ICT-CSS-12 Q1 W2 Mod 4
ICT-CSS-12 Q1 W2 Mod 4
Department of Education
National Capital Region
DIVISION OF CITY SCHOOLS – MANILA
Manila Education Center Arroceros Forest Park
Antonio J. Villegas St. Ermita, Manila
YOUR PEER TO
PEER NETWORK
Quarter 1 Week 2 Module 2
Before starting the module, I want you to set aside other tasks that will disturb you while
enjoying the lessons. Read the simple instructions below to successfully enjoy the objectives of
this kit. Have fun!
1. Follow carefully all the contents and instructions indicated in every page of this module.
2. Write on your notebook the concepts about the lessons. Writing enhances learning, that is
important to develop and keep in mind.
3. Perform all the provided activities in the module.
4. Let your facilitator/guardian assess your answers using the answer keycard.
5. Analyze conceptually the posttest and apply what you have learned.
6. Enjoy studying!
Expectations - These are what you will be able to know after completing the lessons in the
module.
Pre-test - This will measure your prior knowledge and the concepts to be mastered throughout
the lesson.
Looking Back to your Lesson - This section will measure what learnings and skills did you
understand from the previous lesson.
Brief Introduction- This section will give you an overview of the lesson.
Activities - This is a set of activities you will perform with a partner.
Remember - This section summarizes the concepts and applications of the lessons.
Check your Understanding- It will verify how you learned from the lesson.
Post-test - This will measure how much you have learned from the entire module.
2
PRE - TEST
DIRECTION : Write the correct answer on the spaces provided. Write letter only.
1) In Windows 7 there are four possible network locations assigned to each new network
connection. Which of the following are Windows 7 network connection types? (Choose two.)
1. Office c. Private
2. Work d. School
2) An alternative solution to using dual boot environments is to use .
1. Hosts c. Virtualization software
2. Web based PCs d. Client Servers
3) What is the “trick” used by Windows 7 to allow applications to run that
required Administrator or Power User privileges in previous versions of
Windows?
1. File and registry redirection c. Group policy
2. Regedit d. Run as command
4) Which of these tools would you use to perform offline maintenance of a Windows 7
installation image?
1. Application Compatibility Toolkit c. User State Migration Tool
2. AIK d. DISM
5) The Action Center is found in which Control Panel category?
1. System and Security c. Hardware and Sound
2. Programs d. User Accounts and Safety
6) The Local intranet zone in Internet Explorer security options is used for .
1. Workstations that are part of a Domain. c All computers
2. Workstations that will not be using the Internet. d. Restricting sites from local workstations
7) When assigning permissions using the Advanced options, it is suggested to assign the
Full Control share permission to Everyone and then use NTFS permissions to control
access to the folder or files. Why is this a good idea?
1. So everyone can see the folder from the network.
2. So the Network Sharing passwords are the same.
3. So that users permission are the same locally and over the network.
4. This question presents an untrue situation.
8) In Windows 7, if you want to share a folder with Nancy, who logs onto another computer,
you must create a user account for Nancy on your Windows 7 computer, and then give
the local user Nancy permission to access the folder.
1. True b. False
9) Which of the following will allow for a secure logon in Windows 7?
1. Windows key + S c. Shift :+Alt+Delete
2. Ctrl + Alt + Delete d, Windows keys + L
10) Backup data can be stored on .
1. Internal Hard disk c. CD/DVD RW
2. USB drives`` d. All of the above is correct
3
BRIEF INTRODUCTION
LEARNING CONTENT
Introduction
Users first must be identified as authorized user, such as by logging in with
user name and password to laptop computer, because laptop connects to corporate
network that contains critical data, important also to restrict user access to only
software, hardware, and other resources for which user has been approved. These
two acts—authenticating only approved users and controlling their access to
resources—are important foundations in information security
4
TECHNICAL ACCESS CONTROL PROCESS access control models
5
ACTIVITY 1
6
CHECK YOUR UNDERSTANDING
ACTIVITY 2
Direction: Based on the picture, read and answer the given questions. Write your answer on
your notebook.
Objectives:
Objectives
1. Perform a clean installation
2. Install Windows 7
3. Manage user access control
7
LEARNING CONTENT
Before installation ..
Things you must know before starting to install windows 7. What is the system
requirements. Which version of Windows 7 ?The compatibility of hardware and
software.Which type of installation ? Back up and restore existing data. partition the
hard drive and file system.
System requirements
8
Step 3 ‘Starting Windows’ with the
Windows7 logo will appear.
9
Where do you want to install windows?” Make
sure the artition is highlighted.
Delete the partition by clicking on Drive
options (advanced) on the bottom right
corner of the field
Make sure the partition is highlighted and
click on Delete. If drive advanced options is
greyed out, then the partition will not have to
be deleted.
*NOTE: Deleting the partitions will erase all
Data on the system
10
The next step will prompt you to create a
password for your account (optional).
11
The installation is done! You have successfully
installed Windows 7 on yourZT computer.
ACTIVITY 1
Direction: TRUE OR FALSE .WRITE THE ANSWER ON YOUR NOTES
12
TOPIC: User Account Control (UAC)
Objectives
LEARNING CONTENT
User Account Control (UAC) is a mandatory
access control enforcement facility introduced
with Microsoft's Windows Vistaand Windows
Server 2008 operating systems, with more
relaxed version also present in Windows 7,
Windows
How does a User Account Control (UAC) prompt look and what does it share and
request? When you double-click on a file, a setting or an app that is about to make
important changes to Windows, you are shown a User Account Control (UAC)
prompt. If your user account is an administrator, the prompt looks like in the
screenshot below. There you can see the UAC prompt in Windows 10 (top), in
Windows 7 (middle) and Windows 8.1 (bottom).
13
When this happens, you need to enter the
administrator's PIN or password and press
Yes. Unless both actions are performed, the
changes that are requested are not made.
ACTIVITY 1
Direction: IN YOUR OWN UNDERSTANDING - Write your answer on your notes
1. What is User Account Control (UAC) in Windows?
2. How does a User Account Control (UAC) prompt look and what does it share and
request?
3. How do I know that a file or setting will trigger a UAC prompt?
4. What is different between UAC levels in Windows?
5. Should I disable UAC when I install desktop apps and turn it on afterward?
14
POST - TEST
DIRECTION : Write the correct answer on the spaces provided. Write letter only.
1) In Windows 7 there are four possible network locations assigned to each new
network connection. Which of the following are Windows 7 network connection
types? (Choose two.)
a. Office c. Private
b. Work d. School
2) An alternative solution to using dual boot environments is to use
.
a. Hosts c. Virtualization software
b. Web based PCs d. Client Servers
3) What is the “trick” used by Windows 7 to allow applications to run that
required Administrator or Power User privileges in previous versions of
Windows?
a. File and registry redirection c. Group policy
b. Regedit d. Run as command
4) Which of these tools would you use to perform offline maintenance of a Windows 7
installation image?
a. Application Compatibility Toolkit c. User State Migration Tool
b. AIK d. DISM
5) The Action Center is found in which Control Panel category?
a. System and Security c. Hardware and Sound
b. Programs d. User Accounts and Safety
6) The Local intranet zone in Internet Explorer security options is used for
.
a. Workstations that are part of a Domain. c All computers
b. Workstations that will not be using the Internet. d. Restricting sites from local
workstations
7) When assigning permissions using the Advanced options, it is suggested to
assign the Full Control share permission to Everyone and then use NTFS
permissions to control access to the folder or files. Why is this a good idea?
a. So everyone can see the folder from the network.
b. So the Network Sharing passwords are the same.
c. So that users permission are the same locally and over the network.
d. This question presents an untrue situation.
8) In Windows 7, if you want to share a folder with Nancy, who logs onto another
computer, you must create a user account for Nancy on your Windows 7
computer, and then give the local user Nancy permission to access the folder.
a. True b. False
9) Which of the following will allow for a secure logon in Windows 7?
a. Windows key + S c. Shift :+Alt+Delete
b. Ctrl + Alt + Delete d, Windows keys + L
10) Backup data can be stored on .
a. Internal Hard disk c. CD/DVD RW
b. USB drives`` d. All of the above is correct
15
REFLECTIVE LEARNING SHEET
I learned that…
https://en.wikipedia.org/wiki/User_Account_Control
16