Remediation - Ict10cssii 2
Remediation - Ict10cssii 2
REMEDIATION ACTIVITIES
Contents:
Assessment Criteria
Conditions
1. Workplace Location
2. Computer Network materials:
1. UTP Cable
2. RJ45
3. Router/Hub
4. Modem
3. Personal Computer
4. Training Materials
1. Learning Packages
2. Bond Papers
3. Ballpens
4. Whiteboard Marker
5. Manuals
6. Competency Standard
7. Training Regulations
Assessment Method:
1. Written Works
2. Actual Application
3. Performance Criteria
Learning Experiences
Learning Outcome
Learning Objective:
After reading this information sheet, you must be able to:
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This process is
handled automatically if you're using a router. Think of an IP address as a
mailing address. Each computer on the network needs a unique IP address
so that information sent across the network reaches the correct destination.
Click I nt
ernet
Protocol Version 4
(TCP/IPv4) . Make
sure you don't
uncheck it, just
highlight it.
Click Properties.
Type 192.168
. 1. 5 0 into
the IP address
field.
Type 255.255
. 0. 0 into the
Subnet
mask field.
Type 192.168.
0. 0 i nto the
Default
gateway
field.
Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.
TRUE OR FALSE: Write the word TRUE in the space provider if the
statements are correct and FALSE if it is not.
______2. On Windows 10 OS, to set up the Time and Date go to the upper
left of your taskbar.
______8. In setting up the Time Zone, you could use "Philippines" for the
setting.
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
When Equipments and Peripherals are all ready, we will now proceed
on Installing and Configuring Local Area Network. Below are steps in
configuring Local Area Network.
10. Click the Network Tab. And change your IP Address. Take note
on the Sequence of your IP Address. Save and it will reboot.
11. Go to DHCP Tab, just click the Disable Button. And the browser
will reboot.
ASSESSMENT. 1.3-2
provided.
__________8. A tab on your Router Portal that can be used to change your IP
Address.
Personal Computer
Steps/ Procedure:
1. Prepare your Workplace
a. Make sure that you have the necessary Materials/Peripherals
b. Make sure that the workplace is clean and dry.
2. Start
a. Connect Router and Personal Computer using your Ethernet Cable
b. Reset your Router using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer
d. Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab
g. Set up DHCP Tab
Assessment Method:
CRITERIA YES NO
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
4. Repeat
the step
shown
on
Rearrange the given steps on how to configure WAN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.
______3. Go to Network Tab. Change your IP address. Click Save then it will
reboot.
______4. Reset the Modem. In resetting your Modem just click the small
button at the back and wait until all the icons in front of the Modem will
Lights on.
______7. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and password.
Personal Computer
Steps/ Procedure:
3. Prepare your Workplace
a. Make sure that you have the necessary Materials/Peripherals
b. Make sure that the workplace is clean and dry.
4. Start
a. Connect Modem and Personal Computer using your Ethernet Cable
b. Reset your Modem using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer)
d. Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab
g. Set up DHCP Tab
h. Set up Wireless Tab
Assessment Method:
CRITERIA YES NO
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
A wireless local area network (WLAN) links two or more devices over a
short distance using a wireless distribution method, usually providing a
connection through an access point for internet access. The use of spread-
spectrum or OFDM technologies may allow users to move around within a
local coverage area, and still remain connected to the network.
Products using the IEEE 802.11 WLAN standards are marketed under
the Wi-Fi brand name. Fixed wireless technology implements point-to-
point links between computers or networks at two distant locations, often
using dedicated microwave or modulated laser light beams over line of
sight paths. It is often used in cities to connect networks in two or more
buildings without installing a wired link.
After you have all the equipment, you'll need to set up your modem and
Internet connection. If your modem wasn't set up for you by your Internet
service provider (ISP), follow the instructions that came with your modem to
connect it to your PC and the Internet. If you're using Digital Subscriber
Line (DSL), connect your modem to a phone jack. If you’re using cable,
connect your modem to a cable jack.
b. Position the wireless router off the floor and away from
walls and metal objects, such as metal file cabinets. The fewer
physical obstructions between your PC and the router's signal,
the more likely that you'll be using the router's full signal
strength.
Change the default user name and password. This helps protect your
router. Most router manufacturers have a default user name and password
on the router and a default network name (also known as the SSID).
Someone could use this info to access your router without you knowing it.
To help avoid that, change the default user name and password for your
router. See the documentation for your device for instructions.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports
WPS and its connected to the network, follow these steps to set up a
network security key:
1. Select the Start button, look for Control Panel and click Network and
Internet. Then look for Network and Sharing Center.
The wizard will walk you through creating a network name and a security
key. If your router supports it, the wizard will default to Wi-Fi Protected
Access (WPA or WPA2) security. We recommend that you use WPA2,
because it offers better security than WPA or Wired Equivalent Privacy
(WEP) security. With WPA2 or WPA you can also use a passphrase, so you
don’t have to remember a cryptic sequence of letters and numbers.
Write down your security key and keep it in a safe place. You can also
save your security key on a USB flash drive by following the instructions in
the wizard. (Saving your security key to a USB flash drive is available in
Windows 8 and Windows 7, but not in Windows 10.)
2. In the list of networks, choose the network that you want to connect
to, and then select Connect.
ASSESSMENT. 1.3-4
Rearrange the given steps on how to configure WAN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.
_____5. Select the Start button, look for Control Panel and click Network and
Internet.
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
8. In the Properties window, you will find complete information about the
selected rule, what it does and in when it is applied. You will also be
able to edit its properties and change any of the available parameters.
9. What Are The Connection Security Rules?
a. Connection security rules are used to secure traffic between two
computers while it crosses the network. One example would be a rule
which defines that connections between two specific computers must
be encrypted.
b. Unlike the inbound or outbound rules, which are applied only to one
computer, connection security rules require that both computers have
the same rules defined and enabled.
c. If you want to see if there are any such rules on your computer, click
or tap "Connection Security Rules"on the panel on the left. By default,
there are no such rules defined on Windows computers and devices.
They are generally used in business environments and such rules are
set by the network administrator.
10. What Does the Windows Firewall with Advanced Security
Monitor?
11. You should note that the Monitoring section shows only the
active rules for the current network location. If there are rules which
get enabled for other network locations, you will not see them in this
section.
ASSESSMENT. 1.3-5
TRUE OR FALSE: Write the word TRUE in the space provider if the
________3. In order to provide the security you need, the Windows Firewall
has a standard set of inbound and outbound rules.
________4. These rules can't be configured so that they are specific to:
computers, users, programs, services, ports or protocols.
________5. In the Windows Firewall with Advanced Security, you can access
all rules and edit their properties.
________6. Connection security rules are used to secure traffic between two
computers while it crosses the network.
________7. Monitoring section shows only the active rules for the current
network location.
________8. Unlike the inbound or outbound rules, which are applied only to
one computer, connection security rules require that both computers have
the same rules defined and enabled.
________10. Inbound rules are applied to the traffic that is coming from the
network and the Internet to your computer or device.