0% found this document useful (0 votes)
64 views16 pages

ICT-CSS-12 Q1 W2 Mod 4

The document provides instructions for setting up a peer-to-peer network and configuring user access on a Windows 7 computer. It discusses identifying authorized users and restricting access to approved software, hardware, and resources. It defines access control and the processes of identification, authentication, and authorization. The document instructs the user to perform a clean Windows 7 installation, install the operating system, and manage user access control. It also discusses system requirements for Windows 7 and the differences between 32-bit and 64-bit versions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views16 pages

ICT-CSS-12 Q1 W2 Mod 4

The document provides instructions for setting up a peer-to-peer network and configuring user access on a Windows 7 computer. It discusses identifying authorized users and restricting access to approved software, hardware, and resources. It defines access control and the processes of identification, authentication, and authorization. The document instructs the user to perform a clean Windows 7 installation, install the operating system, and manage user access control. It also discusses system requirements for Windows 7 and the differences between 32-bit and 64-bit versions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Republic of the Philippines

Department of Education
National Capital Region
DIVISION OF CITY SCHOOLS – MANILA
Manila Education Center Arroceros Forest Park
Antonio J. Villegas St. Ermita, Manila

Information and Communication Technology (ICT) -


Computer System Servicing (CSS) Grade 12

YOUR PEER TO
PEER NETWORK
Quarter 1 Week 2 Module 2

Learning Competency: Lesson 10-Setting-up computer server


Learning Objective: Setup user access
HOW DO YOU USE THIS MODULE?

Before starting the module, I want you to set aside other tasks that will disturb you while
enjoying the lessons. Read the simple instructions below to successfully enjoy the objectives of
this kit. Have fun!
1. Follow carefully all the contents and instructions indicated in every page of this module.
2. Write on your notebook the concepts about the lessons. Writing enhances learning, that is
important to develop and keep in mind.
3. Perform all the provided activities in the module.
4. Let your facilitator/guardian assess your answers using the answer keycard.
5. Analyze conceptually the posttest and apply what you have learned.
6. Enjoy studying!

PARTS OF THE MODULE

 Expectations - These are what you will be able to know after completing the lessons in the
module.

Pre-test - This will measure your prior knowledge and the concepts to be mastered throughout
 the lesson.
Looking Back to your Lesson - This section will measure what learnings and skills did you
 understand from the previous lesson.
 Brief Introduction- This section will give you an overview of the lesson.
 Activities - This is a set of activities you will perform with a partner.
 Remember - This section summarizes the concepts and applications of the lessons.
 Check your Understanding- It will verify how you learned from the lesson.
Post-test - This will measure how much you have learned from the entire module.

LESSON 1 – USER LEVEL CONFIGURATION


EXPECTATION:
 Create user folder in accordance with Network operating system features
 Configure user access level based on NOS features
 Establish network access policies/end user requirements

2
PRE - TEST

DIRECTION : Write the correct answer on the spaces provided. Write letter only.

1) In Windows 7 there are four possible network locations assigned to each new network
connection. Which of the following are Windows 7 network connection types? (Choose two.)
1. Office c. Private
2. Work d. School
2) An alternative solution to using dual boot environments is to use .
1. Hosts c. Virtualization software
2. Web based PCs d. Client Servers
3) What is the “trick” used by Windows 7 to allow applications to run that
required Administrator or Power User privileges in previous versions of
Windows?
1. File and registry redirection c. Group policy
2. Regedit d. Run as command
4) Which of these tools would you use to perform offline maintenance of a Windows 7
installation image?
1. Application Compatibility Toolkit c. User State Migration Tool
2. AIK d. DISM
5) The Action Center is found in which Control Panel category?
1. System and Security c. Hardware and Sound
2. Programs d. User Accounts and Safety
6) The Local intranet zone in Internet Explorer security options is used for .
1. Workstations that are part of a Domain. c All computers
2. Workstations that will not be using the Internet. d. Restricting sites from local workstations
7) When assigning permissions using the Advanced options, it is suggested to assign the
Full Control share permission to Everyone and then use NTFS permissions to control
access to the folder or files. Why is this a good idea?
1. So everyone can see the folder from the network.
2. So the Network Sharing passwords are the same.
3. So that users permission are the same locally and over the network.
4. This question presents an untrue situation.
8) In Windows 7, if you want to share a folder with Nancy, who logs onto another computer,
you must create a user account for Nancy on your Windows 7 computer, and then give
the local user Nancy permission to access the folder.
1. True b. False
9) Which of the following will allow for a secure logon in Windows 7?
1. Windows key + S c. Shift :+Alt+Delete
2. Ctrl + Alt + Delete d, Windows keys + L
10) Backup data can be stored on .
1. Internal Hard disk c. CD/DVD RW
2. USB drives`` d. All of the above is correct

3
BRIEF INTRODUCTION

A user is a person who utilizes a computer or network service. Users of


computer systems and software products generally lack the technical expertise
required to fully understand how they work. A user often has a user account
and is identified to the system by a username (or user name).

TOPIC: USER LEVEL CONFIGURATION


Objectives
1. Identify user level access
2. Described access control

LEARNING CONTENT

Introduction
Users first must be identified as authorized user, such as by logging in with
user name and password to laptop computer, because laptop connects to corporate
network that contains critical data, important also to restrict user access to only
software, hardware, and other resources for which user has been approved. These
two acts—authenticating only approved users and controlling their access to
resources—are important foundations in information security

What is Access control?

Access control - granting or denying approval to use specific resources; it is


controlling access.
Physical access control - fencing, hardware door locks, and mantraps that
limit contact with devices
Technical access control - technology restrictions that limit users on
computers from accessing data.

ACCESS CONTROL TERMINOLOGY


Identification – presenting credentials ( Example : Delivery driver presenting
employee badge).
Authentication – Checking credentials ( Example: Examining the delivery driver’s
badge)
Authorization – granting permission to take action

4
TECHNICAL ACCESS CONTROL PROCESS access control models

• access control model - hardware and software predefined


framework that custodian can use for controlling access
• access control models used by custodians for access control
are neither created nor installed by custodians or users;
instead, these models are already part of software and
hardware.

Access Control Models

dac - least restrictive model


mac - opposite of dac and is most restrictive access control model uac -
user/admin level model that notifies or requires authentication prior to
granting access

5
ACTIVITY 1

6
CHECK YOUR UNDERSTANDING

ACTIVITY 2

Direction: Based on the picture, read and answer the given questions. Write your answer on
your notebook.

Base on the picture below .

Illustrate the workflow of access control to be administer on the network


Who are the responsible person in the picture
TOPIC: ELEMENTS OF DESIGN
(Lines and Texture)

Objectives:

1. Give the uses of lines as design elements in constructing garments.


2. Differentiate the two types of texture.
3. Explain the effect of fabric texture to garments and to the wearer.

LESSON 2 – Set up peer-to-peer (P2P) network access

TOPIC: Windows 7 Installation

Objectives
1. Perform a clean installation
2. Install Windows 7
3. Manage user access control

7
LEARNING CONTENT
Before installation ..
Things you must know before starting to install windows 7. What is the system
requirements. Which version of Windows 7 ?The compatibility of hardware and
software.Which type of installation ? Back up and restore existing data. partition the
hard drive and file system.

System requirements

Two versions of Windows?


 The terms 32-bit and 64-bit refer to the way a computer's processor (also called
a CPU), handles information.
 The 64-bit version of Windows handles large amounts of random access
memory (RAM) more effectively than a 32-bit system.
 How can I tell if my computer is running a 32- bit or a 64-bit version of Windows?

To find out if your computer is running a 32-bit or 64-bit version of Windows in


Windows 7 or Windows Vista, do the following:
 Open System by clicking the Start button ,right- clicking Computer, and then
clicking Properties. Under System, you can view the system type.
 In order to install your copy of the Windows 7 operating system please make
sure to have the following items:
Windows 7 Installation disk
- Drivers CD: * Use after installation process if needed.
*NOTE: Please make sure to lack up all of your important data before proceeding
with this installation.

Step 1. Insert the Windows 7 operating system disk


into your DVD drive, and then restart your computer
Step 2. You will see a prompt that says ‘Press any
key to continue’ after the ZT logo disappears.

When you see this press any key immediately.


*NOTE: The following screen shots may differ from
what you may see during your installation. (i.e.
Win7 version, HDD disk space etc..)

8
Step 3 ‘Starting Windows’ with the
Windows7 logo will appear.

Language options, by default English will be


set along with “time and currency format”
and “keyboard or input.

Click “Install Now

End User License Agreement (E.U.L.A.),


check the box to accept, and click “Next”

Which type of installation?” window will


appear. Upgrade will be greyed out; the only
option you sh should be able to choose is
Custom (advanced).

9
Where do you want to install windows?” Make
sure the artition is highlighted.
Delete the partition by clicking on Drive
options (advanced) on the bottom right
corner of the field
Make sure the partition is highlighted and
click on Delete. If drive advanced options is
greyed out, then the partition will not have to
be deleted.
*NOTE: Deleting the partitions will erase all
Data on the system

Disk 0 Unallocated Space should be the


only listing at this point. If it is press next, If
not please proceed to delete any additional
partitions that may be listed.

The next screen will show “Installing


Windows”. This process should take
approximately 10 minutes after which the
system will reboot

*NOTE: Do not press any keys during this


boot up process so as to not disturb the
rest of the installation

The next screen will show “Installing Windows”


again to complete the installation process.

“Setup is starting Windows” will appear on the


screen, then you will be asked to create a user
name and a computer name

10
The next step will prompt you to create a
password for your account (optional).

The next screen will come up and ask you


to choose one of three options: “Use
recommended settings”,

“Install important updates only” and “Ask


me later”.

This screen will allow you to local time zone


and also adjust the date and time.

Click on the appropriate location of your computer


to enable Windows 7 to apply the correct network
settings.

11
The installation is done! You have successfully
installed Windows 7 on yourZT computer.

ACTIVITY 1
Direction: TRUE OR FALSE .WRITE THE ANSWER ON YOUR NOTES

1. The various types of Windows (windows starter, home basic,Premium,


Professional, Enterprise and Ultimate)are all the same price ?
True or False
2. A retails prices of a OEM(Original Equipment Manufacturer)cost less but can
only installed on a new PC for resale ?
True or False
3. If you want to install 64bit version of windows on a computer that has 32 bit
windows OS, you must perform clean install ?
True or False
4. There are many different ways to install windows on a PC such as
downloading windows, using an external DVD drive, or using a USB FLASH
DRIVE ?
5. An upgrade from windows vista to windows 7 carries application and user
setting forward into the new installation
True or false

12
TOPIC: User Account Control (UAC)
Objectives

1. Learn what is User Account Control

LEARNING CONTENT
User Account Control (UAC) is a mandatory
access control enforcement facility introduced
with Microsoft's Windows Vistaand Windows
Server 2008 operating systems, with more
relaxed version also present in Windows 7,
Windows

Server 2008 R2, Windows 8, Windows Server


2012 and Windows 10. It aims to improve the
security of Microsoft Windows by limiting
application software to standard user
privileges until an administrator authorizes an
increase or elevation.

What is User Account Control (UAC) in Windows?

User Account Control or UAC is a security feature of Windows which helps


prevent unauthorized changes to the operating system. These changes can be
initiated by applications, users, viruses or other forms of malware. User Account
Control makes sure certain changes are made only with approval from the
administrator. If the changes are not approved by the administrator, they are not
executed, and Windows remains unchanged. It is as if nothing happened.

How does a User Account Control (UAC) prompt look and what does it share and
request? When you double-click on a file, a setting or an app that is about to make
important changes to Windows, you are shown a User Account Control (UAC)
prompt. If your user account is an administrator, the prompt looks like in the
screenshot below. There you can see the UAC prompt in Windows 10 (top), in
Windows 7 (middle) and Windows 8.1 (bottom).

In Windows 7 and Windows 8.1, the


UAC prompt always requests the
administrator's password, as shown
below.

13
When this happens, you need to enter the
administrator's PIN or password and press
Yes. Unless both actions are performed, the
changes that are requested are not made.

The UAC prompt also has a link that says


"Show more details" (in Windows 10) or
"Show details" (in Windows 7 and Windows
8.1). If you click on it, you see more
information including the exact location on
the disk of the program or file and the
publisher's certificate, which shows you
more information about who created what
you want to run.

How do I know that a file or setting will


trigger a UAC prompt?

Files that trigger a UAC prompt when run


have the UAC symbol on the bottom-right
corner of their file icon, similar to the
screenshot below.

How does User Account Control (UAC) work?


In Windows, applications run by default
without any administrative permissions. They
have the same permissions a standard user
account has: they cannot make any
changes to the operating system, its system
files or registry settings.
For an easier understanding, the UAC
algorithm is explained in the diagram below.

ACTIVITY 1
Direction: IN YOUR OWN UNDERSTANDING - Write your answer on your notes
1. What is User Account Control (UAC) in Windows?
2. How does a User Account Control (UAC) prompt look and what does it share and
request?
3. How do I know that a file or setting will trigger a UAC prompt?
4. What is different between UAC levels in Windows?
5. Should I disable UAC when I install desktop apps and turn it on afterward?

14
POST - TEST

DIRECTION : Write the correct answer on the spaces provided. Write letter only.

1) In Windows 7 there are four possible network locations assigned to each new
network connection. Which of the following are Windows 7 network connection
types? (Choose two.)
a. Office c. Private
b. Work d. School
2) An alternative solution to using dual boot environments is to use
.
a. Hosts c. Virtualization software
b. Web based PCs d. Client Servers
3) What is the “trick” used by Windows 7 to allow applications to run that
required Administrator or Power User privileges in previous versions of
Windows?
a. File and registry redirection c. Group policy
b. Regedit d. Run as command
4) Which of these tools would you use to perform offline maintenance of a Windows 7
installation image?
a. Application Compatibility Toolkit c. User State Migration Tool
b. AIK d. DISM
5) The Action Center is found in which Control Panel category?
a. System and Security c. Hardware and Sound
b. Programs d. User Accounts and Safety
6) The Local intranet zone in Internet Explorer security options is used for
.
a. Workstations that are part of a Domain. c All computers
b. Workstations that will not be using the Internet. d. Restricting sites from local
workstations
7) When assigning permissions using the Advanced options, it is suggested to
assign the Full Control share permission to Everyone and then use NTFS
permissions to control access to the folder or files. Why is this a good idea?
a. So everyone can see the folder from the network.
b. So the Network Sharing passwords are the same.
c. So that users permission are the same locally and over the network.
d. This question presents an untrue situation.
8) In Windows 7, if you want to share a folder with Nancy, who logs onto another
computer, you must create a user account for Nancy on your Windows 7
computer, and then give the local user Nancy permission to access the folder.
a. True b. False
9) Which of the following will allow for a secure logon in Windows 7?
a. Windows key + S c. Shift :+Alt+Delete
b. Ctrl + Alt + Delete d, Windows keys + L
10) Backup data can be stored on .
a. Internal Hard disk c. CD/DVD RW
b. USB drives`` d. All of the above is correct
15
REFLECTIVE LEARNING SHEET

I learned that…

https://en.wikipedia.org/wiki/User_Account_Control

16

You might also like