CSS 9 - Q3 W1 3 Pages 1
CSS 9 - Q3 W1 3 Pages 1
CSS 9 - Q3 W1 3 Pages 1
Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval
of the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Management Team:
Gregorio C. Quinto, Jr., EdD
Chief, Curriculum Implementation Division
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
This module was collaboratively designed, developed, and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners’ progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage the learners as they do the tasks included in the
module.
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner.
1
In this portion, the new lesson will be introduced to
you in various ways; a story, a song, a poem, a
problem opener, an activity, or a situation.
This section provides a brief discussion of the
lesson. This aims to help you discover and
understand new concepts and skills.
This comprises activities for independent practice
to solidify your understanding and skills of the
topic. You may check the answers to the exercises
using the Answer Key at the end of the module.
This includes questions or blank sentence/
paragraph to be filled in to process what you
learned from the lesson.
This section provides an activity that will help you
transfer your new knowledge or skill into real life
situations or concerns.
This is a task which aims to evaluate your level of
mastery in achieving the learning competency.
In this portion, another activity will be given to you
to enrich your knowledge or skill of the lesson
learned.
This contains answers to all activities in the
module.
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain a deep
understanding of the relevant competencies. You can do it!
2
This module encourages you to be familiar on how to validate one’s work
for quality improvement work. Different activities are provided for you to be
able to:
1. Create user folder in accordance with Network Operating System
features
2. Configure user access level based on NOS features
3. Establish network access policies/end user requirements
4. Perform security check in accordance with established network
Pre-Test
Directions: Choose the best answer. Write the letter of the correct answer.
1. It provides the several functionalities for managing the data, applications, security,
and other functions.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
2. A network operating system wherein devices are connected directly to each other
without any additional networking devices between them.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
3. In this type of network operating system, the server provides the requested
information or service to the client.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
3
5. Which of the following is a connecting terminals?
a. Guided Media, Coaxial Cable, Fiber Optic Cables.
b. Microwaves, Infra-Red Waves
c. Routers, Bridges, and Hubs
d. Unix, Linux, Windows 2000
7. Which of the following should be done first before Setting Up Peer-to-Peer Network
Operating System?
a. Input an IP address which came from the DNS server
b. Make sure both systems have Network Interface Cards (NICs) installed and
are using the proper cables.
c. Peer casting for multicasting streams where to use on demand content delivery.
d. Search a communication network.
9. These are some programs which are installed on the network machines.
a. Application Components c. People Components
b. Hardware Components d. Software Components
10. There are some devices which are physically connected with each other.
a. Application Components c. People Components
b. Hardware Components d. Software Components
12. If you have a DNS system and your connected to ISP you can input an _______
address which came from the DNS server
a. Default gateway c. Preferred DNS
b. IP d. Subnet
13. If the shared folder does not appear to network windows dialog box, what do you
need to press to refresh the screen?
a. F1 c. F5
b. b. F2 d. F10
4
14. Which part of the IP Address are you going too change if you are setting up a peer-
to-peer network?
a. first c. third
b. b. 2nd d. fourth
15. Which of the following are you going to put a checkmark under the general tab of
TCP/IP Porperties?
a. Client for Microsoft Network, Computer Description, Internet Protocol (TCP/IP)
b. Client for Microsoft Network, File and Printer Sharing, Internet Protocol (TCP/IP)
c. Full Control, Read, Change, Allow
d. Full Control, Read, Change, Write
1. HTTP - __________________________________________
2. DHCP - __________________________________________
3. NIS - __________________________________________
4. DSL - __________________________________________
5. IP - __________________________________________
Directions: Identify what type of network is being illustrated below. Choose your
answer inside the box.
1. ________________________ 2. _____________________
5 ___
3. _________________________
6
Components of Network Operating System
1. Hardware Components
There are some devices which are physically connected with each other.
✓ Server M/C
✓ Client M/C
✓ Peer M/C
✓ Communication medium – Guided media – coaxial cable, fiber optic cables.
✓ Unguided media – microwaves, infra-red waves
✓ Connecting Terminals – Routers, Bridges, Hubs, Repeaters, Gateways, Switches,
hub, Network Interface Card, Shared printers.
2. Software Components
These are some programs which are installed on the network machines.
✓ Networking Operating System – Unix, Linux, Windows 2000, Windows 98,
Windows XP.
✓ Protocol Suite – OSI Model (Open System Interconnections), TCP / IP Model
7
2. Peer to Peer
✓designed especially for small to medial
type local area networks.
✓devices are connected directly to each
other without any additional networking
devices between them.
✓all users can share resources and any
type of data (file) on their workstation
computer system, and these shared
resources can be accessed by other computer system.
✓ individual users are responsible for their own resources and can decide which data
and devices to share.
✓ In this network operating system, all computer systems contain equal privileges for
consuming the all resources which are presented on the network.
✓ every peer on this P2P N/W plays role as server as well as client.
✓ no central point of control or administration
NOTE:
A device name should appear under "connect using." If not, there is a hardware
issue and Windows is not recognizing the network hardware. This issue must be fixed
before continuing.
NOTE:
If any of the above component is
not installed, install them by
selecting Add or Install, and then
selecting the missing
component, and clicking Add.
9
i. At the IP Address tab, select Specify IP
Address.
j. Enter 192.168.0.1 as the unique IP Address
for the first machine. For each other PC add
one to the last number in the IP address.
For example,
✓ KIDSPC1 = 192.168.0.1 , 0 1
✓ MOMSPC2 = 192.168.0.2 ,
✓ and WORKPC3 = 192.168.0.3
NOTE:
192.168.0.x is an IP Address reserved for
private networks and is not routable to the
Internet.
NOTE:
If you do not see them, press F5 to refresh
the screen. If after refreshing the network
window, the other PCs still do not appear,
check the firewall settings that may be
interfering with the communication.
11
d. Turn network discovery, file, and
printer sharing.
e. Scroll down and Turn off password
protected sharing.
f. Do the same for Home or Work.
g. Click Save Changes.
NOTE:
Just do the same to the other
PCs which is being set up in a
peer-to-peer network.
12
4. ___ Choose Network and Internet Connections.
5. ___ Click Network Connections.
6. ___ Click Ok or press the enter key. 10
7. ___ Edit the TCP/IP Properties by entering a unique IP Address, Subnet mask
and DNS server if needed.
8. ___ Go to Control Panel after clicking the start button.
9. ___ Right click it and select Properties.
10. ___ Select the Internet Protocol (TCP/IP) and click the Properties button.
1. ___ All users can create user account, and they can’t manage user logging in and logging
out.
2. ___ Directory and name services management.
3. ___ In NOS, administrator can control the different setting such as N/W security protocol,
data backup for single and interconnected computer system.
4. ___ It contains the all possible security features of operating system. Users can manage
all remote terminals.
5. ___ It has ability of Inter networking like as routing and WAN ports.
6. ___ It is incapable of clustering.
7. ___ Network operating system cannot support the internet functionality and their
connection management as well.
8. ___ NOS has ability to support for all processors, application, and their hardware.
9. ___ Printer and other applications cannot be shared.
10. ___ Users cannot use their backup database and web services.
1. ___ Do the same for Home or Work and click Save Changes.
2. ___ Scroll down and Turn off password protected sharing after turning network
discovery, file, and printer sharing.
3. ___ Select Change advance sharing settings.
4. ___ Select Open Network and Sharing Center after right clicking on LAN/Wifi icon
at the notification bar.
1. ___ Check the permission level to read/write, then select share after selecting
everyone, and clicking on Add.
2. ___ Click on Advance Sharing then check share this folder.
3. ___ Click on Apply and Ok and click on Apply and Ok again.
4. ___ Click Permission and check Allow-Full Control.
5. ___ Click the Sharing Tab after clicking Properties and click on share
6. ___ Right click on the folder you created.
15
A network operating system (NOS) is a
computer operating system (OS) that is designed
primarily to support workstations, personal computers
and, in some instances, older terminals that are
connected on a local area network (LAN). The software
behind a NOS allows multiple devices within a network
to communicate and share resources with each other.
Directions. Answer the given question below. Please refer to page 22 for the
rubrics.
1. Aside from the given advantages and disadvantages of network operating system,
cite at least three advantages and disadvantages of a network operating system.
a. Advantages:
______________________________________________________________
______________________________________________________________
______________________________________________________________
b. Disadvantages.
______________________________________________________________
______________________________________________________________
______________________________________________________________
✓ There are two types of network operating system, one is the peer-to-peer, and
the other one is the client-to-server. Create a Ven Diagram showing the
differences and similarities of the two network operating system.
16
Post Test:
Directions: Choose the best answer. Write the letter of the correct answer.
1. It provides the several functionalities for managing the data, applications, security,
and other functions.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
2. A network operating system wherein devices are connected directly to each other
without any additional networking devices between them.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
3. In this type of network operating system, the server provides the requested
information or service to the client.
a. Client-Server c. Peer to Peer
b. Network Operating System d. Fully peer-to-peer Network
4. Which of the following is not a communication medium?
a. coaxial cable c. Guided media
b. fiber optic cables d. router
7. Which of the following should be done first before Setting Up Peer-to-Peer Network
Operating System?
a. Input an IP address which came from the DNS server
b. Make sure both systems have Network Interface Cards (NICs) installed and
are using the proper cables.
c. Peer casting for multicasting streams where to use on demand content delivery.
d. Search a communication network.
17
9. These are some programs which are installed on the network machines.
a. Application Components c. People Components
b. Hardware Components d. Software Components
10. There are some devices which are physically connected with each other.
a. Application Components c. People Components
b. Hardware Components d. Software Components
12. If you have a DNS system and your connected to ISP you can input an _______
address which came from the DNS server
a. Default gateway c. Preferred DNS
b. IP d. Subnet
13. If the shared folder does not appear to network windows dialog box, what do you
need to press to refresh the screen?
a. F1 c. F5
b. b. F2 d. F10
14. Which part of the IP Address are you going too change if you are setting up a peer-
to-peer network?
a. first c. third
b. b. 2nd d. fourth
15. Which of the following are you going to put a checkmark under the general tab of
TCP/IP Porperties?
a. Client for Microsoft Network, Computer Description, Internet Protocol (TCP/IP)
b. Client for Microsoft Network, File and Printer Sharing, Internet Protocol
(TCP/IP)
c. Full Control, Read, Change, Allow
d. Full Control, Read, Change, Write
1. Enumerate the steps that you need to do before setting up a peer-to-peer network?
________________________________________________________________
________________________________________________________________
________________________________________________________________
18
2. Create a short outline in setting up a peer-to-peer network. (You can use an
illustration to show the procedure/steps).
19
References
Google. Er R S. Banger , “ Network Operating System (NOS) Tutorial, Examples and Types”,
February 10, 2020
http://digitalthinkerhelp.com/network-operating-system-nos-tutorial-examples-and-
types/
Google. Margaret Rouse, TechTarget, “Network Operating System (NOS)”, updated in May
2019
https://searchnetworking.techtarget.com/definition/network-operating-system
Google SlideShare. Eric Talamisan, Education, “CSS NC II - Core 3 Set-up Computer Server”,
Published on Jul 18, 2020, pp: 6 – 14
https://www2.slideshare.net/erictalamisan/css-nc-ii-core-3-setup-computer-server
Rosalie P. Lucero et al, Basic Education Curriculum, Technology and Livelihood Education
Grade 10 “Computer Hardware Servicing” Learners Materials
21
Appendices
CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar
Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely
20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _
22
For inquiries or feedback, please write or call:
23