Grade 10 MODULE
Grade 10 MODULE
Name:
________________________________
In today’s industry, almost every establishment needs the assistance of technology and uses technology in almost
every aspect of the workflow. These establishments and businesses are now transitioning their services towards the use
of information technology to promote them.
The demand for personnel who offers computer servicing and repair continues to rapidly increase as industries
changes automate their process. With that being said, these sectors require individuals that are capable of adapting to the
ever-increasing demand for support for those technologies.
In most cases, companies that provide services such as internet connections, telecommunication and the like have
technology that requires repairs and maintenance. Computer hardware, Network Infrastructure, and Computer Equipment
are some of the technologies that need the expert care of Computer System Servicing personnel.
What is
Computer System Servicing?
Computer Systems Servicing (CSS NCII) is the upgraded version of what is then
called Computer Hardware Servicing (CHS NCII)qualification. During the late
CHS, the qualification was said to be of the NCII level, meaning that in a
ranking basis, it is the baseline level.
Entrepreneurs are those with the skills and capabilities to see and evaluate business opportunities. They are
individuals who can strategically identify products or services needed by the community, and have the capacity to deliver
them at the right time and at the right place.
Entrepreneurs are agents of economic change; they organize, manage, and assume risks of a business. Some of the
good qualities of entrepreneurs are: opportunity-seeker, risk-taker, goal-setter, excellent planner, confident problem-
solver, hardworking, persistent and committed.
Entrepreneurship, on the other hand, is not just a simple business activity but a strategic process of innovation and
new product creation. Basically, entrepreneurship is both an art and science of converting business ideas into marketable
products or services to improve the quality of living.
Hardworking: One of the important characteristics of a good entrepreneur is hardworking. This means working
diligently and being consistent about it. Hardworking people keep improving their performance to produce good
products and/or provide good services.
Confident: Entrepreneurs have self-reliance in one’s ability and judgment. They exhibit self-confidence to cope
with the risks of operating their own business.
Disciplined: Successful entrepreneurs always stick to the plan and fight the temptation to do what is unimportant.
Committed: Good entrepreneurs assume full responsibility over their business. They give full commitment and
solid dedication to make the business successful.
Ability to accept change: Nothing is permanent but change. Change occurs frequently. When you own a
business, you should cope with and thrive on changes. Capitalize on positive changes to make your business
grow.
Has the initiative: An entrepreneur takes the initiative. You must put yourself in a position where you are
responsible for the failure or success of your business.
Profit-oriented: An entrepreneur enters the world of business to generate profit or additional income. The
business shall become your bread and butter. Therefore, you must see to it that the business can generate income.
Excellent planner: Planning involves strategic thinking and goal setting to achieve objectives by carefully
maximizing all the available resources. A good entrepreneur develops and follows the steps in the plans diligently
to realize goals. A good entrepreneur knows that planning is an effective skill only when combined with action.
Possesses people skills: This is a very important skill needed to be successful in any kind of business. People
skills refer to effective and efficient communication and establishing good relationship to the people working in
and out of your business. In day-to-day business transactions, you need to deal with people. A well-developed
interpersonal skill can make a huge difference between success and failure of the business.
Sound decision maker: Successful entrepreneurs have the ability to think quickly and to make wise decisions
towards a pre-determined set of objectives. No one can deny that the ability to make wise decisions is an
important skill that an entrepreneur should possess. Sound decisions should be based on given facts and
information and lead towards the pre-determined objectives.
Safety Procedures
This tab allows you to make the same adjustments you can make in the
Boot Windows boot.ini file without having to edit the file. It shows configuration
options for the operating system and advanced debugging settings.
The Services tab allows you to enable or disable any of the Microsoft
Services Windows services or other program services running on the computer.
The Startup tab is one of the most frequent reasons most Windows users enter
Startup the System Configuration utility.
This Provides a convenient list of diagnostic tools and other advanced tools
Tools that you can run.
Use common sense when installing cables and fixing network problems. Call for assistance for tasks that
you cannot do on your own.
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
Dangerous chemicals
Tools with sharp edges
Light which you cannot see that can burn your eyes
Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Specific types of tools and chemicals are used when working with fiber-optic cable. These materials must be
handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle them with extreme care.
Read the instructions on the label, and follow them carefully. Also, read the material safety data sheet (MSDS)
that accompanies the chemicals to know how to treat someone in case of emergency.
Tools
When working with any tool, safety should always be your first priority. Any compromise in safety could
result in serious injury or even death. The tools used for working with fiber optics have sharp cutting surfaces that
are used to scribe glass. Other tools pinch cables with high pressure to fasten connectors to them. These tools can
produce shards of glass that can splinter and fly into the air. You must avoid getting them on your skin and in your
mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of glass
or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be extremely difficult to
see on your skin because they are clear and small. When you work with fiber-optic cabling, the working surface
You should keep the work area clean and neat. Never pick-up fiber-optic fragments with your fingers. Use
tape to pick up small fragments, and dispose them off properly. Use a disposable container, such as a plastic bottle
with a screw-on lid, to store fiber fragments. Close the lid tightly before disposing the container.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color that
humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier to inspect fiber-
optic cable and connectors, the light emitted from the fiber could be directed into your eyes. When working with
fiber, be sure to disconnect the light source. Use special detectors to help you tell if a fiber is energized.
Twisted Pair
is a type of copper cabling that is used for telephone communications and most Ethernet networks. A
pair of wires forms a circuit that transmits data. The pair is twisted to provide protection against crosstalk, the
noise generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded
plastic insulation and are twisted together. An outer jacket protects the bundles of twisted pairs.
When electricity flows through a copper wire, a magnetic field is created around the
wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When the
two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is called the
cancellation effect. Without the cancellation effect, your network communications become slow because of the
interference caused by the magnetic fields.
Category Rating
UTP comes in several categories that are based on two factors:
The number of wires in the cable
The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Megabyte per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources and from the other wires
within the cable. Some Category 6 cables use a plastic divider to separate the pairs of wires, which prevents
interference. The pairs also have more twists than Category 5e cable.
Coaxial Cable
is a copper-cored cable surrounded by a heavy shielding. Coaxial
cable is used to connect the computers to the rest of the
network. Coaxial cable uses “British Naval Connectors (BNC)”
or “Bayonet Neill- Concelman” connectors, at the ends of the
cables to make the connection. Several types of coaxial cable
exist:
Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 500
meters.
Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 185
meters.
RG-59 is most commonly used for cable television in the U.S.
RG-6 is higher-quality cable than RG-59, with more bandwidth and less susceptibility to interference.
Fiber-Optic Cable
Ethernet cabling has been the standard in networking installation for years. It is the fastest way of
connecting PC to a peer or to your router or a central switch.
In an Ethernet networking environment – like in a home or an office with multiple PCs that are wired – the
computers need to be connected to a central router to allow data transfer. The router takes all the bits being sent
out by the computers and relays them onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a PC to a network hub and
router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network devices directly, without the
need for a router in the middle. It simply reverses some of the pins so that the output on one computer is being
sent to the input of another. Bear in mind that safety precautions must always be applied and observed during the
fabrication of the said cables.
Also, materials and tools to be used must always be complete and functional to save time, money and
effort.
The following items are the materials and tools used for making Ethernet cables:
Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
RJ45 crimpable connectors for Cat5e;
RJ45 Crimping tool;
Wire cutter, stripper or pliers; and
Ethernet cable tester.
Security Attacks
To successfully protect computers and the network, a technician must understand both of the following
types of threats to computer security:
Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information. Threats to
security can come from inside or outside an organization, and the level of potential damage can vary greatly. Potential
threats include the following:
Internal: Employees who have access to data, equipment, and the network. Internal attacks can be characterized as
follows:
Malicious threats are when an employee intends to cause damage.
Accidental threats are when the user damages data or equipment unintentionally.
External: Users outside an organization who do not have authorized access to the network or resources. External
attacks can be characterized as follows:
Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and
run programs designed to vandalize.
Structured attacks, which use code to access operating systems and software. Physical loss or damage to
equipment can be expensive, and data loss can be detrimental to your business and reputation. Threats
against data are constantly changing as attackers find new ways to gain entry and commit their crimes.
Computer viruses are created with malicious intent and sent by attackers.
A virus is attached to small pieces of computer code, software, or
ICT Tools for Digital Learners 15
M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
document. The virus executes when the software is run on a computer.
If the virus spreads to other computers, those computers could continue
to spread the virus. A virus is transferred to another computer through
e-mail, file transfers, and instant messaging. The virus hides by attaching
itself to a file on the computer. When the file is accessed, the virus
executes and infects the computer.
A virus has the potential to corrupt or even delete files on your computer,
use your e-mail to spread itself to other computers, or even erase your
hard drive. Some viruses can be exceptionally dangerous.
The most damaging type of virus is used to record keystrokes. Attackers can use these viruses to harvest sensitive
information, such as passwords and credit card numbers. Viruses may even alter or destroy information on a computer.
Stealth viruses can infect a computer and lay dormant until summoned by the attacker.
A worm is a self-replicating program that is harmful to networks. A worm uses the network to duplicate its code to the
hosts on a network, often without any user intervention. It is different from a virus because a worm does not need to
attach to a program to infect a host. Even if the worm does not damage data or applications on the hosts it infects, it harms
networks because it consumes bandwidth.
A Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a Trojan threat is hidden
in software that appears to do one thing, and yet behind the scenes it does another. Trojans often are disguised as useful
software. The Trojan program can reproduce or replicate like a virus and spread to other computers. Computer data
damage and production loss could be significant.
Security Procedures
You should use a security plan to determine what will be done in a critical situation.
Security plan policies should be constantly updated to reflect the latest threats to a network.
A security plan with clear security procedures is the basis for a technician to follow. Security plans should be
reviewed each year. Part of the process of ensuring security is conducting tests to determine areas where security is
weak. Testing should be done on a regular basis.
New threats are released daily. Regular testing provides details of any possible weaknesses in the current security
plan that should be addressed.
A network has multiple layers of
security, including physical, wireless,
and data. Each layer is subject to security
attacks. The technician needs to
understand how to implement security
procedures to protect equipment
and data.
Name: _________________________________________
Grade: _________________________________________
Activity 1:
Directions: Match the entrepreneurial competencies in column A with their meaning in column B. Write
the letter of the correct answer on the space provided before each number.
A B
Activity 2:
Directions: Write SECURITY if the underlined word on the subsequent statement makes it true and
VIRUS if it is makes the statement a false one then write the correct term/word to correct it. (2 points each).
Write your answer on the space provided.
1. Computer and network security help keep data and equipment safe. __________
2. A technician’s secondary responsibilities include data and network security. __________
3. Threats to security can come from inside and outside the organization. __________
4. Computer viruses are created and sent by attackers who have malicious intent. __________
5. A virus is transferred to another computer through e-mail, file transfer and instant messaging. __________
Activity 3:
True or False
Directions: Write TRUE if the statement is correct and FALSE if otherwise.
Activity 4:
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
Activity 5:
MS Configuration Command Classification
Directions: There are five functional tabs in MS Configuration utility, namely General, Boot, Services, Startup
and Tools. Classify the following items according to the tabs they belong to. Write your answer on the space
provided.
Activity 6:
Criss-Cross Puzzle Directions: Complete the criss-cross puzzle and familiarize yourself
of the cables being described. Write your answer in a clean sheet of paper.
CABLES
1 2
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
Activity 7:
Answer the following guide questions and submit it to your teacher. Write your answer in a
clean sheet of paper.
1. What are the different types of fiber connectors? Cite their advantages and disadvantages.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
__________________________________________________________
ICT Tools for Digital Learners 21
M.M. Ayesha Allian-Schuck
ICT Teacher
ASIA ACADEMIC SCHOOL
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________