0% found this document useful (0 votes)
17 views17 pages

ICT 10 Q3M2 Handouts Activity

This document serves as a learning module for Grade 10 ICT students at Mindanao Mission Academy, focusing on configuring computer systems and networks. It outlines performance standards, grading components, and provides detailed instructions on using the ping command and setting up peer-to-peer and client-server networks. The module aims to equip students with essential skills for passing the National Certification II in Computer Hardware Servicing.

Uploaded by

carlxsoldier10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views17 pages

ICT 10 Q3M2 Handouts Activity

This document serves as a learning module for Grade 10 ICT students at Mindanao Mission Academy, focusing on configuring computer systems and networks. It outlines performance standards, grading components, and provides detailed instructions on using the ping command and setting up peer-to-peer and client-server networks. The module aims to equip students with essential skills for passing the National Certification II in Computer Hardware Servicing.

Uploaded by

carlxsoldier10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

ICT This handout will serve as your copy for the whole

GRADE (DO NOT RETURN THIS TO YOUR TEACHE

10
3rd. Quarter
MINDANAO MISSION ACADEMY
of Seventh-day Adventists, Inc.
The School that Offers Something
Activity & Quiz Submission:
January 31, 2021

(MODULE 2) Better Manticao, Misamis Oriental

•• LEARNING MODULE FOR (ICT 10 – January Module) • •


Teacher’s Name: Alex G. Mampalawod Facebook Account:
https://www.facebook.co m/a lex .ma mpalawod
Degree: BSBA Major in Banking and Finance Gmail Account: [email protected]
Subjects handled: ICT 7, 8, 9, & 10. Contact number: 09062971241

STUDENT’S
Grading NAME:
System:
Components Percentage ICT is one component of TLE. In computing your
Written Work 50% MAPEH grade, Music, Arts, Health & PE grades are
Performance Tasks 50% added and the sum is divided by 4,

PERFORMANCE STANDARDS

The learner independently demonstrates skills in configuring computer systems and networks as prescribed b

CONTENT STANDARD

The learner demonstrates understanding of the underlying concepts and principles on configuring comput

LO 1. Plan and Prepare for Configuration of Computer Systems and Networks.


LO 2. Configure Computer Systems and Networks.
LO 3. Inspect and Test Configured Computer Systems and Networks.

Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under
the Information and Communications Technology (ICT) Course. In this module, you will have a great
deal of understanding of Configuring Computer Systems and Networks.
At the end of this module you will be able to apply the knowledge and skills on planning and
preparing for configuration, configure computer systems and networks and inspecting configured
computer systems and networks. Those skills are essential for you to pass the National Certification
II in Computer Hardware Servicing.

In this module, topics will be introduced progressively for easy understanding. After carefully
answering the pre assessment exercises, reading all the lessons, answering all the guide questions, skil
fully performing all the activities, showing evidences of learning and finally answering the summative
test you will gain a considerable knowledge and skills in configuring computer systems and networks
essential to be successful in computer hardware servicing as one of the career option in ICT.

Reminder! Just follow the instructions given in this module. Now let us start exploring new things
in this module.
Ping
The ping is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network with another
computer or network device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request
messages to the destination computer and waiting for a response. How many of those responses
are returned, and how long it takes for them to return, are the two major pieces of information
that the ping command provides.

ICT 10 • AG Mampalawod • TLE |PAGE 1


Table 8. Ping Command Syntax
Syn Description
t
ax
-t Using this option will ping the target until you force it to stop
using Ctrl-C.
-a - This ping command option will resolve, if possible, the
hostname of an IP address target.

-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this
option, four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is
255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning
in Windows 7, this option no longer functions but still exists for
compatibility reasons.
-r count Use this ping command option to specify the number of
hops between the computer and the target computer or device
that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that
only the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with the -
4 option, is only necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP
address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.

Using the ping Command


Ping is one of your most important tools in troubleshooting Internet problems. It shows you
whether the Domain Name Server is working, whether the computer you are trying to talk to is
reachable, and how long it takes to get there. It does this at a very low level — only the most basic
Internet functions have to be up and running.

1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
3)
Type ping followed by the IP address you desire to verify. The figure below shows the screen of
the ping command and its output.

ICT 10 • AG Mampalawod • TLE |PAGE 2


Figure 57. Step 3

Figure 58. Pinging This output shows several things:

 Decoding names to network addresses — A domain name server (DNS) resolves machine
names to numeric addresses. A single machine can have many names, all of which resolve to the
same Internet address. In the example just given, the name www.google.com resolves to the Internet
address 122.2.152.23.

 Round-trip response time — The parts of the replies that say things like time=105ms
show you how long it took from the time the client machine sent out the ping message until a reply
came back (1 ms is 1 millisecond, or one thousandth of a second). The variability in the times you see
reflects that networks do not always respond identically. Differing amounts of traffic on the
communication lines or differing loads on the server are common causes. You will see very different
response times depending on the access equipment you use.
 Routing hop count — The part of the replies that says TTL=50 tells you about the route
the message took from one point to another. The acronym TTL stands for Time to Live, which is a
measure of how many rerouting from one point to another the packet has to go through before IP
declares it undeliverable. The number following TTL (called the hop count) is a number that usually
starts at 255 and counts down by one every time the message gets rerouted through an intermediary
computer.

Peer-to-Peer Network

In a peer-to-peer network, devices are connected directly to each other without any additional
networking devices between them, as shown in Figure 68. In this type of network, each device has
equivalent capabilities and responsibilities. Individual users are responsible for their own resources and
can decide which data and devices to share. Because of that, the network has no central point of
control or administration.

ICT 10 • AG Mampalawod • TLE |PAGE 3


Figure 68. Peer-to-Peer Network

It allows certain files and folders to be shared with everyone or with selected users. Peer-to-
peer networks are quite common in small offices that do not use a dedicated file server. Files and
folders can be configured to allow network users to copy them, but not alter them in their original
location, which is a common safety precaution. However, files and folders can also be assigned a
"read/write" status that allows either selected users or all users on the network to change them.
Peer-to-peer networking differs from client-server networking, where certain devices have
responsibility for providing or "serving" data and other devices consume or otherwise act as "clients"
of those servers.

Setting up a peer-to-peer network in Windows XP


The steps described below are provided as a general guide that will work for most home
networking situations. However, it may not work for all scenarios.
Do the following steps to set up your own inclusive home network:
1. Make sure both systems have Network Interface Cards (NICs) installed and are using the proper cables.

NOTE: For a direct network cable connection between two PCs (not with a hub, switch or rout

2. For PCs with Windows XP, the home networking wizard can be used to set up Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen instructions.

NOTE: If the Network setup wizard is unsuccessful, continue with the st eps below.

3. Click Start, Control Panel, Network and Internet Connections, and then Network Connections. At
Network Connection Windows, you will see the Local Area Connection Icon, Right click it and select
Properties. Local Area Connection window appears.

ICT 10 • AG Mampalawod • TLE |PAGE 4


Figure 69. Network Connection Window

4. Click on the General tab.

Figure 70. LAN Properties General Tab


5. A device name should appear under "connect using." If not, there is a hardware issue and
Windows is not recognizing the network hardware. This issue must be fixed before continuing.
a. At the General Tab, Put a check mark at the following:
- Client for Microsoft Network
- File and Printer Sharing for Microsoft Network
- Internet Protocol (TCP/IP)

b. Put a check mark saying Show icon in notification area when connected.
c. Select the Internet Protocol (TCP/IP) and click the Properties
button

NOTE: If any of the above component is not installed, install them by selecting Add or Install,

ICT 10 • AG Mampalawod • TLE |PAGE 5


Figure 71. TCP/IP- Properties

d. At the IP Address tab, select Specify IP Address.


e. Enter 192.168.0.1 as the unique IP Address for the first machine. For each other PC add one
to the last number in the IP address. For example,
 KIDSPC1 = 192.168.0.1 ,

 MOMSPC2 = 192.168.0.2 ,
 and WORKPC3 = 192.168.0.3 .

NOTE: 192.168.0.x is an IP Address reserved for private networks and is not routable to

Figure 72. Assigning IP Address and Subnet Mask

6. In the Subnet mask field enter: 255.255.255.0


All PCs on the same network use the same subnet mask. Click the Ok button to finish
configuration and to close the Local Area Connection Properties windows.

ICT 10 • AG Mampalawod • TLE |PAGE 6


Note: The Domain Name System (DNS) is optional. If you have a DNS
system and your connected to ISP you can input an IP address which came from the DNS serve
Click Start, right-click My Computer, and then select Properties.

7. Click the Computer Name tab and click the Change button.
8.Enter a name that describes the PC in the Computer Description field. For example, KIDSPC1,
MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup name for all PCs on the
network. Spelling is important in thisstep.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click the Network
Neighborhood icon on the desktop. If all went well, you should see all the PC names on the network
when files and folders are being shared. If you do not see them, press F5 to refresh the screen.

12. If after refreshing the network window, the other PCs still do not appear, check the
firewall settings that may be interfering with the communication.

13. Setting up a Peer-to-Peer network in Windows 7


If you are going to work with Windows 7 operating system, the following procedures are
used to set up a peer-to-peer network:

1. On Desktop ==> Select My Computer ==> Right Click ==> Select properties.

Figure 73. Step 1

2. Select Change Setting (administrative permission will be required in this procedure).

Figure 74. Step 2

ICT 10 • AG Mampalawod • TLE |PAGE 7


3. Click or select Change.

Figure 75. Step 3

4. Change computer name and workgroup name. Then, click OK.

Figure 76. Step 4


5. Save the change (A Reboot will be required).

Figure 77. Step 5

ICT 10 • AG Mampalawod • TLE |PAGE 8


6. After Reboot ==> Right Click on My Network Place ==> Properties.

Figure 78. Step 6

7. Turn on Network discovery, File sharing, Printer Sharing.

Figure 79. Step 7

8. Click on Manage network connections.

Figure 80. Step 8

9. Select Local Area Connection ==> Properties

Figure 81. Step


9
ICT 10 • AG Mampalawod • TLE |PAGE 9
10. Select Internet Protocol version 4 (TCP/IPv4) ==> properties.

Figure 82. Step 10

11. Now enter the assigned IP address and then click OK.

Figure 83. Step 11

12. Now open My network place ==> Click to change then Select Turn on network
discovery and file sharing.

Figure 84. Step


12
ICT 10 • AG Mampalawod • TLE |PAGE 10
13. If you could see all computers in My Network place, you have successfully configured a workgroup.

Figure 85. Step 13

Client-Server Network

In a client/server network, the server provides the requested information or service to the client.
Servers on a client/server network commonly perform some of the processing work for client
machines, such as sorting through a database before delivering only the records requested by the
client.

Figure 86. Client/Server Network

One example of a client/server network is a corporate environment in which employees use a


company e- mail server to send, receive, and store e- mail. The e-mail client on an employee
computer issues a request to the e- mail server for any unread e-mail. The server responds by
sending the requested e-mail to the client.
In a client/server model, the servers are maintained by network administrators. Data backups and
security measures are implemented by the network administrator. The network administrator also
controls user access to
the network resources. All the data on the network is stored on a centralized file server. Shared
printers on the network are managed by a centralized print server. Network users with the proper
permissions can access both the data and shared printers. Each user must provide an authorized
username and password to gain access to network resources that he or she is permitted to use. For
data protection, an administrator performs a routine backup of all the files on the servers. If a
computer crashes, or data is lost, the administrator can easily recover the data from a recent
backup.

ICT 10 • AG Mampalawod • TLE |PAGE 11


This handout will serve
ICT
GRADE as your copy for the

10
whole grading.
MINDANAO MISSION ACADEMY
(RETURN THIS TO
of Seventh-day Adventists, Inc.
The School that Offers Something Better YOUR TEACHER)
3rd. Quarter Activity Submission:
Manticao, Misamis Oriental
(MODULE 2) January 31, 2021
• • LEARNING MODULE FOR (ICT 10 – January Activity) • •
Teacher’s Name: Alex G. Mampalawod Facebook Account: https://www.facebook.com/alex.mampalawod
Degree: BSBA Major in Banking and Finance Gmail Account: [email protected]
Subjects handled: ICT 7, 8, 9, & 10. Contact number: 09062971241

STUDENT’S NAME:

Grading System:
Components Percentage ICT is one component of TLE. In computing your
Written Work 50% MAPEH grade, Music, Arts, Health & PE grades
Performance Tasks 50% are added and the sum is divided by 4,

Activity 1:

Reflection on the video presentations


Directions: Answer the essential questions below based on the video presentations you had watched.
Write your answer in a clean sheet of paper.
1. What are the procedures involved in calculating IP address and the procedures in converting IP
address to binary and vice versa?
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

2. What are the different IP Classes? Discuss each briefly and give examples.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

3. What are the distinguished Internet Protocols? Describe each.


_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

4. What are the necessary procedures in calculating subnet mask or simply subneting? Show an
example solution for the calculation.
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

Configure an Ethernet NIC to use DHCP


Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address. You need to follow
the procedures given below and apply safety precautions in accomplishing this task. While doing the
activity, you have to answer activity questions written after every step. Write your answer in a clean
sheet of paper. Your performance will be rated based on the performance rubrics.

Recommended Equipment
 Linksys 300N router
 A computer running Window XP Professional
 Ethernet patch cable

Procedures:
Step 1
 Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.

ICT 10 • AG Mampalawod • TLE |PAGE 11


 Plug the other end of the Ethernet patch cable into the network port on the NIC in your
computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an administrator.
 Click Start.
 Right-click My Network Places, and then choose Properties.
 The “Network Connections” window appears.

Figure 59. My Network Places


Step 2
 Right-click Local Area Connection, and then choose Properties.
 The “Local Area Connection Properties” window appears.

Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:” field?
2. What are the items listed in the “This connection uses the following items:” field?

Figure 60. Local Area Connection Properties


Step 3
 Choose Internet Protocol (TCP/IP).
 Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.

Figure 61. Internet Protocol (TCP/IP) Properties


ICT 10 • AG Mampalawod • TLE |PAGE 11
Choose Internet Protocol (TCP/IP).
 Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.

Figure 61. Internet Protocol (TCP/IP) Properties

Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the fields of the “Use the
following IP address:” area? Answers may vary. If the computer is configured to obtain an IP
address automatically, there will be no information in the fields.

 Click the Obtain an IP address automatically radio button.


 Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.

Figure 62. Local Area Connection Properties Window

 Click OK.
 Restart your computer.

ICT 10 • AG Mampalawod • TLE |PAGE 11


Step 4
 Log on to Windows as an administrator.
 Check the lights at the back of the NIC. These lights will blink when there is network activity.
 Choose Start > Run.
 Type cmd and click OK.

Figure 63. Run Window

 Type ipconfig/all, and then press the Enter key.

Figure 64. ipconfig all window

Activity Questions:
1.What is the IP address and subnet mask of the “Ethernet Adapter Local Area Network
Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?

Activity 2:

Configure Wireless Router


Directions: Configure and test the wireless settings on the LinksysWRT300N.

Recommended Equipment
 A computer with Windows XP Professional / Windows 7
 A Wireless NIC installed
 An Ethernet NIC installed
 Linksys WRT300N Wireless Router
 Ethernet patch cable
Step 1

 Connect the computer to one of the Ethernet ports on the wireless router with an Ethernet
patch cable.

ICT 10 • AG Mampalawod • TLE |PAGE 11


 Plug in the power of the wireless router. Boot the computer and log in as an administrator.
Step 2

 Choose start > Run, and type “cmd”. Press the Return key.
 Type ipconfig.
 What is the default gateway for the computer?

Step 3

 Open your browser. Type “192.168.1.1” in the “Address” field, and then press Return.

Figure 65. Browser Window

 The “Connect to 192.168.1.1” window appears.

Figure 66. Connect to 192.168.1.1 Window

 Type “admin” in the “Password” field.


 The Setup screen appears.

Step 4

 Click the “Wireless” tab.


 Choose “Mixed” in the “Network Mode” drop-down box.

ICT 10 • AG Mampalawod • TLE |PAGE 11


Figure 67. Wireless Tab Window

 Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned by your
instructor.

 Click Save Settings.


 The “Settings are successful” screen appears.

Figure 67. Settings are Successful Window

 Click Continue, and then close the browser window.

Step 4

 Unplug the Ethernet patch cable from the rear of the computer.
 Choose Start, and then right-click My Network Places. Choose
Properties.
 Double-click the wireless adapter, and then select View Wireless Networks.
 Choose CHS, and then click the Connect button.
 Open Internet Explorer, and then connect to the wireless router.
 Log in to the wireless router.
 Close Internet Explorer.

ICT 10 • AG Mampalawod • TLE |PAGE 11

You might also like