ICT 10 Q3M2 Handouts Activity
ICT 10 Q3M2 Handouts Activity
10
3rd. Quarter
MINDANAO MISSION ACADEMY
of Seventh-day Adventists, Inc.
The School that Offers Something
Activity & Quiz Submission:
January 31, 2021
STUDENT’S
Grading NAME:
System:
Components Percentage ICT is one component of TLE. In computing your
Written Work 50% MAPEH grade, Music, Arts, Health & PE grades are
Performance Tasks 50% added and the sum is divided by 4,
PERFORMANCE STANDARDS
The learner independently demonstrates skills in configuring computer systems and networks as prescribed b
CONTENT STANDARD
The learner demonstrates understanding of the underlying concepts and principles on configuring comput
Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under
the Information and Communications Technology (ICT) Course. In this module, you will have a great
deal of understanding of Configuring Computer Systems and Networks.
At the end of this module you will be able to apply the knowledge and skills on planning and
preparing for configuration, configure computer systems and networks and inspecting configured
computer systems and networks. Those skills are essential for you to pass the National Certification
II in Computer Hardware Servicing.
In this module, topics will be introduced progressively for easy understanding. After carefully
answering the pre assessment exercises, reading all the lessons, answering all the guide questions, skil
fully performing all the activities, showing evidences of learning and finally answering the summative
test you will gain a considerable knowledge and skills in configuring computer systems and networks
essential to be successful in computer hardware servicing as one of the career option in ICT.
Reminder! Just follow the instructions given in this module. Now let us start exploring new things
in this module.
Ping
The ping is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network with another
computer or network device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request
messages to the destination computer and waiting for a response. How many of those responses
are returned, and how long it takes for them to return, are the two major pieces of information
that the ping command provides.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this
option, four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is
255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning
in Windows 7, this option no longer functions but still exists for
compatibility reasons.
-r count Use this ping command option to specify the number of
hops between the computer and the target computer or device
that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that
only the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with the -
4 option, is only necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP
address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.
1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
3)
Type ping followed by the IP address you desire to verify. The figure below shows the screen of
the ping command and its output.
Decoding names to network addresses — A domain name server (DNS) resolves machine
names to numeric addresses. A single machine can have many names, all of which resolve to the
same Internet address. In the example just given, the name www.google.com resolves to the Internet
address 122.2.152.23.
Round-trip response time — The parts of the replies that say things like time=105ms
show you how long it took from the time the client machine sent out the ping message until a reply
came back (1 ms is 1 millisecond, or one thousandth of a second). The variability in the times you see
reflects that networks do not always respond identically. Differing amounts of traffic on the
communication lines or differing loads on the server are common causes. You will see very different
response times depending on the access equipment you use.
Routing hop count — The part of the replies that says TTL=50 tells you about the route
the message took from one point to another. The acronym TTL stands for Time to Live, which is a
measure of how many rerouting from one point to another the packet has to go through before IP
declares it undeliverable. The number following TTL (called the hop count) is a number that usually
starts at 255 and counts down by one every time the message gets rerouted through an intermediary
computer.
Peer-to-Peer Network
In a peer-to-peer network, devices are connected directly to each other without any additional
networking devices between them, as shown in Figure 68. In this type of network, each device has
equivalent capabilities and responsibilities. Individual users are responsible for their own resources and
can decide which data and devices to share. Because of that, the network has no central point of
control or administration.
It allows certain files and folders to be shared with everyone or with selected users. Peer-to-
peer networks are quite common in small offices that do not use a dedicated file server. Files and
folders can be configured to allow network users to copy them, but not alter them in their original
location, which is a common safety precaution. However, files and folders can also be assigned a
"read/write" status that allows either selected users or all users on the network to change them.
Peer-to-peer networking differs from client-server networking, where certain devices have
responsibility for providing or "serving" data and other devices consume or otherwise act as "clients"
of those servers.
NOTE: For a direct network cable connection between two PCs (not with a hub, switch or rout
2. For PCs with Windows XP, the home networking wizard can be used to set up Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen instructions.
NOTE: If the Network setup wizard is unsuccessful, continue with the st eps below.
3. Click Start, Control Panel, Network and Internet Connections, and then Network Connections. At
Network Connection Windows, you will see the Local Area Connection Icon, Right click it and select
Properties. Local Area Connection window appears.
b. Put a check mark saying Show icon in notification area when connected.
c. Select the Internet Protocol (TCP/IP) and click the Properties
button
NOTE: If any of the above component is not installed, install them by selecting Add or Install,
MOMSPC2 = 192.168.0.2 ,
and WORKPC3 = 192.168.0.3 .
NOTE: 192.168.0.x is an IP Address reserved for private networks and is not routable to
7. Click the Computer Name tab and click the Change button.
8.Enter a name that describes the PC in the Computer Description field. For example, KIDSPC1,
MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup name for all PCs on the
network. Spelling is important in thisstep.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click the Network
Neighborhood icon on the desktop. If all went well, you should see all the PC names on the network
when files and folders are being shared. If you do not see them, press F5 to refresh the screen.
12. If after refreshing the network window, the other PCs still do not appear, check the
firewall settings that may be interfering with the communication.
1. On Desktop ==> Select My Computer ==> Right Click ==> Select properties.
11. Now enter the assigned IP address and then click OK.
12. Now open My network place ==> Click to change then Select Turn on network
discovery and file sharing.
Client-Server Network
In a client/server network, the server provides the requested information or service to the client.
Servers on a client/server network commonly perform some of the processing work for client
machines, such as sorting through a database before delivering only the records requested by the
client.
10
whole grading.
MINDANAO MISSION ACADEMY
(RETURN THIS TO
of Seventh-day Adventists, Inc.
The School that Offers Something Better YOUR TEACHER)
3rd. Quarter Activity Submission:
Manticao, Misamis Oriental
(MODULE 2) January 31, 2021
• • LEARNING MODULE FOR (ICT 10 – January Activity) • •
Teacher’s Name: Alex G. Mampalawod Facebook Account: https://www.facebook.com/alex.mampalawod
Degree: BSBA Major in Banking and Finance Gmail Account: [email protected]
Subjects handled: ICT 7, 8, 9, & 10. Contact number: 09062971241
STUDENT’S NAME:
Grading System:
Components Percentage ICT is one component of TLE. In computing your
Written Work 50% MAPEH grade, Music, Arts, Health & PE grades
Performance Tasks 50% are added and the sum is divided by 4,
Activity 1:
2. What are the different IP Classes? Discuss each briefly and give examples.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
4. What are the necessary procedures in calculating subnet mask or simply subneting? Show an
example solution for the calculation.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Recommended Equipment
Linksys 300N router
A computer running Window XP Professional
Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.
Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:” field?
2. What are the items listed in the “This connection uses the following items:” field?
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the fields of the “Use the
following IP address:” area? Answers may vary. If the computer is configured to obtain an IP
address automatically, there will be no information in the fields.
Click OK.
Restart your computer.
Activity Questions:
1.What is the IP address and subnet mask of the “Ethernet Adapter Local Area Network
Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Activity 2:
Recommended Equipment
A computer with Windows XP Professional / Windows 7
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router with an Ethernet
patch cable.
Choose start > Run, and type “cmd”. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
Step 3
Open your browser. Type “192.168.1.1” in the “Address” field, and then press Return.
Step 4
Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned by your
instructor.
Step 4
Unplug the Ethernet patch cable from the rear of the computer.
Choose Start, and then right-click My Network Places. Choose
Properties.
Double-click the wireless adapter, and then select View Wireless Networks.
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log in to the wireless router.
Close Internet Explorer.