came with an installation disc, you can run the configuration
program from that instead. It will accomplish many of the same functions.

18
STEP 7 Enter your username and password. In order to access the configuration
page, you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will need
to use to log on. This varies from model to model, but should be printed on the router
or in the documentation.

 The most typical username is “admin”.


 The most typical passwords are “admin” and “password”.
 Many routers will only require a username and a blank password, and some
allow you to leave all fields blank.
 If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it has
been changed, press the Reset button on the back of the router for 10 (to 30+
seconds as dictated in the instructions for the router model) to restore factory
defaults and try again.

STEP 8 Open the Wireless Settings. When you log in to your router, you will be
taken to the router’s main menu or status screen. There will be several options to
choose from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless section
will allow you to set up your wireless network.

STEP 9 Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network. This
is what other devices will see when scanning for networks.

 Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the signal.
*See the Tips section below for additional information on the SSID setting

19
STEP 10 Choose a security method. Choose from the list of available security
options. For the best security, choose WPA2-PSK as the encryption method. This is the
most difficult security to crack, and will give you the most protection from hackers and
intruders.

STEP 11 Create a passphrase. Once you’ve chosen your security method, enter in a
passphrase for the network. This should be a difficult password, with a combination of
letters, numbers, and symbols. Don’t use any passwords that could be easily deduced
from your network name or from knowing you.

STEP 12 save your settings. Once you are finished naming and securing your
wireless network, click the Apply or Save button. The changes will be applied to your
router, which may take a few moments. Once the router has finished resetting, your
wireless network will be enabled.

STEP 13 Change your router’s username and password from the default. Once you
have your network configured, you should change the username and password that
you use to access your router. This will help protect your router from unauthorized
changes. You can change these from the Administration section of the router
configuration menu.[2]

STEP 14 Block sites. If you want to prevent devices that are connected to your
network from accessing certain websites, you can use built-in blocking tools to restrict
access. These can be found in the Security/Block section of the router.

You can usually block by specific domain names, or by keywords

20
ACTIVITY 1: IDENTIFICATION
Direction : Identify what is being ask, write on the space provided.

__________1. It is formatted as four groups of up to three digits, separated by periods.

__________2. Mostly come packaged with a short Ethernet cable.

__________3. This is the most difficult security to crack and will give you the most
protection from hackers and intruders.

ACTIVITY 2: e-Connect!

DIRECTIONS: Match Column A with Column B. Connect the correct answer from
column A to Column B.

COLUMN A COLUMN B
1. What are the default IP address? A. Broadband
2. What do you call the device that once you B. Ethernet
will connect, it will result in a more stable C. Monitoring Section
and faster connection, and doesn’t require D. Router
any extra configuration? E. 192.168.1.1

3. It come in all shapes and sizes.

ACTIVTIY 3: Multiple choice.

Directions: Read and understand the statement and encircle the correct answer.

1. __________ can be set up simply to share files between computers without Internet
connectivity, there is little benefit to doing so considering the cost of wiring the
entire network.
A. Devices C. LANs
B. Network Administrator D. WAN
2. ___________ If you want to prevent devices that are connected to your network from
accessing certain websites
A. Block Sites C. Security Methods
B. Firewall D. Wide Area Network
3. ___________is a computer network that spans a relatively small area.
A. Configuring Wireless C. Network
B. Local Area Network D. Wireless Networking

21
ACTIVITY 4: True or False !

DIRECTIONS: State your agreement or disagreement with the statement below.


Write True if you agree and False if you disagree.

______1. Once you have your network configured, you should change the username
and password that you use to access your router. This will help protect your
router from unauthorized changes.

______2. If you have computers that are close, or a video game console or TV, you can
connect them to the router via Ethernet.

______3. If your router came with an installation disc, you cannot run the configuration
program from that instead. It will accomplish many of the same functions.

Reflection: Is it important to Change your router’s username and password from the
default? Why ?

_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

POST TEST: Multiple Choice


Directions: Read and understand the statement and encircle the correct answer.

1. It is a numerical label assigned to each device (e.g., computer, printer)


participating in a computer network that uses the Internet Protocol for
communication?
A. Address C. Password
B. Internet Protocol address (IP address) D. Username
2. It is a great way to share files and devices between multiple computers.
A. Devices C. Local Area Network
B. Internet Connection D. Wide Area Network
3. What type of router is recommended, otherwise the speed for all devices will drop
the highest supported by all at that time?
A. MiMo Type C. L2TP
B. PPPoE Type D. L2TP
4. In order to share an Internet connection between computers, you will first need
what type of connection (such as cable or DSL) to set up for your primary

22
computer?
A. Broadband Internet Connection C. Topological Network
B. Internet Connection D. Wide Area Network
5. What is the most typical username?
A. Admin C. User
B. Administrator D.12345

ANSWERS KEY

PRE - TEST ACTIVITY 1 ACTIVITY 2 ACTIVITY 3


1. C 1. IP ADDRESS 1. E 1. C
2. A 2. Router 2. B 2. A
3. D 3. WPA2-PSK 3. D 3. B
4. A
5. A
POST TEST ACTIVITY 4
1. B 4. True
2. C 5. True
3. A 6. False
4. A
5. A

23
REFERENCES:

Online references
https://www.digitalcitizen.life/ways-start-system-configuration-windows
Codrut Neagu published on 05/10/2018

https://www.dell.com/support/article/en-ph/sln151689/what-does-the-msconfig-
utility-do-in-windows-8-8-1-and-10-on-your-dell-pc?lang=en#What-is-MSConfig

https://fossbytes.com/create-bootable-usb-media-rufus-install-windows-linux/ on
October 29, 2018

https://www.techfleece.com/2015/07/08/how-to-create-a-bootable-windows-usb-
drive-using-rufus/ on October 29, 2018

24

You might also like