0% found this document useful (0 votes)
80 views32 pages

Tle10 Ict Chs q2 Week 1-4 Module

This document provides information about a weekly home learning plan for a TVL Computer System Servicing 10 course covering configure computer system and network topics over 4 weeks. The plan outlines daily learning tasks and activities that students should complete, including answering pre-test and post-test questions, reading lesson materials, watching instructional videos, completing puzzles and worksheets, and performing hands-on configuration activities while following safety precautions.

Uploaded by

gerlie22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views32 pages

Tle10 Ict Chs q2 Week 1-4 Module

This document provides information about a weekly home learning plan for a TVL Computer System Servicing 10 course covering configure computer system and network topics over 4 weeks. The plan outlines daily learning tasks and activities that students should complete, including answering pre-test and post-test questions, reading lesson materials, watching instructional videos, completing puzzles and worksheets, and performing hands-on configuration activities while following safety precautions.

Uploaded by

gerlie22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

NOT

10
Technology and
Livelihood Education
Quarter 2 - Module 1 & 2
Week 1 to 4
Information and Communication
Technology (ICT)
Computer Servicing System (CSS)
Configure Computer System and Network

Note: Write your answer in a yellow pad paper.


DO NOT WRITE ANYTHING IN THIS MODULE.
TVL - COMPUTER SYSTEM SERVICING 10
WEEKLY HOME LEARNING PLAN
QUARTER 2 - SET B
WEEK 1 to 4
MODE OF
DAY & TIME LEARNING TASKS
DELIVERY
WEDNESDA A. ACTIVITIES (LESSON 1) For digitized
Y 1. Answer What I know(Pre-Test) modular,
-Matching Type. Write your answer on your activity/ lecture notebook. send outputs
10:00 AM- to Google
2. Read What Is It - Read the topic carefully. Using your printed module, computer/ PC
12:00 PM classroom/
(if available), follow the instruction as indicated to be familiarized and be immersed on
1:00 PM - Facebook
3:00 PM the topic about Configure Computer System and Network
account/
3. What’s More - Criss-Cross Puzzle. Directions: Complete the criss-cross puzzle messenger
and familiarize yourself of the cables being described. Write your answer in a clean as agreed/
sheet of paper. provided by
LEARNING 4. Answer What I Have Learned. Given the following links, watch the videos and the teacher
AREAS answer the questions that follows. Write your answer in a clean sheet of paper. or any other
5. Perform What I Can Do – Create your own Ethernet Cable platform
Configure
Directions: Prepare the following tools and materials in fabricating your own cross- recommende
Computer
over and straight-through cables. Just keep your output by yourselves and wait for d by the
System and
the time when it will be submitted. school.
Networks

B. ACTIVITIES (LESSON 2) For printed


LEARNING modular,
1. Answer What I know(Pre-Test)- ACRONYMS. Direction: Give the complete
COMPETEN have your
CY meaning of the following acronyms. Write your answer in your lecture notebook.
parent/
2. Read What Is It - Read the topic carefully. Using your printed module, computer/ PC
guardian
Configure (if available), follow the instruction as indicated to be familiarized and be immersed on
hand-in the
Computer the topic about Assigning IP address to clients and servers;
`
output/s to
System and 5. Answer What I Have Learned– Answer the essential questions below based on the teacher in
Network the video presentations you had watched. Write your answer in a clean sheet of school/
paper. designated
 Inspect distribution
6. Perform What I Can Do – Task 1: Configure an Ethernet NIC to use DHCP.
networking area.
devices Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address. You
and need to follow the procedures given below and apply safety precautions in
connectors; accomplishing this task. While doing the activity, you have to answer activity
 Create a questions written after every step. Write your answer in a clean sheet of paper.
cross-over Task 2: Configure Wireless Router. Directions: Configure and test the wireless
and settings on the LinksysWRT300N (or any available router).
Straight- 7. Answer Assessment– Choose the letter of the correct answer and write in a clean
through sheet of paper.
Ethernet
cables.
 Assign IP
address to
clients and
servers;

3:00- 5:00 PM

Prepared by:
CHITO A. FLORENOSOS
Lesson 2. Configure Computer System and Network

What I Need to Know

After going through this lesson, you are expected to:


 Inspect networking devices and connectors;
 Create a cross-over and Straight-through Ethernet cables

What I Know

Directions: Choose the letter of the correct answer. Write the chosen letter in your lecture notebook.

Test I. Matching Type


Direction: Match Column A with Column B.

Column A Column B
1. Copper cabling used for telephone communication a. Crimping tool
2. Standard Ethernet cable b. Cross- over
3. Cable that has a very thin core c. Fiber- optic
4. Cable that has a thicker core d. Ipconfig
5. Tool used for crimping RJ45 e. Multi- mode
6. Connector for Cat 5e cable f. Ping
7. Set of rules 8. Indicates the network portion of an IP address g. Protocol
9. Command used find out the ip address h. RJ45
10. Glass or plastic conductor i. Single- mode
j. Straight-through
k. Subnet mask
l. Twisted pair

What’s In

In previous lesson, you familiarized Accessing and using Microsoft System Configuration,
Accessing and using Registry Editor, and Accessing and Using Direct X Diagnostic.

What Is It

Lesson 2. Configure Computer System and Network

System Configuration is the way a system is set up, it is the collection of components that make up
the system. Configuration can refer to either hardware or software, or the combination of both. For instance,
a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a
modem, a CD-ROM drive, a VGA monitor, and the Windows Operating System.
Many software products require that the computer has a certain minimum configuration. For
example, the software might require a graphics display monitor and a video adapter, a particular
microprocessor, and a minimum amount of main memory capacity.
When you install a new device or program, you sometimes need to configure it, which means that
you need to set various switches and jumpers (for hardware) and to define values of parameters (for
software). For example, the device or program may need to know what type of video adapter you have and
what type of printer is connected to the computer. Thanks to technological advancements, such as plug-
and-play, much of this configuration is now performed automatically.

Safety Precautions Related to Networks

Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be
pulled through ceilings and walls where there are obstacles or toxic materials. You should wear clothing
such as long pants, a long-sleeved shirt, sturdy shoes that cover your feet, and gloves to protect you from
those toxic materials. Most importantly, wear safety glasses. If possible, ask building management, or
someone responsible for the building, if there are any dangerous materials or obstacles that you need to be
aware of before entering the ceiling area.
Safety precautions when using a ladder:

• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance and fall.
• Make sure that people in the area know you will be working there.
• Cordon off the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions written on the
ladder, and have someone hold the ladder to help keep it steady.

Safety rules when working with cables:

The tools required to install copper and fiber-optic cable may cause danger through improper use.
When working with cables, strictly follow these safety rules:
• Make sure that the tools you are using are in good working condition.
• Watch what you are doing, and take your time. Make sure that you do not cut yourself or place
anyone in danger.
• Always wear safety glasses when cutting, stripping, or splicing cables of any kind. Tiny fragments
can injure your eyes.
• Wear gloves whenever possible, and dispose any waste properly.
Use common sense when installing cables and fixing network problems. Call for assistance for tasks
that you cannot do on your own.

Fiber-Optic Safety

Fiber-optic cables are useful for communications, but they have certain hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Specific types of tools and chemicals are used when working with fiber-optic cable. These materials
must be handled with care.

Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle them with extreme
care. Read the instructions on the label, and follow them carefully. Also, read the material safety data sheet
(MSDS) that accompanies the chemicals to know how to treat someone in case of emergency.

Tools
When working with any tool, safety should always be your first priority. Any compromise in safety
could result in serious injury or even death. The tools used for working with fiber optics have sharp cutting
surfaces that are used to scribe glass. Other tools pinch cables with high pressure to fasten connectors to
them. These tools can produce shards of glass that can splinter and fly into the air. You must avoid getting
them on your skin and in your mouth or eyes.

Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of
glass or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be extremely
difficult to see on your skin because they are clear and small. When you work with fiber-optic cabling, the
working surface should be a dark mat so that you can see the tiny glass or plastic fragments. The mat should
also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiber-optic fragments with your fingers.
Use tape to pick up small fragments, and dispose them off properly. Use a disposable container, such as a
plastic bottle with a screw-on lid, to store fiber fragments. Close the lid tightly before disposing the container.

Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color
that humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier to
inspect fiber-optic cable and connectors, the light emitted from the fiber could be directed into your eyes.
When working with fiber, be sure to disconnect the light source. Use special detectors to help you tell if a
fiber is energized.

Caution: Obtain proper training before you attempt to cut, strip, or splice fiber-optic cable. An
experienced technician should supervise you until you become adequately skilled.
Networking Devices, Media and Connector
To make data transmission more extensible and efficient than a simple peer-to-peer network,
network designers use specialized network devices such as hubs, switches, routers, and wireless access
points to send data between devices. You have already discussed in your Grade 9 CHS class the different
devices used in networking and which provides you the knowledge on the common networking cables that
are essential in putting up a network.

Common Network Cables


Until recently, cables were the only medium used to connect devices on networks. A wide variety of
networking cables are available. Coaxial and twisted-pair cables use copper to transmit data. Fiber-optic
cables use glass or plastic to transmit data. These cables differ in bandwidth, size, and cost.
You need to know what type of cable to use based on the job requirements. You also need to be able to
troubleshoot and repair problems along the way.

Twisted Pair
Twisted pair is a type of copper
cabling that is used for telephone
communications and most Ethernet
networks. A pair of wires forms a circuit that
transmits data. The pair is twisted to provide
protection against crosstalk, the noise
generated by adjacent pairs of wires in the
cable. Pairs of copper wires are encased in
color-coded plastic insulation and are twisted
Source: www.lanshack.com
together. An outer jacket protects the bundles
of twisted pairs. Figure 3 9 . UTP and STP Cable

When electricity flows through a copper wire, a magnetic field is created around the wire. A circuit
has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When the two wires
of the circuit are next to each other, the magnetic fields cancel each other out. This is called the cancellation
effect. Without the cancellation effect, your network communications become slow because of the
interference caused by the magnetic fields.

The two basic types of twisted-pair cables are as follows:


• Unshielded twisted pair (UTP) is the cable that has two or four pairs of wires. This type of cable
relies solely on the cancellation effect produced by the twisted-wire pairs that limits signal
degradation caused by electromagnetic interface (EMI) and radio frequency interference (RFI). UTP
is the most commonly used cabling in networks. UTP cables have a range of 328 feet (100 m).

• With shielded twisted pair (STP), each pair of wire is wrapped in metallic foil to better shield the
wires from noise. Four pairs of wires are then wrapped in an overall metallic braid or foil. STP
reduces electrical noise from within the cable. It also reduces EMI and RFI from outside the cable.
Although STP prevents interference better than UTP, STP is more expensive because of the extra
shielding. It is also more difficult to install because of the thickness. In addition, the metallic shielding
must be grounded at both ends. If it is improperly grounded, the shield acts like an antenna, picking
up unwanted signals.

Category Rating
UTP comes in several categories that are based on two factors:
• The number of wires in the cable
• The number of twists in those wires

1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Megabyte per second
(Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.

These extra twists further prevent interference from outside sources and from the other wires within
the cable.
Some Category 6 cables use a plastic divider to separate the pairs of wires, which prevents
interference. The pairs also have more twists than Category 5e cable.
Coaxial Cable

Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is used to
connect the computers to the rest of the network.

Coaxial cable uses “British Naval Connectors


(BNC)” or “Bayonet Neill-Concelman” connectors, at the
ends of the cables to make the connection. Several types of
coaxial cable exist:
• Thicknet (10BASE5) is a coaxial cable used in networks
operating at 10 Mbps, with a maximum length of 500 meters.
• Thinnet (10BASE2) is a coaxial cable used in networks
operating at 10 Mbps, with a maximum length of 185 meters.
• RG-59 is most commonly used for cable television in the
U.S.
Source: www. phoneam .com • RG-6 is higher-quality cable than RG-59, with more
bandwidth and less susceptibility to interference.

Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information using light. Fiber optic cable
has one or more optical fibers enclosed in a sheath or jacket. Because it is made of glass, fiber-optic cable
is not affected by EMI or RFI. All signals are converted to light pulses to enter the cable and are converted
back into electrical signals when they leave it. This means that fiber-optic cable can deliver signals that are
clearer, and can go farther, without compromising the clarity of signals.

Fiber-optic cable can reach distances of


several miles or kilometers before the signal needs
to be regenerated. Fiber-optic cable usually is more
expensive to use than copper cable, and the
connectors are more costly and harder to assemble.
Common connectors for fiber-optic networks are
SC, ST, and LC. These three types of fiber-optic
connectors are half-duplex, which allows data to
flow in only one direction. Therefore, two cables are
needed.
Source: www.picstopin.com
Figure 41. Fiber Optic Cable

These are the two types of glass fiber-optic cable:


• Multimode is the cable that has a thicker core than single-mode cable. It is easier to make, can
use simpler light sources such as Light Emitting Diodes (LEDs), and works well over distances
of a few kilometers or less.
• Single-mode is the cable that has a very thin core. It is harder to make, uses lasers as a light
source, and can transmit signals dozens of kilometers with ease.
Creating Ethernet Cable

Ethernet cabling has been the standard in networking installation for years. It is the fastest way of
connecting PC to a peer or to your router or a central switch. This section of the module will bring you back
to the procedures in creating an Ethernet cable specifically straight-through and cross-over. Try to recall the
procedures as you go on with the lesson.

Fabricating an Ethernet Cross-over and Straight-through Cable

In an Ethernet networking environment – like in a home or an office with multiple PCs that are wired
– the computers need to be connected to a central router to allow data transfer. The router takes all the bits
being sent out by the computers and relays them onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a PC to a network hub
and router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network devices directly, without
the need for a router in the middle. It simply reverses some of the pins so that the output on one computer
is being sent to the input of another.
Bear in mind that safety precautions must always be applied and observed during the fabrication of
the said cables. Also, materials and tools to be used must always be complete and functional to save time,
money and effort.

The following items are the materials and tools used for making Ethernet cables:
Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
RJ45 crimpable connectors for Cat5e;
RJ45 Crimping tool;
Wire cutter, stripper or pliers; and

Cable Fabrication Procedures

Cross-Over Straight-Through

Figure 42. Cross-Over and Straight-Through Color Coding

The picture below will serve as your guide in making the two important Ethernet cables.

1. Cut into the plastic sheath 1 inch from the end of the cut
cable. The crimping tool has a razor blade that will do the
trick with practice.

2. Unwind and pair the similar colors.


Figure 43. Step 1

Figure 44. Step 2


3. Pinch the wires between your fingers and straighten them
out as shown. The color order is important to do this
correctly.

Figure 45. Step 3

4. Use wire cutter to make a straight cut across the wires 1/2
inch from the cut sleeve to the end of the wires.

5. Push the wires into the connector. Each wire fits into a slot
in the RJ45 connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.

Figure 46. Step 5


6. Take view from the top. Make sure the wires are all the way in.
There should be no short wires.

Figure 47. Step 6

7. Crimping the Cable – carefully place the connector into the


Ethernet Crimper and cinch down on the handles tightly. The
copper splicing tabs on the connector will pierce into each of the
eight wires. There is also a locking tab that holds the blue plastic
sleeve in place for a tight compression fit. When you remove the
cable from the crimper, that end is ready to use.

Figure 48. Step 7

8. For a standard "Straight-Through" cable, repeat all steps and


wire color order on the other end of cable. For a cross-over cable -
the other end will have a different color order as shown by the
crossover picture on page 84.

9. Make sure to test the cables before installing them. An


inexpensive Ethernet cable tester does this quite well.
Figure 49. Step 9
What’s More

Criss-Cross Puzzle
Directions: Complete the criss-cross puzzle and familiarize yourself of the cables being
described. Write your answer in a clean sheet of paper.

Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable

What I Have Learned

Now that you are equipped with the knowledge on the different cables used in networking, you
also need to know that fiber technologies and connectors have changed through the years. In these
videos, you will learn about the different fiber connectors, copper connectors and their characteristics. To
watch the video presentations just type in the following URL:

1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/

3. http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/

I hope you learned a lot from the video presentations. After watching the videos, answer the following
guide questions and submit it to your teacher. Write your answer in a clean sheet of paper. Good
Luck!

Here are the questions:


1. What are the different types of fiber connectors? Cite their advantages and disadvantages.
_____________________________________________________________________________________
_____________________________________________________________________________________
__________________________________________.
2. List down the different types of connectors.
_____________________________________________________________________________________
_____________________________________________________________________________________
__________________________________________.
3. What are the characteristics of UTP, STP and coaxial cable?
_____________________________________________________________________________________
_____________________________________________________________________________________
__________________________________________.
What I Can Do
Create your own Ethernet Cable
Directions: Prepare the following tools and materials in fabricating your own cross-over and
straight-through cables. Just keep your output by yourselves and wait for the time when it will be submitted.
Materials:
-standard wire for cabling;

Tools:

tripper or pliers; and

Reminder / Caution: Be careful when using the tools. Follow the procedures cited in this module and
apply the safety precautions to avoid injury or any unwanted incident. You will be given 30 minutes to
complete the task. You will be rated using the performance rubrics found on the next page.

Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a razor blade that
will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as shown on page 90. The color order is
important to do this correctly.
4. Use scissors to make a straight cut across the wires 1/2 inch from the cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic shielding. Also note how the wires
go all the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There should be no short wires.
7. In crimping the cable – carefully place the connector into the Ethernet Crimper and cinch down on the
handles tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight compression fit. When you remove
the cable from the crimper, that end is ready to use.
8. For a standard straight-through cable, repeat all steps and wire color order on the other end of cable. For
a cross-over cable, the other end will have a different color order as shown in the cross-over picture on
page 89.
9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does this quite
well.

Performance Rubrics for Creating a Cross-Over and Straight-Through Ethernet Cables


CRITERIA Excellent Good 3 Fair 2 Poor 1
4
Safety Procedures (15%) –
Applied / manifested safety precautions while working
Adherence to the Procedures (30%) –
Followed the procedures systematically
Workmanship (15%) –
Organized materials and tools while accomplishing the task and
has time management
Quality of Product (40%) –
Produced a fully functional Ethernet Cable
Lesson 2. Configure Computer System and Network

What I Need to Know


Internet Protocols

After going through this lesson, you are expected to:


 Assign IP address to clients and servers;

What I Know

Test I. ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC

What’s In

In previous lesson, you familiarized Inspect networking devices and connectors and create a
cross-over and Straight-through Ethernet cables.

What Is It

Lesson 2. Configure Computer System and Network

Internet Protocols

A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the
protocol specifies where on the envelope the delivery address needs to be written. If the delivery address is
written in the wrong place, the letter cannot be delivered. Internet protocol works in a similar way. Internet
protocols are sets of rules governing communication within and between computers on a network. Protocol
specifications define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to arrive within a certain amount
of time so that computers do not wait indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate alternative actions if the
network does not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked
in layers. These layers depend on the operation of the other layers in the suite to function properly.
The main functions of protocols are:
• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data

To understand how networks and the Internet work, you must be familiar with the commonly used
protocols. These protocols are used to browse the web, send and receive e-mail, and transfer data
files. You will encounter other protocols as your experience in IT grows, but they are not used as
often as the common protocols described here:
• TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of
protocols has become the dominant standard for internetworking. TCP/IP represents a
set of public standards that specify how packets of information are exchanged between
computers over one or more networks.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol
suite originally employed by Novell Corporation’s network operating system, NetWare.
It delivers functions similar to those included in TCP/IP. Novell in its current releases
supports the TCP/IP suite. A large installed base of NetWare networks continues to use
IPX/SPX.
• NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small
Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each
other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving
a few computers directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network administrator the
advantages of the high performance of NetBEUI within the local network and the ability
to communicate beyond the LAN over TCP/IP.

Figure 50. Commonly Used Internet Protocol

• AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers. It is


composed of a comprehensive set of protocols that span the seven layers of the Open
Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed
to run over LocalTalk, which is the Apple LAN physical topology. This protocol is also
designed to run over major LAN types, notably Ethernet and Token Ring.
• HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW). The Internet Engineering Task
Force (IETF) developed the standards for HTTP.
• FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
• SSH: Secure Shell is used to securely connect to a remote computer.
• Telnet: It is an application used to connect to a remote computer that lacks security
features.
• POP3: Post Office Protocol is used to download e-mail from a remote mail server.
• IMAP: Internet Message Access Protocol is also used to download e-mail from a remote
mail server.
• SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
The more you understand about each of these protocols, the more you will understand
how networks and the Internet work.

IP Addressing

An IP address is a number that is used to identify a device on the network. Each device
on a network must have a unique IP address to communicate with other network devices. Network
devices are those that move data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the network) and network device
must have an IP address within the same network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label or address
for the person’s physical aspect—the body. A person’s mailing address, on the other hand, relates
to where the person lives or picks up mail. This address can change. On a host, the Media Access
Control (MAC) address is assigned to the host Network Interface Card (NIC) and is known as the
physical address. The physical address remains the same regardless of where the host is placed
on the network in the same way that fingerprints remain with someone regardless of where he or
she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for humans
to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called
octets. An IP address, even in this grouped format, is hard for humans to read, write, and
remember. Therefore, each octet is presented as its decimal value, separated by a decimal point
or period. This format is called dotted-decimal notation. When a host is configured with an IP
address, it is entered as a dotted-decimal number, such as 192.168.1.5.
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If you mistyped just 1 bit, the address would be different,
and the host may not be able to communicate on the network. The logical 32-bit IP address is
hierarchical and is composed of two parts. The first part identifies the network, and the second part
identifies a host on that network. Both parts are required in an IP address. For example, if a host
has an IP address of 192.168.18.57, the first three octets, 192.168.18, identify the network portion
of the address, and the last octet, 57, identifies the host. This is called hierarchical addressing
because the network portion indicates the network on which each unique host address is located.
Routers only need to know how to reach each network, not the location of each individual host.

Table 6. Five Classes of IP Address

IP Classes Purpose
Class A Used for large networks, implemented by large companies and some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is the network
portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP address are
the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP address
are the network portion

Table 7. Default Subnet Masks for Usable IP Addresses

Class A Network Host

Octet 1 2 3 4
Class B Network Host

Octet 1 2 3 4
Class C Network Host

Octet 1 2 3 4

Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are reserved
for research use only.

IpConfig

Ipconfig is a command used to find out the IP address of a certain network you are
connected to.

How to use the ipconfig command?


1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.

Figure 51. Command Prompt Window


3) Type ipconfig and press enter. The figure below shows the IP configuration window
using the ipconfig command. The information from this window will be useful
because it shows the IP address, subnet mask and default gateway of a network
you are connected to.

Figure 52. IP Configuration in CMD Window

Assigning a static IP Address


In a home network with several computers and devices, it is ideal to assign each of them a
specific address. This is for the purpose of avoiding problems when you do troubleshooting which
requires figuring out the IP address of each of them. It is also a means to prevent address conflicts
between the devices. You can also manage them with ease if you have assigned their own
addresses.
Here are the procedures in assigning an IP Address on a windows base computer
system:

1. Open the Control Panel’s Network Connections icon.


2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).

Figure 53. Wireless Network Connections Properties Dialog Box


5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box
appears.

Figure 54. TCP / IPV4 Dialog Box

6. Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
7. Type a subnet mask. The value used on a local network is commonly 255.255.255.0,
but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type the router’s
address. Figure 54 shows an example of assigning an IP Address, Subnet mask and
default gateway.

Figure 55. Assigning an IP Address


9. Type the address for the preferred DNS server. The address should be obtained from
your Internet Service Protocol. It is used to help your computer find web pages and other
addresses on the internet.
10. Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is something that your
ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows .
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring IP addresses for every host
on the network can be time-consuming and prone to errors. In this case, using a Dynamic Host
Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly
simplify the addressing process.

Figure 56. Assigning a Dynamic IP Address

Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically


assign IP addresses to network devices. This dynamic process eliminates the need to manually
assign IP addresses. A DHCP server can be set up and the hosts can be configured to
automatically obtain an IP address. When a computer is set to obtain an IP address automatically,
the other entire IP addressing configuration boxes are dimmed or disabled. The server maintains
a list of IP addresses to assign, and it manages the process so that every device on the network
receives a unique IP address. Each address is held for a predetermined amount of time. When the
time expires, the DHCP server can use this address for any computer that joins the network.

These are the IP address information that a DHCP server can assign to hosts:
• IP address
• Subnet mask
• Default gateway
• Optional values, such as a Domain Name System (DNS) server address

The DHCP server receives a request from a host. The server then selects IP address
information from a set of predefined addresses that are stored in a database. After the IP address
information is selected, the DHCP server offers these values to the requesting host on the network.
If the host accepts the offer, the DHCP server leases the IP address for a specific period of time.
Using a DHCP server simplifies the administration of a network because the software keeps
track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of assigning
duplicate or invalid IP addresses. Before a computer on the network can take advantage of the
DHCP server services, the computer must be able to identify the server on the local network. You
can configure a computer to accept an IP address from a DHCP server by clicking the Obtain an
IP address automatically option in the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain an IP address, the
Windows operating system automatically assigns a private IP address. If your computer is
assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, it can communicate with
only other computers in the same range. An example of when these private addresses would be
useful is in a classroom lab where you want to prevent access outside to your network. This
operating system feature is called Automatic Private IP Addressing (APIPA). APIPA continually
requests an IP address from a DHCP server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of the source computer
to reach a specified destination computer. The ping command is usually used as a simple way to
verify that a computer can communicate over the network with another computer or network
device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo
Request messages to the destination computer and waiting for a response. How many of those
responses are returned, and how long it takes for them to return, are the two major pieces of
information that the ping command provides.

Table 8. Ping Command Syntax


Syntax Description
-t Using this option will ping the target until you force it to stop using Ctrl-C.
-a - This ping command option will resolve, if possible, the hostname of an IP address
target.
-n count This option sets the number of ICMP Echo Request messages to send. If you
execute the ping command without this option, four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request packet from 32 to
65,527. The ping command will send a 32 byte echo request if you do not use
the -l option.
-f Use this ping command option to prevent ICMP Echo Requests from being
fragmented by routers between you and the target. The -f option is most often
used to troubleshoot Path Maximum Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value. Beginning in
Windows 7, this option no longer functions but still exists for compatibility
reasons.
-r count Use this ping command option to specify the number of hops between the
computer and the target computer or device that you would like to be recorded
and displayed. The maximum value for count is 9 so use the tracert command
instead. If you are interested in viewing all hops between two devices.
-s count Use this option to report the time, in Internet Timestamp format, that each echo
request is received and echo reply is sent. The maximum value for count is 4
which means that only the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command adjusts the
amount of time, in milliseconds, that ping waits for each reply. If you do not use
the -w option, the default timeout value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only necessary if target is
a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with the -4 option, is only
necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP address or a
hostname.
/? Use the help switch with the ping command to show detailed help about the
command's several options.
Using the ping Command
Ping is one of your most important tools in troubleshooting Internet problems. It
shows you whether the Domain Name Server is working, whether the computer you
are trying to talk to is reachable, and how long it takes to get there. It does this at a
very low level — only the most basic Internet functions have to be up and running.

1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
Type ping followed by the IP address you desire to verify. The figure below shows the screen of
the ping command and its output.

Figure 57. Step 3

Figure 58. Pinging


This output shows several things:
• Decoding names to network addresses — A domain name server
(DNS) resolves machine names to numeric addresses. A single machine can
have many names, all of which resolve to the same Internet address. In the
example just given, the name www.google.com resolves to the Internet address
122.2.152.23.
• Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client machine sent out
the ping message until a reply came back (1 ms is 1 millisecond, or one
thousandth of a second). The variability in the times you see reflects that
networks do not always respond identically. Differing amounts of traffic on the
communication lines or differing loads on the server are common causes. You
will see very different response times depending on the access equipment you
use.
• Routing hop count — The part of the replies that says TTL=50 tells you
about the route the message took from one point to another. The acronym TTL
stands for Time to Live, which is a measure of how many rerouting from one
point to another the packet has to go through before IP declares it undeliverable.
The number following TTL (called the hop count) is a number that usually starts
at 255 and counts down by one every time the message gets rerouted through
an intermediary computer.

What I Have Learned

To deepen your understanding with regard to the Internet Protocols, IP Address and subneting,
utilize the Internet and the website www.professormesser.com, watch and learn from the video
presentations. Use the URLs below:

1. http://www.professormesser.com/n10-005/binary-math-2/

2. http://www.professormesser.com/n10-005/ip-classes/

3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/

Reflection on the video presentations


Directions: Answer the essential questions below based on the video presentations
you had watched. Write your answer in a clean sheet of paper.

1. What are the procedures involved in calculating IP address and the procedures
in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________
What are the different IP Classes? Discuss each briefly and give examples.
________________________________________________________
________________________________________________________
________________________________________________________
2. What are the distinguished Internet Protocols? Describe each.
________________________________________________________
________________________________________________________
________________________________________________________
3. What are the necessary procedures in calculating subnet mask or simply
subneting? Show an example solution for the calculation.
________________________________________________________
________________________________________________________
________________________________________________________
What I Can Do

Task 1: Configure an Ethernet NIC to use DHCP

Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address. You need to follow
the procedures given below and apply safety precautions in accomplishing this task. While doing
the activity, you have to answer activity questions written after every step. Write your answer in a
clean sheet of paper. Your performance will be rated based on the performance rubrics.

Rubrics for Configuration


Criteria B (70- D (75- AP P (85- A (90- Total
74) 79) (80-84) 89) 100) (=score x %)
Proper
Configuration (30
%)
(The configured
hardware was properly
configured according to
job specification.)

Adherence to the
Procedures (30%)
(The specified job was
done by following the
procedures. Safety
measures were
observed during the
activity.)

Quality of Work
(30%)
(The device was
configured properly.)

Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total

Legend: B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
• Linksys 300N router (or any available router)
• A computer running Window XP Professional
• Ethernet patch cable

Procedures:
Step 1
 Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.
 Plug the other end of the Ethernet patch cable into the network port on the NIC
in your computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an administrator.
 Click Start.
 Right-click My Network Places, and then choose Properties.
 The “Network Connections” window appears.

Figure 59. My Network Places

Step 2
 Right-click Local Area Connection, and then choose Properties.
 The “Local Area Connection Properties” window appears.

Figure 60. Local Area Connection Properties

Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:” field?
2. What are the items listed in the “This connection uses the following items:” field?
Step 3
 Choose Internet Protocol (TCP/IP). Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.

Figure 61. Internet Protocol (TCP/IP) Properties

Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the
fields of the “Use the following IP address:” area? Answers may vary. If
the computer is configured to obtain an IP address automatically, there
will be no information in the fields.

 Click the Obtain an IP address automatically radio button.


 Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.

Figure 62. Local Area Connection Properties Window

 Click OK.
 Restart your computer.
Step 4
 Log on to Windows as an administrator.
 Check the lights at the back of the NIC. These lights will blink when there is network
activity.
 Choose Start > Run.
 Type cmd and click OK.

Figure 63. Run Window


 Type ipconfig/all, and then press the Enter key.

Figure 64. ipconfig all window

Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area
Network Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Task 2: Configure Wireless Router

Directions: Configure and test the wireless settings on the LinksysWRT300N (or any available
router).

Recommended Equipment
• A computer with Windows XP Professional / Windows 7
• A Wireless NIC installed
• An Ethernet NIC installed
• Linksys WRT300N Wireless Router (or any available router)
• Ethernet patch cable
Step 1
 Connect the computer to one of the Ethernet ports on the wireless router with an
Ethernet patch cable.
 Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
 Choose start > Run, and type “cmd”. Press the Return key.
 Type ipconfig.
 What is the default gateway for the computer? Step 3

 Open your browser. Type “192.168.1.1” in the “Address” field, and then press Return.

Figure 65. Browser Window

 The “Connect to 192.168.1.1” window appears.

Figure 66. Connect to 192.168.1.1 Window

 Type “admin” in the “Password” field. The Setup screen appears. Step 4
 Click the “Wireless” tab.
 Choose “Mixed” in the “Network Mode” drop-down box.

Figure 67. Wireless Tab Window

 Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned by your
instructor.
 Click Save Settings.
 The “Settings are successful” screen appears.

Figure 67. Settings are Successful Window

 Click Continue, and then close the browser window.

Step 4
 Unplug the Ethernet patch cable from the rear of the computer.
 Choose Start, and then right-click My Network Places. Choose Properties.
 Double-click the wireless adapter, and then select View Wireless Networks.
 Choose CHS, and then click the Connect button.
 Open Internet Explorer, and then connect to the wireless router.
 Log in to the wireless router.
 Close Internet Explorer.
 Assessment

Test I. Multiple Choice.


Direction: Read each questions carefully. Choose the letter of the correct answer. Write your
answer in a clean sheet of paper.

1. Which of the following is the most commonly used networking cable category?
a. Cat3 b. Cat 5 c. Cat 5 and 5e d. Cat 6
2. What do you call a copper-cored cable surrounded by a heavy shielding?
a. coaxial cable b. fiber optics c. optical fiber d. twisted pair
3. What Ethernet cable is used to connect two devices directly?
a. Cross-Over b. Straight-through c. both A and B d. None of the options
4. Which of the following is a number used to identify a device on a network?
a. Default gateway b. DNS Server c. IP address d. subnet mask
5. In which of the following IP address does 192.168.1.105 belong?
a. Class A b. Class B c. Class C d. Class D e. Class
6. What command is used to test the ability of the source computer to reach a specified destination
computer?
a. Ipconfig b. Msconfig c. Ping d. Regedit
7. What do you call an approach to computer networking where all computers show equivalent
responsibility for processing data?
a. Client server b. Peer to peer c. Peer-to-client d. None of the options
8. Which of the following is an example of Class A subnet mask?
a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255

Test II. Matching Type


Direction: Match Column A with Column B.

Column A Column B

1. Copper cabling used for telephone communication a. Crimping tool


2. Standard Ethernet cable b. Cross- over
3. Cable that has a very thin core c. Fiber- optic
4. Cable that has a thicker core d. Ipconfig
5. Tool used for crimping RJ45 e. Multi- mode
6. Connector for Cat 5e cable f. Ping
7. Set of rules g. Protocol
8. Indicates the network portion of an IP address h. RJ45
9. Command used find out the ip address i. Single- mode
10. Glass or plastic conductor j. Straight-through
k. Subnet mask
l. Twisted pair

Key to Answers
15. Network Interface Card
14. Virtual Private Network
13. Local Area Networking
12. Time to Live
10. C 11. Domain Name System
9. D 10. Dynamic Host Control
8. K 9. Simple Mail Transfer Protocol
7. G 8. Internet Message Access Protocol
6. H 7. Secure Shell
5. A 6. File Transfer Protocol
4. E 5. Hypertext Transfer Protocol
3. I 4. Transmission Control Protocol / Internet Protocol
2. J 3. Internet Protocol
1. L 2. Shielded Twisted Pair
1. Unshielded Twisted Pair
Lesson 1: Pre - Test
Lesson 2: Pre - Test
AGUSAN DEL SUR NATIONAL HIGH SCHOOL
Summative Test
TVL (Computer System Servicing)
Name: _______________________________ Yr. & Sec.: _____________________ Score: ______
Teacher: Chito A. Florenosos Date : ________________________
Multiple Choice: Choose the letter of your answer. Shade the corresponding circle before each number.

OOOO 1. What boot configuration utility allows setting the programs that will run at startup?
a. Ipconfig b. regedit c. msconfig d. dxdiag
OOOO 2. What application allows you to edit the registry?
a. Ipconfig b. regedit c. dxdiag d. msconfig
OOOO 3. Which of the following enables you to test sound and graphics output?
a. Ipconfig b. regedit c. dxdiag d. msconfig
OOOO 4. It is a tab in direct X Diagnostic tool that displays your current audio settings.
a. Input b. Music c. Sound d. System
OOOO 5. What is the default startup that should be selected in general tab in the System configuration
and shows how the computer will start?
a. normal Startup b. diagnostic startup c. selective settings d. startup button
OOOO 6. What boot configuration utility allows setting the programs that will run at startup?
a. Ipconfig b. regedit c. msconfig d. dxdiag
OOOO 7. What startup selection that loads all device drivers and services.
a. normal Startup b. diagnostic startup c. selective settings d. startup button
OOOO 8. What tab allows you to enable or disable any of the Microsoft Windows services or other
program services running on the computer?
a. general b. boot c. services d. tools
OOOO 9. Which of the following is an applet that controls the look of windows?
a. Appearance and Themes c. Performance and Maintenance
b. Network and Internet d. Sounds, Speech and Audio
OOOO 10. Which of the following applets does not belong to user account category?
a. Remove User account b. Change account type c. Credential manager
d. System Account
OOOO 11. Which of the following is a wizard used to configure MS Windows for vision, hearing and
mobility needs?
a. Accessibility Option b. Ease of Access c. Sounds, speech and audio d. User Accounts
OOOO 12. Which of the following System Configuration Utility functional tabs not included in the group.
a. General b. Boot c. Services d. Startup Button
OOOO 13. What system configuration provides a convenient list of diagnostic tools and other advanced
tools that you can run?
a. general b. boot c. service d. tools
OOOO 14. In this part of tab, you are not to disable normally run at boot time because it might cause
some programs to malfunction or result in system instability.
a. Startup b. boot c. service d. general
OOOO 15. If you are planning to rule out basic Windows files to locate the problem, what general tab
startup configuration you will choice?
a. normal startup b. diagnostic startup c. selective setting d. configuration startup
OOOO 16. This type of system config tab allows you to make the same adjustments you can make in the
Windows boot.ini file without having to edit the file.
a. Boot b. general c. startup d. tools
OOOO 17. Which of the following is the most frequent reasons most Windows users enter the System
Configuration utility?
a. Startup b. boot c. service d. tools
OOOO 18. What part of DirectX Diagnostic tool, where you can see information about your computer and
displays the version of DirectX installed on your computer?
a. Input b. Sound c. Display d. System
OOOO 19. What input device you will see in Input tab of DirectX Diagnostic tool?
a. Printer b. Monitor c. Mouse d. Speaker
OOOO 20. Every time you will conduct a test in your different tab of DirectX Diagnostic tool, a _______
message is displayed in the Note box.
a. Greetings b. Warning c. Danger d. Restart
OOOO 21. Which of following will display your device's available memory and can tell you if your video
driver has passed Microsoft's Windows Hardware Quality Labs testing standard.
a. Sound b. Input c. Display d. Network
OOOO 22. If you intend to open the DirectX diagnostic tool in Run window, what certain word to type?
a. dxdiag b. regedit c. msconfig d. dxtool
OOOO 23. What will happen if wrong value data is entered in the edit string?
a. There is no effect on the windows c. The system is ignoring the data
b. It will malfunction the system d. The editor will not proceed to any changes
OOOO 24. How to expand the folders in the Registry Editor?
a. Click “O” to open c. Click windows logo
b. Click File tab d. Click the expand arrow
OOOO 25. What is the shortcut key to open Run windows, if you wish to access Registry Editor?
a. ⊞Win + R b. Ctrl + ⇧Shift + Esc c. Ctrl + Alt + Esc d. ⊞Win + P
OOOO 26. How to open system configuration of window 7 using search box?
a. click or tap inside the search box on the taskbar
b. switch to the Start Screen and start typing in the search box
c. Start Menu and start typing in the search box then click on its shortcut
d. Open the Start Menu and scroll down to the Windows Administrative Tools
OOOO 27. What is the file address of msconfig if you wish to open the System Configuration tool by
using its executable file?
a. "C:\Windows\System32” c. "C:\Windows\System”
b. "C:\Windows\Drive” d. "C:\Windows\Setup”
OOOO 28. How to open system configuration tool by using the Task Manager shortcut keys?
a. Alt + F4 b. CTRL + ENTER c. Ctrl + Alt + Esc d. Ctrl + Shift + Esc
OOOO 29. Which Windows includes a shortcut for System Configuration in the Start Menu?
a. Windows XP b. Windows 7 c. Windows 8.1 d. Windows 10
OOOO 30. What is the step to open the System Configuration tool by using the Run window?
a. Simultaneously press the Windows + R keys on your keyboard to launch it, type "msconfig",
and then press Enter or click/tap on OK
b. Simultaneously press the Ctrl + Shift + Esc keys to launch the Run window.
c. In the search box on the taskbar, start typing "system configuration" or "msconfig" and then
click or tap the System Configuration search result
d. launch Command Prompt or PowerShell, type msconfig, and then press Enter on your keyboard.
OOOO 31. How to open system configuration of window 7 using search box?
a. click or tap inside the search box on the taskbar
b. switch to the Start Screen and start typing in the search box
c. Start Menu and start typing in the search box then click on its shortcut
d. Open the Start Menu and scroll down to the Windows Administrative Tools
OOOO 32. What is the file address of msconfig if you wish to open the System Configuration tool by
using its executable file?
a. "C:\Windows\System32” c. “C:\Windows\System”
b. "C:\Windows\Drive” d. "C:\Windows\Setup”
OOOO 33. How to open system configuration tool by using the Task Manager shortcut keys?
a. Alt + F4 b. CTRL + ENTER c. Ctrl + Alt + Esc d. Ctrl + Shift + Esc
OOOO 34. Which Windows includes a shortcut for System Configuration in the Start Menu?
a. Windows XP b. Windows 7 c. Windows 8.1 d. Windows 10
OOOO 35. What is the step to open the System Configuration tool by using the Run window?
a. Simultaneously press the Windows + R keys on your keyboard to launch it, type "msconfig",
and then press Enter or click/tap on OK
b. Simultaneously press the Ctrl + Shift + Esc keys to launch the Run window.
c. In the search box on the taskbar, start typing "system configuration" or "msconfig" and then
click or tap the System Configuration search result
d. launch Command Prompt or PowerShell, type msconfig, and then press Enter on your keyboard.
II. MODIFIED TRUE or FALSE
Direction: Write TRUE if the statement states a factual information. If the statement is False,
write FALSE and UNDERLINE the word that made the statement to be wrong/false. Write your
answer on the space provided before each number.

_______36. A fire extinguisher and first aid kit should always be available in the workplace.
_______37. Opening the power supply of a monitor is always allowed.
_______38. Before opening a case and performing services make it a habit to always plug the power from
the source.
_______39. Food and drinks inside the laboratory is strictly allowed.
_______40. A systematized, clean and well-lit workplace is considered unsafe environment.
_______41. Whether you’re a professional or a beginner staying safe must be put into priority to prevent
troubles and damage to any person or damage to any object in a work area.
_______42. The most important one is SWITCHING OFF. The first step is to stop the flow of electricity into
your computer.
_______43. Know where the fire extinguisher is located and learn how to use it.
_______44. It is a must to unfollow appropriate procedures for handling computer equipment.
_______45. Lift heavy objects with sturdy leg support to avoid head injury.
_______46. It is vital to stay safe in every working conditions.
_______47. Health and safety are of the outmost importance.
_______48. If you must leave your computer on and unattended for whatever reason, turn off the monitor during
your absence.
_______49. Even when unplugged power supplies can retain dangerous voltage.
_______50. Monitors generate high voltage internally which is potential to start an electrical fire.

You might also like