Tle10 Ict Chs q2 Week 1-4 Module
Tle10 Ict Chs q2 Week 1-4 Module
10
Technology and
Livelihood Education
Quarter 2 - Module 1 & 2
Week 1 to 4
Information and Communication
Technology (ICT)
Computer Servicing System (CSS)
Configure Computer System and Network
3:00- 5:00 PM
Prepared by:
CHITO A. FLORENOSOS
Lesson 2. Configure Computer System and Network
What I Know
Directions: Choose the letter of the correct answer. Write the chosen letter in your lecture notebook.
Column A Column B
1. Copper cabling used for telephone communication a. Crimping tool
2. Standard Ethernet cable b. Cross- over
3. Cable that has a very thin core c. Fiber- optic
4. Cable that has a thicker core d. Ipconfig
5. Tool used for crimping RJ45 e. Multi- mode
6. Connector for Cat 5e cable f. Ping
7. Set of rules 8. Indicates the network portion of an IP address g. Protocol
9. Command used find out the ip address h. RJ45
10. Glass or plastic conductor i. Single- mode
j. Straight-through
k. Subnet mask
l. Twisted pair
What’s In
In previous lesson, you familiarized Accessing and using Microsoft System Configuration,
Accessing and using Registry Editor, and Accessing and Using Direct X Diagnostic.
What Is It
System Configuration is the way a system is set up, it is the collection of components that make up
the system. Configuration can refer to either hardware or software, or the combination of both. For instance,
a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a
modem, a CD-ROM drive, a VGA monitor, and the Windows Operating System.
Many software products require that the computer has a certain minimum configuration. For
example, the software might require a graphics display monitor and a video adapter, a particular
microprocessor, and a minimum amount of main memory capacity.
When you install a new device or program, you sometimes need to configure it, which means that
you need to set various switches and jumpers (for hardware) and to define values of parameters (for
software). For example, the device or program may need to know what type of video adapter you have and
what type of printer is connected to the computer. Thanks to technological advancements, such as plug-
and-play, much of this configuration is now performed automatically.
Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be
pulled through ceilings and walls where there are obstacles or toxic materials. You should wear clothing
such as long pants, a long-sleeved shirt, sturdy shoes that cover your feet, and gloves to protect you from
those toxic materials. Most importantly, wear safety glasses. If possible, ask building management, or
someone responsible for the building, if there are any dangerous materials or obstacles that you need to be
aware of before entering the ceiling area.
Safety precautions when using a ladder:
• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance and fall.
• Make sure that people in the area know you will be working there.
• Cordon off the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions written on the
ladder, and have someone hold the ladder to help keep it steady.
The tools required to install copper and fiber-optic cable may cause danger through improper use.
When working with cables, strictly follow these safety rules:
• Make sure that the tools you are using are in good working condition.
• Watch what you are doing, and take your time. Make sure that you do not cut yourself or place
anyone in danger.
• Always wear safety glasses when cutting, stripping, or splicing cables of any kind. Tiny fragments
can injure your eyes.
• Wear gloves whenever possible, and dispose any waste properly.
Use common sense when installing cables and fixing network problems. Call for assistance for tasks
that you cannot do on your own.
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Specific types of tools and chemicals are used when working with fiber-optic cable. These materials
must be handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle them with extreme
care. Read the instructions on the label, and follow them carefully. Also, read the material safety data sheet
(MSDS) that accompanies the chemicals to know how to treat someone in case of emergency.
Tools
When working with any tool, safety should always be your first priority. Any compromise in safety
could result in serious injury or even death. The tools used for working with fiber optics have sharp cutting
surfaces that are used to scribe glass. Other tools pinch cables with high pressure to fasten connectors to
them. These tools can produce shards of glass that can splinter and fly into the air. You must avoid getting
them on your skin and in your mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of
glass or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be extremely
difficult to see on your skin because they are clear and small. When you work with fiber-optic cabling, the
working surface should be a dark mat so that you can see the tiny glass or plastic fragments. The mat should
also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiber-optic fragments with your fingers.
Use tape to pick up small fragments, and dispose them off properly. Use a disposable container, such as a
plastic bottle with a screw-on lid, to store fiber fragments. Close the lid tightly before disposing the container.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color
that humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier to
inspect fiber-optic cable and connectors, the light emitted from the fiber could be directed into your eyes.
When working with fiber, be sure to disconnect the light source. Use special detectors to help you tell if a
fiber is energized.
Caution: Obtain proper training before you attempt to cut, strip, or splice fiber-optic cable. An
experienced technician should supervise you until you become adequately skilled.
Networking Devices, Media and Connector
To make data transmission more extensible and efficient than a simple peer-to-peer network,
network designers use specialized network devices such as hubs, switches, routers, and wireless access
points to send data between devices. You have already discussed in your Grade 9 CHS class the different
devices used in networking and which provides you the knowledge on the common networking cables that
are essential in putting up a network.
Twisted Pair
Twisted pair is a type of copper
cabling that is used for telephone
communications and most Ethernet
networks. A pair of wires forms a circuit that
transmits data. The pair is twisted to provide
protection against crosstalk, the noise
generated by adjacent pairs of wires in the
cable. Pairs of copper wires are encased in
color-coded plastic insulation and are twisted
Source: www.lanshack.com
together. An outer jacket protects the bundles
of twisted pairs. Figure 3 9 . UTP and STP Cable
When electricity flows through a copper wire, a magnetic field is created around the wire. A circuit
has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When the two wires
of the circuit are next to each other, the magnetic fields cancel each other out. This is called the cancellation
effect. Without the cancellation effect, your network communications become slow because of the
interference caused by the magnetic fields.
• With shielded twisted pair (STP), each pair of wire is wrapped in metallic foil to better shield the
wires from noise. Four pairs of wires are then wrapped in an overall metallic braid or foil. STP
reduces electrical noise from within the cable. It also reduces EMI and RFI from outside the cable.
Although STP prevents interference better than UTP, STP is more expensive because of the extra
shielding. It is also more difficult to install because of the thickness. In addition, the metallic shielding
must be grounded at both ends. If it is improperly grounded, the shield acts like an antenna, picking
up unwanted signals.
Category Rating
UTP comes in several categories that are based on two factors:
• The number of wires in the cable
• The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Megabyte per second
(Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources and from the other wires within
the cable.
Some Category 6 cables use a plastic divider to separate the pairs of wires, which prevents
interference. The pairs also have more twists than Category 5e cable.
Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is used to
connect the computers to the rest of the network.
Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information using light. Fiber optic cable
has one or more optical fibers enclosed in a sheath or jacket. Because it is made of glass, fiber-optic cable
is not affected by EMI or RFI. All signals are converted to light pulses to enter the cable and are converted
back into electrical signals when they leave it. This means that fiber-optic cable can deliver signals that are
clearer, and can go farther, without compromising the clarity of signals.
Ethernet cabling has been the standard in networking installation for years. It is the fastest way of
connecting PC to a peer or to your router or a central switch. This section of the module will bring you back
to the procedures in creating an Ethernet cable specifically straight-through and cross-over. Try to recall the
procedures as you go on with the lesson.
In an Ethernet networking environment – like in a home or an office with multiple PCs that are wired
– the computers need to be connected to a central router to allow data transfer. The router takes all the bits
being sent out by the computers and relays them onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a PC to a network hub
and router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network devices directly, without
the need for a router in the middle. It simply reverses some of the pins so that the output on one computer
is being sent to the input of another.
Bear in mind that safety precautions must always be applied and observed during the fabrication of
the said cables. Also, materials and tools to be used must always be complete and functional to save time,
money and effort.
The following items are the materials and tools used for making Ethernet cables:
Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
RJ45 crimpable connectors for Cat5e;
RJ45 Crimping tool;
Wire cutter, stripper or pliers; and
Cross-Over Straight-Through
The picture below will serve as your guide in making the two important Ethernet cables.
1. Cut into the plastic sheath 1 inch from the end of the cut
cable. The crimping tool has a razor blade that will do the
trick with practice.
4. Use wire cutter to make a straight cut across the wires 1/2
inch from the cut sleeve to the end of the wires.
5. Push the wires into the connector. Each wire fits into a slot
in the RJ45 connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.
Criss-Cross Puzzle
Directions: Complete the criss-cross puzzle and familiarize yourself of the cables being
described. Write your answer in a clean sheet of paper.
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
Now that you are equipped with the knowledge on the different cables used in networking, you
also need to know that fiber technologies and connectors have changed through the years. In these
videos, you will learn about the different fiber connectors, copper connectors and their characteristics. To
watch the video presentations just type in the following URL:
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3. http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
I hope you learned a lot from the video presentations. After watching the videos, answer the following
guide questions and submit it to your teacher. Write your answer in a clean sheet of paper. Good
Luck!
Tools:
Reminder / Caution: Be careful when using the tools. Follow the procedures cited in this module and
apply the safety precautions to avoid injury or any unwanted incident. You will be given 30 minutes to
complete the task. You will be rated using the performance rubrics found on the next page.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a razor blade that
will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as shown on page 90. The color order is
important to do this correctly.
4. Use scissors to make a straight cut across the wires 1/2 inch from the cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic shielding. Also note how the wires
go all the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There should be no short wires.
7. In crimping the cable – carefully place the connector into the Ethernet Crimper and cinch down on the
handles tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight compression fit. When you remove
the cable from the crimper, that end is ready to use.
8. For a standard straight-through cable, repeat all steps and wire color order on the other end of cable. For
a cross-over cable, the other end will have a different color order as shown in the cross-over picture on
page 89.
9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does this quite
well.
What I Know
Test I. ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
What’s In
In previous lesson, you familiarized Inspect networking devices and connectors and create a
cross-over and Straight-through Ethernet cables.
What Is It
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the
protocol specifies where on the envelope the delivery address needs to be written. If the delivery address is
written in the wrong place, the letter cannot be delivered. Internet protocol works in a similar way. Internet
protocols are sets of rules governing communication within and between computers on a network. Protocol
specifications define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to arrive within a certain amount
of time so that computers do not wait indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate alternative actions if the
network does not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked
in layers. These layers depend on the operation of the other layers in the suite to function properly.
The main functions of protocols are:
• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data
To understand how networks and the Internet work, you must be familiar with the commonly used
protocols. These protocols are used to browse the web, send and receive e-mail, and transfer data
files. You will encounter other protocols as your experience in IT grows, but they are not used as
often as the common protocols described here:
• TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of
protocols has become the dominant standard for internetworking. TCP/IP represents a
set of public standards that specify how packets of information are exchanged between
computers over one or more networks.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol
suite originally employed by Novell Corporation’s network operating system, NetWare.
It delivers functions similar to those included in TCP/IP. Novell in its current releases
supports the TCP/IP suite. A large installed base of NetWare networks continues to use
IPX/SPX.
• NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small
Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each
other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving
a few computers directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network administrator the
advantages of the high performance of NetBEUI within the local network and the ability
to communicate beyond the LAN over TCP/IP.
IP Addressing
An IP address is a number that is used to identify a device on the network. Each device
on a network must have a unique IP address to communicate with other network devices. Network
devices are those that move data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the network) and network device
must have an IP address within the same network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label or address
for the person’s physical aspect—the body. A person’s mailing address, on the other hand, relates
to where the person lives or picks up mail. This address can change. On a host, the Media Access
Control (MAC) address is assigned to the host Network Interface Card (NIC) and is known as the
physical address. The physical address remains the same regardless of where the host is placed
on the network in the same way that fingerprints remain with someone regardless of where he or
she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for humans
to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called
octets. An IP address, even in this grouped format, is hard for humans to read, write, and
remember. Therefore, each octet is presented as its decimal value, separated by a decimal point
or period. This format is called dotted-decimal notation. When a host is configured with an IP
address, it is entered as a dotted-decimal number, such as 192.168.1.5.
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If you mistyped just 1 bit, the address would be different,
and the host may not be able to communicate on the network. The logical 32-bit IP address is
hierarchical and is composed of two parts. The first part identifies the network, and the second part
identifies a host on that network. Both parts are required in an IP address. For example, if a host
has an IP address of 192.168.18.57, the first three octets, 192.168.18, identify the network portion
of the address, and the last octet, 57, identifies the host. This is called hierarchical addressing
because the network portion indicates the network on which each unique host address is located.
Routers only need to know how to reach each network, not the location of each individual host.
IP Classes Purpose
Class A Used for large networks, implemented by large companies and some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is the network
portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP address are
the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP address
are the network portion
Octet 1 2 3 4
Class B Network Host
Octet 1 2 3 4
Class C Network Host
Octet 1 2 3 4
Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are reserved
for research use only.
IpConfig
Ipconfig is a command used to find out the IP address of a certain network you are
connected to.
6. Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
7. Type a subnet mask. The value used on a local network is commonly 255.255.255.0,
but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type the router’s
address. Figure 54 shows an example of assigning an IP Address, Subnet mask and
default gateway.
These are the IP address information that a DHCP server can assign to hosts:
• IP address
• Subnet mask
• Default gateway
• Optional values, such as a Domain Name System (DNS) server address
The DHCP server receives a request from a host. The server then selects IP address
information from a set of predefined addresses that are stored in a database. After the IP address
information is selected, the DHCP server offers these values to the requesting host on the network.
If the host accepts the offer, the DHCP server leases the IP address for a specific period of time.
Using a DHCP server simplifies the administration of a network because the software keeps
track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of assigning
duplicate or invalid IP addresses. Before a computer on the network can take advantage of the
DHCP server services, the computer must be able to identify the server on the local network. You
can configure a computer to accept an IP address from a DHCP server by clicking the Obtain an
IP address automatically option in the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain an IP address, the
Windows operating system automatically assigns a private IP address. If your computer is
assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, it can communicate with
only other computers in the same range. An example of when these private addresses would be
useful is in a classroom lab where you want to prevent access outside to your network. This
operating system feature is called Automatic Private IP Addressing (APIPA). APIPA continually
requests an IP address from a DHCP server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of the source computer
to reach a specified destination computer. The ping command is usually used as a simple way to
verify that a computer can communicate over the network with another computer or network
device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo
Request messages to the destination computer and waiting for a response. How many of those
responses are returned, and how long it takes for them to return, are the two major pieces of
information that the ping command provides.
1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
Type ping followed by the IP address you desire to verify. The figure below shows the screen of
the ping command and its output.
To deepen your understanding with regard to the Internet Protocols, IP Address and subneting,
utilize the Internet and the website www.professormesser.com, watch and learn from the video
presentations. Use the URLs below:
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
1. What are the procedures involved in calculating IP address and the procedures
in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________
What are the different IP Classes? Discuss each briefly and give examples.
________________________________________________________
________________________________________________________
________________________________________________________
2. What are the distinguished Internet Protocols? Describe each.
________________________________________________________
________________________________________________________
________________________________________________________
3. What are the necessary procedures in calculating subnet mask or simply
subneting? Show an example solution for the calculation.
________________________________________________________
________________________________________________________
________________________________________________________
What I Can Do
Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address. You need to follow
the procedures given below and apply safety precautions in accomplishing this task. While doing
the activity, you have to answer activity questions written after every step. Write your answer in a
clean sheet of paper. Your performance will be rated based on the performance rubrics.
Adherence to the
Procedures (30%)
(The specified job was
done by following the
procedures. Safety
measures were
observed during the
activity.)
Quality of Work
(30%)
(The device was
configured properly.)
Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total
Legend: B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
• Linksys 300N router (or any available router)
• A computer running Window XP Professional
• Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.
Plug the other end of the Ethernet patch cable into the network port on the NIC
in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click Start.
Right-click My Network Places, and then choose Properties.
The “Network Connections” window appears.
Step 2
Right-click Local Area Connection, and then choose Properties.
The “Local Area Connection Properties” window appears.
Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:” field?
2. What are the items listed in the “This connection uses the following items:” field?
Step 3
Choose Internet Protocol (TCP/IP). Click Properties.
The “Internet Protocol (TCP/IP) Properties” window appears.
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the
fields of the “Use the following IP address:” area? Answers may vary. If
the computer is configured to obtain an IP address automatically, there
will be no information in the fields.
Click OK.
Restart your computer.
Step 4
Log on to Windows as an administrator.
Check the lights at the back of the NIC. These lights will blink when there is network
activity.
Choose Start > Run.
Type cmd and click OK.
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area
Network Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Task 2: Configure Wireless Router
Directions: Configure and test the wireless settings on the LinksysWRT300N (or any available
router).
Recommended Equipment
• A computer with Windows XP Professional / Windows 7
• A Wireless NIC installed
• An Ethernet NIC installed
• Linksys WRT300N Wireless Router (or any available router)
• Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router with an
Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
Choose start > Run, and type “cmd”. Press the Return key.
Type ipconfig.
What is the default gateway for the computer? Step 3
Open your browser. Type “192.168.1.1” in the “Address” field, and then press Return.
Type “admin” in the “Password” field. The Setup screen appears. Step 4
Click the “Wireless” tab.
Choose “Mixed” in the “Network Mode” drop-down box.
Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned by your
instructor.
Click Save Settings.
The “Settings are successful” screen appears.
Step 4
Unplug the Ethernet patch cable from the rear of the computer.
Choose Start, and then right-click My Network Places. Choose Properties.
Double-click the wireless adapter, and then select View Wireless Networks.
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log in to the wireless router.
Close Internet Explorer.
Assessment
1. Which of the following is the most commonly used networking cable category?
a. Cat3 b. Cat 5 c. Cat 5 and 5e d. Cat 6
2. What do you call a copper-cored cable surrounded by a heavy shielding?
a. coaxial cable b. fiber optics c. optical fiber d. twisted pair
3. What Ethernet cable is used to connect two devices directly?
a. Cross-Over b. Straight-through c. both A and B d. None of the options
4. Which of the following is a number used to identify a device on a network?
a. Default gateway b. DNS Server c. IP address d. subnet mask
5. In which of the following IP address does 192.168.1.105 belong?
a. Class A b. Class B c. Class C d. Class D e. Class
6. What command is used to test the ability of the source computer to reach a specified destination
computer?
a. Ipconfig b. Msconfig c. Ping d. Regedit
7. What do you call an approach to computer networking where all computers show equivalent
responsibility for processing data?
a. Client server b. Peer to peer c. Peer-to-client d. None of the options
8. Which of the following is an example of Class A subnet mask?
a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255
Column A Column B
Key to Answers
15. Network Interface Card
14. Virtual Private Network
13. Local Area Networking
12. Time to Live
10. C 11. Domain Name System
9. D 10. Dynamic Host Control
8. K 9. Simple Mail Transfer Protocol
7. G 8. Internet Message Access Protocol
6. H 7. Secure Shell
5. A 6. File Transfer Protocol
4. E 5. Hypertext Transfer Protocol
3. I 4. Transmission Control Protocol / Internet Protocol
2. J 3. Internet Protocol
1. L 2. Shielded Twisted Pair
1. Unshielded Twisted Pair
Lesson 1: Pre - Test
Lesson 2: Pre - Test
AGUSAN DEL SUR NATIONAL HIGH SCHOOL
Summative Test
TVL (Computer System Servicing)
Name: _______________________________ Yr. & Sec.: _____________________ Score: ______
Teacher: Chito A. Florenosos Date : ________________________
Multiple Choice: Choose the letter of your answer. Shade the corresponding circle before each number.
OOOO 1. What boot configuration utility allows setting the programs that will run at startup?
a. Ipconfig b. regedit c. msconfig d. dxdiag
OOOO 2. What application allows you to edit the registry?
a. Ipconfig b. regedit c. dxdiag d. msconfig
OOOO 3. Which of the following enables you to test sound and graphics output?
a. Ipconfig b. regedit c. dxdiag d. msconfig
OOOO 4. It is a tab in direct X Diagnostic tool that displays your current audio settings.
a. Input b. Music c. Sound d. System
OOOO 5. What is the default startup that should be selected in general tab in the System configuration
and shows how the computer will start?
a. normal Startup b. diagnostic startup c. selective settings d. startup button
OOOO 6. What boot configuration utility allows setting the programs that will run at startup?
a. Ipconfig b. regedit c. msconfig d. dxdiag
OOOO 7. What startup selection that loads all device drivers and services.
a. normal Startup b. diagnostic startup c. selective settings d. startup button
OOOO 8. What tab allows you to enable or disable any of the Microsoft Windows services or other
program services running on the computer?
a. general b. boot c. services d. tools
OOOO 9. Which of the following is an applet that controls the look of windows?
a. Appearance and Themes c. Performance and Maintenance
b. Network and Internet d. Sounds, Speech and Audio
OOOO 10. Which of the following applets does not belong to user account category?
a. Remove User account b. Change account type c. Credential manager
d. System Account
OOOO 11. Which of the following is a wizard used to configure MS Windows for vision, hearing and
mobility needs?
a. Accessibility Option b. Ease of Access c. Sounds, speech and audio d. User Accounts
OOOO 12. Which of the following System Configuration Utility functional tabs not included in the group.
a. General b. Boot c. Services d. Startup Button
OOOO 13. What system configuration provides a convenient list of diagnostic tools and other advanced
tools that you can run?
a. general b. boot c. service d. tools
OOOO 14. In this part of tab, you are not to disable normally run at boot time because it might cause
some programs to malfunction or result in system instability.
a. Startup b. boot c. service d. general
OOOO 15. If you are planning to rule out basic Windows files to locate the problem, what general tab
startup configuration you will choice?
a. normal startup b. diagnostic startup c. selective setting d. configuration startup
OOOO 16. This type of system config tab allows you to make the same adjustments you can make in the
Windows boot.ini file without having to edit the file.
a. Boot b. general c. startup d. tools
OOOO 17. Which of the following is the most frequent reasons most Windows users enter the System
Configuration utility?
a. Startup b. boot c. service d. tools
OOOO 18. What part of DirectX Diagnostic tool, where you can see information about your computer and
displays the version of DirectX installed on your computer?
a. Input b. Sound c. Display d. System
OOOO 19. What input device you will see in Input tab of DirectX Diagnostic tool?
a. Printer b. Monitor c. Mouse d. Speaker
OOOO 20. Every time you will conduct a test in your different tab of DirectX Diagnostic tool, a _______
message is displayed in the Note box.
a. Greetings b. Warning c. Danger d. Restart
OOOO 21. Which of following will display your device's available memory and can tell you if your video
driver has passed Microsoft's Windows Hardware Quality Labs testing standard.
a. Sound b. Input c. Display d. Network
OOOO 22. If you intend to open the DirectX diagnostic tool in Run window, what certain word to type?
a. dxdiag b. regedit c. msconfig d. dxtool
OOOO 23. What will happen if wrong value data is entered in the edit string?
a. There is no effect on the windows c. The system is ignoring the data
b. It will malfunction the system d. The editor will not proceed to any changes
OOOO 24. How to expand the folders in the Registry Editor?
a. Click “O” to open c. Click windows logo
b. Click File tab d. Click the expand arrow
OOOO 25. What is the shortcut key to open Run windows, if you wish to access Registry Editor?
a. ⊞Win + R b. Ctrl + ⇧Shift + Esc c. Ctrl + Alt + Esc d. ⊞Win + P
OOOO 26. How to open system configuration of window 7 using search box?
a. click or tap inside the search box on the taskbar
b. switch to the Start Screen and start typing in the search box
c. Start Menu and start typing in the search box then click on its shortcut
d. Open the Start Menu and scroll down to the Windows Administrative Tools
OOOO 27. What is the file address of msconfig if you wish to open the System Configuration tool by
using its executable file?
a. "C:\Windows\System32” c. "C:\Windows\System”
b. "C:\Windows\Drive” d. "C:\Windows\Setup”
OOOO 28. How to open system configuration tool by using the Task Manager shortcut keys?
a. Alt + F4 b. CTRL + ENTER c. Ctrl + Alt + Esc d. Ctrl + Shift + Esc
OOOO 29. Which Windows includes a shortcut for System Configuration in the Start Menu?
a. Windows XP b. Windows 7 c. Windows 8.1 d. Windows 10
OOOO 30. What is the step to open the System Configuration tool by using the Run window?
a. Simultaneously press the Windows + R keys on your keyboard to launch it, type "msconfig",
and then press Enter or click/tap on OK
b. Simultaneously press the Ctrl + Shift + Esc keys to launch the Run window.
c. In the search box on the taskbar, start typing "system configuration" or "msconfig" and then
click or tap the System Configuration search result
d. launch Command Prompt or PowerShell, type msconfig, and then press Enter on your keyboard.
OOOO 31. How to open system configuration of window 7 using search box?
a. click or tap inside the search box on the taskbar
b. switch to the Start Screen and start typing in the search box
c. Start Menu and start typing in the search box then click on its shortcut
d. Open the Start Menu and scroll down to the Windows Administrative Tools
OOOO 32. What is the file address of msconfig if you wish to open the System Configuration tool by
using its executable file?
a. "C:\Windows\System32” c. “C:\Windows\System”
b. "C:\Windows\Drive” d. "C:\Windows\Setup”
OOOO 33. How to open system configuration tool by using the Task Manager shortcut keys?
a. Alt + F4 b. CTRL + ENTER c. Ctrl + Alt + Esc d. Ctrl + Shift + Esc
OOOO 34. Which Windows includes a shortcut for System Configuration in the Start Menu?
a. Windows XP b. Windows 7 c. Windows 8.1 d. Windows 10
OOOO 35. What is the step to open the System Configuration tool by using the Run window?
a. Simultaneously press the Windows + R keys on your keyboard to launch it, type "msconfig",
and then press Enter or click/tap on OK
b. Simultaneously press the Ctrl + Shift + Esc keys to launch the Run window.
c. In the search box on the taskbar, start typing "system configuration" or "msconfig" and then
click or tap the System Configuration search result
d. launch Command Prompt or PowerShell, type msconfig, and then press Enter on your keyboard.
II. MODIFIED TRUE or FALSE
Direction: Write TRUE if the statement states a factual information. If the statement is False,
write FALSE and UNDERLINE the word that made the statement to be wrong/false. Write your
answer on the space provided before each number.
_______36. A fire extinguisher and first aid kit should always be available in the workplace.
_______37. Opening the power supply of a monitor is always allowed.
_______38. Before opening a case and performing services make it a habit to always plug the power from
the source.
_______39. Food and drinks inside the laboratory is strictly allowed.
_______40. A systematized, clean and well-lit workplace is considered unsafe environment.
_______41. Whether you’re a professional or a beginner staying safe must be put into priority to prevent
troubles and damage to any person or damage to any object in a work area.
_______42. The most important one is SWITCHING OFF. The first step is to stop the flow of electricity into
your computer.
_______43. Know where the fire extinguisher is located and learn how to use it.
_______44. It is a must to unfollow appropriate procedures for handling computer equipment.
_______45. Lift heavy objects with sturdy leg support to avoid head injury.
_______46. It is vital to stay safe in every working conditions.
_______47. Health and safety are of the outmost importance.
_______48. If you must leave your computer on and unattended for whatever reason, turn off the monitor during
your absence.
_______49. Even when unplugged power supplies can retain dangerous voltage.
_______50. Monitors generate high voltage internally which is potential to start an electrical fire.