3rd Grading - CSS LAS 11-5-8
3rd Grading - CSS LAS 11-5-8
TECHNOLOGY AND
LIVELIHOOD EDUCATION
COMPUTER SYSTEM
SERVICING
Quarter 3 – Week 5-8
Learning Activity Sheets (LAS)
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use
these materials from their respective copyright owners. The publisher and
authors do not represent nor claim ownership over them.
2
1. Configure Network Interface Card (NIC) in accordance with the network
design
Code: TLE_IACSS9-12ICSS-IIa-j-34
________1. Protective Eyewear enclose or protect the nose area in order to prevent
particulates, infectious fluids, or chemicals
________2. Uni-tester is an electronic device for measuring instrument that
combines several measurement and functions
________3. Fliers are hand tool used to hold objects firmly for bending or physical
compression
________4. A screw is a tool for driving screws and often rotating other machine
elements with the mating drive system
________5. A Soldering Gun is a tool for soldering metals using tin-based solder to
achieve a highly conductive contact.
LEARNING OBJECTIVES: After reading this Information Sheet, you should be able to:
1. Identify the different tools and equipment used in computer systems and networks
2. Determine the different use and functions of these tools and equipment’s TOOLS
AND EQUIPMENTS One important thing to consider before executing a well-planned
computer installation is that one must be knowledgeable in the different tools and
equipment’s used in computer systems and networks. Furthermore, the idea on how
these tools and equipment’s are properly used is another important consideration in
installing computer systems.
3
Pliers is a hand tool used to hold objects firmly, for
bending, or physical compression.
Screwdriver
Desoldering Tool
Allen Wrench
A hex key, Allen key, or Allen wrench (also known by
various other synonyms) is a tool of hexagonal cross-
section used to drive bolts and screws that have a
hexagonal socket in the head (internalwrenching
hexagon drive)
Flashlight
A flashlight (or torch in British English) is a hand-held
portable electric-powered light source. Usually the light
source is a small incandescent light bulb or light-
emitting diode (LED)
IC Insertion and Extraction Tool
Mirror
In hardware servicing a mirror is used for inspecting the
peripherals
Tweezers
Tweezers are tools used for picking up objects too small
to be easily handled with the human hands
4
Gloves
Crimping Tool
A crimping tool is a tool designed to crimp or connect a
connector to the end of a cable. For example, network
cables and phone cables are created using a crimping
tool to connect the RJ-45 and RJ11 connectors to the
end of the cable. In the picture to the right, is an
example of what a crimping tool looks like. This example
shows a tool capable of crimping both RJ-11 and RJ-45
connectors.
LAN Tester
RJ 45 Connector
A plastic connector used for UTP Cable to connect
computers in a network
Ethernet Switch
A network switch or switching hub is a computer
networking device that connects network segments or
5
network devices
ACTIVITY 1: IDENTIFICATION
Direction : Identify what is being ask, write on the space provided.
ACTIVITY 2: e-Connect!
DIRECTIONS: Match Column A with Column B. Connect the correct answer from
column A to Column B.
COLUMN A COLUMN B
1. Application A. are garments for covering and
2. Plastic Connector protecting the whole hand.
3. Gloves B. It is used to install the device and
peripherals of a computer
systems and networks.
C. used for UTP Cable to connect
computers in a network.
D. tools used for picking up objects
too small to be easily handled with
the human hands.
Directions: Read and understand the statement and encircle the correct answer.
6
______2. UTP Unshielded Twisted Pair Cat 5 Cable is a cable used for printer
connector.
______3. Desoldering tools are used for removing the molten solder so that the joint
may be separated.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
POST TEST:
DIRECTIONS: State your agreement or disagreement with the statement below.
Write True if you agree and False if you disagree.
________1. Protective Eyewear enclose or protect the nose area in order to prevent
particulates, infectious fluids, or chemicals
________2. Uni-tester is an electronic device for measuring instrument that
combines several measurement and functions
________3. A Soldering Gun is a tool for soldering metals using tin-based solder to
achieve a highly conductive contact.
________4. Fliers are hand tool used to hold objects firmly for bending or physical
compression
________5. A screw is a tool for driving screws and often rotating other machine
elements with the mating drive system
ANSWERS KEY
PRE - TEST
1. FALSE
2. FALSE ACTIVITY 1 ACTIVITY 3
3. FALSE 1. Operating System 1. B
4. FALSE 2. Computer 2. C
5. TRUE 3. Printer 3. A
POST TEST
1. FALSE
ACTIVITY 2 ACTIVITY 4
2. FALSE
1. B 1. False
3. TRUE
2. C 2. False
4. FALSE 3. True
3. A
5. FALSE
Set router/Wi-fi/wireless access point/repeater
WEEK 6-8
configuration
7
Objectives: Configuring Wide Area Network (ACCESS POINT)
Code: TLE_IACSS9-12ICSS-IIa-j-35
________1. A firewall is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
________2. Running a firewall on each PC on your network won't help control the
spread of malicious software on your network.
________3. In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules.
________4. In setting up Time, you cannot set time automatically.
________5. In setting up the Time Zone, you could use "Philippines" for the setting.
8
192.168.0.254. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and password.
4. Repeat the step shown on Configuring your Router. a. Go to Network Tab. Change
your IP address. Click Save then it will reboot. b. Go to DHCP tab and click Disable
Button. c. Unlike on Router we need to set up Wireless Tab on Modem. Click
Wireless Tab. Click on WPA/WPA2 – Personal (Recommended) then enter your
desired PSK Password. It must consist of alphanumeric characters. The browser
will reboot.
2. Setting up the modem and Internet connection After you have all the equipment,
you'll need to set up your modem and Internet connection. If your modem wasn't set
up for you by your Internet service provider (ISP), follow the instructions that came
with your modem to connect it to your PC and the Internet. If you're using Digital
Subscriber Line (DSL), connect your modem to a phone jack. If you’re using cable,
connect your modem to a cable jack.
3. Positioning the wireless router Put your wireless router somewhere where it will
receive the strongest signal with the least amount of interference. For better results,
follow these tips:
a. Place your wireless router in a central location. Place the router as close to the
center of your home as possible to increase the strength of the wireless signal
throughout your home.
b. Position the wireless router off the floor and away from walls and metal objects,
such as metal file cabinets. The fewer physical obstructions between your PC and
the router's signal, the more likely that you'll be using the router's full signal
strength. Securing your wireless network Security is always important; with a
9
wireless network, it's even more important because your network's signal could
be broadcast outside your home. If you
The Windows Firewall with Advanced Security is a tool which gives you detailed control
over the rules that are applied by the Windows Firewall. You can view all the rules that
are used by the Windows Firewall, change their properties, create new rules or disable
existing ones. In this tutorial we will share how to open the Windows Firewall with
Advanced Security, how to find your way around it and talk about the types of rules
that are available and what kind of traffic they filter. A firewall is hardware or software
that can help protect your PC from unauthorized users or malicious software
(malware). Running a firewall on each PC on your network can help control the spread
of malicious software on your network and help protect your PCs when you're
accessing the Internet. Windows Firewall is included with this version of Windows.
1. One is to open the standard Windows Firewall window, by going to "Control Panel -
> System and Security -> Windows Firewall". Then, click or tap Advanced settings.
2. In Windows 7, another method is to search for the word firewall in the Start
Menu search box and click the "Windows Firewall with Advanced Security"
result.
3. In Windows 8.1, Windows Firewall with Advanced Security is not returned
in search results and you need to use the first method shared above for
opening it.
4. The Windows Firewall with Advanced Security looks and works the same
both in Windows 7 and Windows 8.1. To continue our tutorial, we will use
screenshots that were made in Windows 8.1.
5. What Are The Inbound & Outbound Rules?
a. In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules, which are enabled
depending on the location of the network you are connected to.
b. Inbound rules are applied to the traffic that is coming from the network
and the Internet to your computer or device. Outbound rules apply to the
traffic from your computer to the network or the Internet.
c. These rules can be configured so that they are specific to: computers,
users, programs, services, ports or protocols. You can also specify to
10
which type of network adapter (e.g. wireless, cable, virtual private
network) or user profile it is applied to.
d. In the Windows Firewall with Advanced Security, you can access all rules
and edit their properties. All you have to do is click or tap the appropriate
section in the left-side panel.
6. The rules used by the Windows Firewall can be enabled or disabled. The
ones which are enabled or active are marked with a green check-box in the
Name column. The ones that are disabled are marked with a gray check-
box.
7. If you want to know more about a specific rule and learn its properties,
right click on it and select Properties or select it and press Properties in the
column on right, which lists the actions that are available for your selection.
8. In the Properties window, you will find complete information about the
selected rule, what it does and in when it is applied. You will also be able to
edit its properties and change any of the available parameters.
9. What Are The Connection Security Rules?
a. Connection security rules are used to secure traffic between two
computers while it crosses the network. One example would be a rule
which defines that connections between two specific computers must be
encrypted
b. Unlike the inbound or outbound rules, which are applied only to one
computer, connection security rules require that both computers have
the same rules defined and enabled.
c. If you want to see if there are any such rules on your computer, click or
tap "Connection Security Rules"on the panel on the left. By default, there
are no such rules defined on Windows computers and devices. They are
generally used in business environments and such rules are set by the
network administrator.
10. What Does the Windows Firewall with Advanced Security Monitor? The
Windows Firewall with Advanced Security includes some monitoring
features as well. In the Monitoring section you can find the following
information: the firewall rules that are active (both inbound and outbound),
the connection security rules that are active and whether there are any
active security associations.
11. You should note that the Monitoring section shows only the active rules
for the current network location. If there are rules which get enabled for
other network locations, you will not see them in this section.
ACTIVITY 1: IDENTIFICATION
Direction : Identify what is being ask, write on the space provided.
__________2. Is a device that sends, receives, and translates information from the internet and makes it available
within the Local Area Network
__________3. Are networking hardware used to connect one network device to other network devices or to
connect two or more computers to share printers, scanners etc.
__________4. Is a way stations that control the traffic of data within a network, assigns a unique IP Address to
each computer.
11
ACTIVITY 2: e-Connect!
DIRECTIONS: Match Column A with Column B. Connect the correct answer from
column A to Column B.
COLUMN A COLUMN B
1. A firewall is hardware or software that A. Connection Security Rules
can help protect your PC from B. Inbound Rules
unauthorized users or malicious C. Firewall
software (malware). D. Fixed Wireless Technology
E. Monitoring Section
2. Applied to the traffic that is coming
from the network and the Internet to
your computer or device.
3. Monitoring section shows only the
active rules for the current network
location.
Directions: Read and understand the statement and encircle the correct answer.
1. __________ has a standard set of Inbound and outbound rules in order to provide
the security you need.
A. Monitoring Section C. Properties Windows
B. Network Administrator D. Wireless Firewall
2. ___________is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
A. Advanced Security C. Fixed Wireless Technology
B. Firewall D. Wide Area Network
3. Wireless networking is a method by which homes, telecommunications networks
and business installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations
A. Configuring Wireless C. Network
B. Fixed Wireless Technology D. Wireless Networking
______2. On Windows 10 OS, to set up the Time and Date go to the upper left of your taskbar.
______3. Setting up your Computer Name is important. This will serve as the Identity of your computer.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
12
_____________________________________________________________________________________
____________________________________________________________________________________
________1. A firewall is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
________2. In setting up Time, you cannot set time automatically.
________3. Running a firewall on each PC on your network won't help control the
spread of malicious software on your network.
________4. In setting up the Time Zone, you could use "Philippines" for the setting.
________5. In order to provide the security you need, the Windows Firewall has a
standard set of inbound and outbound rules.
ANSWERS KEY
13
WEEK 4 Set network configuration
Code: TLE_IACSS9-12ICSS-IIa-j-34
14
PRE - TEST: Multiple Choice
Directions: Read and understand the statement and encircle the correct answer.
A local-area network (LAN) is a computer network that spans a relatively small area.
Most LANs are confined to a single building or group of buildings, however, one LAN
can be connected to other LANs over any distance via telephone lines and radio waves
A LAN, or local area network, is a great way to share files and devices between multiple
computers. If you have several computers in your home, setting up a network will
allow you to share an Internet connection, data, printers, and other devices between
your computers - all without wires. Fortunately, the process is simple, and you can
learn how to set up a LAN in your home by following a few easy steps.
Steps 1: Assess your needs in a network. The devices you use to set your network
up will determine your network's capabilities. You should address your needs in terms
of cost, security, connection speed, expandability (adding more computers or devices
later) and distance between computers. In general, you will need to keep all the
computers in the network within 100 yards (91 m) of each other.
Step 2 Ensure that your computers have wireless networking cards installed. In
order to communicate wirelessly with other computers in the network, each computer
15
must have a wireless networking card. If your computers are only a few years old, you
are almost guaranteed to already have one built-in, as this is a standard feature on all
computers being produced today. If you have an older computer, you may need to
purchase and install a networking card.
Step 3 Set up an Internet connection. While LANs can be set up simply to share files
between computers without Internet connectivity, there is little benefit to doing so
considering the cost of wiring the entire network. To share an Internet connection
between computers, you will first need a broadband Internet connection (such as cable
or DSL) set up for your primary computer. Contact a local Internet service provider
(ISP) to establish a connection if you don't already have one.
Step 4 Purchase a wireless router. You will need to broadcast your Internet
connection wirelessly, and for this, you need a router. When buying a router, make
sure you get one that is designed for your connection type (cable, DSL, etc.). You
should also consider the strength of the router's signal. The packaging will describe
how far you can expect the router's signal to broadcast. It will need to reach every
computer in your network.
Step 5 Install the router. To install the router, run your main Ethernet cable (the one
used for connecting your primary computer to the Internet) from your modem into the
router. Plug the router's power cord in, and then install any software that it came with
on each computer in the network. When you are finished, the router should begin
broadcasting your Internet connection wirelessly.
Step 6 Connect each computer to the wireless network. On each computer, find
the wireless network's name that you assigned during the software installation.
Connect to that network using the password that you created.
16
Step 7 Share files over the network. To make files on 1 computer accessible to users
on other computers, you must mark them as shared. In Windows, you can do this by
placing the files in the "Shared Documents" folder or by right-clicking on each file and
checking "Share this file" in the "Properties" menu. The process will differ slightly for
other operating systems.
Step 9 To check connectivity of the computers in the network run the command
prompt. Type the command ping (ipaddress of the computer to be checked) –t. Youu will
see the figure below if your ping was successful.
STEP 1 Purchase a wireless router. Routers come in all shapes and sizes. Compare
features to find the router that is right for you. If you have more area that you need to
cover, or have lots of walls in your home, you’ll need a router that offers the option of
upgrading antenna(s) with high gain types - if not supplied in the box. If more than one
wireless device will be connecting at the same time at different speeds, a MiMo type
router is recommended, otherwise the speed for all devices will drop the highest
supported by all at that time.
17
All modern routers should support 802.11n, or Wireless-N). This is the most
stable, offers the fastest speeds and is backwards compatible with older
standards such as 802.11g.
STEP 2 Connect your router to your modem. Routers and wireless routers enable
you to share your broadband internet connection with multiple devices. To do so, you
will need to connect your broadband modem to the router. For best results, place your
router near your modem.
Connect the router and the modem with an Ethernet cable. Most routers come
packaged with a short Ethernet cable that you can use for this.
Connect the modem to the WAN/Internet port on your router. It is usually
offset, and may be a different color from the LAN ports
STEP 3 Connect any devices you want to hard wire with CAT 5 (or better)
Ethernet cables. If you have computers that are close, or a video game console or TV,
you can connect them to the router via Ethernet. This will result in a more stable and
faster connection, and doesn’t require any extra configuration.
STEP 4 Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings. You
can disconnect this computer afterwards if you want to connect wirelessly
STEP 5 Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the router or
in the documentation. If you can’t find the router’s IP address anywhere, you can do a
web search for the router model to see what the default address is.
STEP 6 Open a web browser on the computer that is connected to the router.
Enter in the IP address of the router into the address bar and press Enter. Your
browser will attempt to connect to the router’s configuration menu.
If your router came with an installation disc, you can run the configuration
program from that instead. It will accomplish many of the same functions.
18
STEP 7 Enter your username and password. In order to access the configuration
page, you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will need
to use to log on. This varies from model to model, but should be printed on the router
or in the documentation.
STEP 8 Open the Wireless Settings. When you log in to your router, you will be
taken to the router’s main menu or status screen. There will be several options to
choose from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless section
will allow you to set up your wireless network.
STEP 9 Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network. This
is what other devices will see when scanning for networks.
Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the signal.
*See the Tips section below for additional information on the SSID setting
19
STEP 10 Choose a security method. Choose from the list of available security
options. For the best security, choose WPA2-PSK as the encryption method. This is the
most difficult security to crack, and will give you the most protection from hackers and
intruders.
STEP 11 Create a passphrase. Once you’ve chosen your security method, enter in a
passphrase for the network. This should be a difficult password, with a combination of
letters, numbers, and symbols. Don’t use any passwords that could be easily deduced
from your network name or from knowing you.
STEP 12 save your settings. Once you are finished naming and securing your
wireless network, click the Apply or Save button. The changes will be applied to your
router, which may take a few moments. Once the router has finished resetting, your
wireless network will be enabled.
STEP 13 Change your router’s username and password from the default. Once you
have your network configured, you should change the username and password that
you use to access your router. This will help protect your router from unauthorized
changes. You can change these from the Administration section of the router
configuration menu.[2]
STEP 14 Block sites. If you want to prevent devices that are connected to your
network from accessing certain websites, you can use built-in blocking tools to restrict
access. These can be found in the Security/Block section of the router.
20
ACTIVITY 1: IDENTIFICATION
Direction : Identify what is being ask, write on the space provided.
__________3. This is the most difficult security to crack and will give you the most
protection from hackers and intruders.
ACTIVITY 2: e-Connect!
DIRECTIONS: Match Column A with Column B. Connect the correct answer from
column A to Column B.
COLUMN A COLUMN B
1. What are the default IP address? A. Broadband
2. What do you call the device that once you B. Ethernet
will connect, it will result in a more stable C. Monitoring Section
and faster connection, and doesn’t require D. Router
any extra configuration? E. 192.168.1.1
Directions: Read and understand the statement and encircle the correct answer.
1. __________ can be set up simply to share files between computers without Internet
connectivity, there is little benefit to doing so considering the cost of wiring the
entire network.
A. Devices C. LANs
B. Network Administrator D. WAN
2. ___________ If you want to prevent devices that are connected to your network from
accessing certain websites
A. Block Sites C. Security Methods
B. Firewall D. Wide Area Network
3. ___________is a computer network that spans a relatively small area.
A. Configuring Wireless C. Network
B. Local Area Network D. Wireless Networking
21
ACTIVITY 4: True or False !
______1. Once you have your network configured, you should change the username
and password that you use to access your router. This will help protect your
router from unauthorized changes.
______2. If you have computers that are close, or a video game console or TV, you can
connect them to the router via Ethernet.
______3. If your router came with an installation disc, you cannot run the configuration
program from that instead. It will accomplish many of the same functions.
Reflection: Is it important to Change your router’s username and password from the
default? Why ?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
22
computer?
A. Broadband Internet Connection C. Topological Network
B. Internet Connection D. Wide Area Network
5. What is the most typical username?
A. Admin C. User
B. Administrator D.12345
ANSWERS KEY
23
REFERENCES:
Online references
https://www.digitalcitizen.life/ways-start-system-configuration-windows
Codrut Neagu published on 05/10/2018
https://www.dell.com/support/article/en-ph/sln151689/what-does-the-msconfig-
utility-do-in-windows-8-8-1-and-10-on-your-dell-pc?lang=en#What-is-MSConfig
https://fossbytes.com/create-bootable-usb-media-rufus-install-windows-linux/ on
October 29, 2018
https://www.techfleece.com/2015/07/08/how-to-create-a-bootable-windows-usb-
drive-using-rufus/ on October 29, 2018
24