0% found this document useful (0 votes)
7 views8 pages

Q3 - LAS 5 - CSS 12 Edited Week 3

This document is an activity sheet for TVL – ICT (Computer Systems Servicing) focusing on setting up user access in network operating systems. It covers learning competencies, background information on network operating systems, types, common features, and examples, as well as management instructions for user accounts on Windows Server 2008. Additionally, it includes activities for learners to identify steps in configuring user access and reflect on the importance of user access configuration.

Uploaded by

ugurlcatuiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views8 pages

Q3 - LAS 5 - CSS 12 Edited Week 3

This document is an activity sheet for TVL – ICT (Computer Systems Servicing) focusing on setting up user access in network operating systems. It covers learning competencies, background information on network operating systems, types, common features, and examples, as well as management instructions for user accounts on Windows Server 2008. Additionally, it includes activities for learners to identify steps in configuring user access and reflect on the importance of user access configuration.

Uploaded by

ugurlcatuiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

12

TVL – ICT
(Computer Systems Servicing)
Activity Sheet – Quarter 3 – Week 3
Set-up User Access – A

REGION VI - WESTERN VISAYAS


Quarter 3, Week 3

Learning Activity Sheets (LAS) No.5

Name of Learner: ___________________________________________________

Grade and Section: _________________________ Date: ___________________

TVL – ICT (Computer Systems Servicing) ACTIVITY SHEET


Set-up User Access - A

I. Learning Competency
LO 1 . Set-up user access:
1.1 Create user folder in accordance with network operating system
features.
1.2 Configure user access level based on NOS features
Code: TLE_IACSS9-12SUCS-IIIa-e-37

II. Background Information for Learners

SET-UP USER ACCESS – A

Network Operating Systems


A network operating system (NOS) is a computer operating system (OS)
that is designed primarily to support workstations, personal computers and, in
some instances, older terminals that are connected on a local area network
(LAN). The software behind a NOS allows multiple devices within a network to
communicate and share resources with each other.
The composition of hardware that typically uses a NOS includes a number
of personal computers, a printer, a server and file server with a local network
that connects them together. The role of the NOS is to then provide basic network
services and features that support multiple input requests simultaneously in a
multiuser environment.
Due to earlier versions of basic operating systems not being designed for
network use, network operating systems emerged as a solution for single-user
computers.

Types of network operating systems


There are two basic types of network operating systems, the peer-to-
peer NOS and the client/server NOS:
1. Peer-to-peer network operating systems allow users to share network
resources saved in a common, accessible network location. In this
architecture, all devices are treated equally in terms of functionality. Peer-to-
peer usually works best for small to medium LANs and is cheaper to set up.
2. Client/server network operating systems provide users with access to
resources through a server. In this architecture, all functions and
applications are unified under one file server that can be used to execute
individual client actions regardless of physical location. Client/server tends
to be most expensive to implement and requires a large amount of technical
maintenance. An advantage to the client/server model is that the network is
controlled centrally, makes changes or additions to technology easier to
incorporate.

1
Common features of network operating systems
Features of network operating systems are typically associated with user
administration, system maintenance and resource management functionality.
This includes:
• Basic support for operating systems like protocol and processor support,
hardware detection and multiprocessing.
• Printer and application sharing.
• Common file system and database sharing.
• Network security capabilities such as user authentication and access
control.
• Directory
• Backup and web services.
• Internetworking.

Examples of network operating systems


True network operating systems are categorized as software that enhances
the functionality of operating systems by providing added network features. A
few examples of these network operating systems and their service providers are:
• Artisoft’s LANtastic- This is a simple, user-friendly NOS that supports most
PC operating systems.
• Banyan’s VINES- This uses a client-server architecture to request specific
functions and services.
• Novell’s NetWare- This was the first network operating system to be released
and is designed based on XNS protocol architecture.
• Microsoft’s LAN Manager- This operates as a server application and was
developed to run under the Microsoft OS. Now, most of the functionality of
LAN Manager is included in the Windows OS itself.
In addition, some multi-purpose operating systems, such as Windows
NT and Digital's OpenVMS come with capabilities that enable them to be
described as a network operating system. Further, the most popular operating
systems like Windows, Unix, Linux and Mac include built-in networking
functions that may not require additional network services.

How to manage users on Windows Server 2008

In the same window, you can manage the newly created or all the existing
user accounts, including the Administrator account. To do that, right click on
any user account and select the option Properties from the context menu.

The above action will open the User Properties window. In the general tab,
you can modify the name, description, and the password settings. Besides that,
you can also disable the user account by selecting the checkbox Account is

2
disabled. This is the best option to block a user from logging in. You can also
use this option as an alternative way for deleting the user account as it preserves
all the data until the account is deleted.

If you want to change the user group membership, then navigate to


the Member of tab. Here you can see the current group, which the user is a
member of. If you want to change that, simply click on the Add button and add
the new user group.

If you want to make custom changes to the User Profile or the User’s Home
Folder paths, you can do so by navigating to the Profile tab. Even though
changing the paths is very easy, only do this modification if you know what you
are doing, as any wrong configuration may hurt the user experience or the user
data.

3
If you ever want to delete a user account, simply right click on the
username and select the Delete option.

The above action may display a warning message letting you know that all
the user data will be deleted. Simply press the Yes button to continue. However,
it is always recommended that you disable the account rather than completely
deleting unless it is required.

III. Accompanying DepEd Textbook and Educational Sites


• Lewis, Sarah, “Network Operating Systems”, (March 2019).
https://searchnetworking.techtarget.com/definition/network-operating-
system
• https://support.hostway.com/hc/en-us/articles/360000567270-How-
to-manage-users-on-Windows-Server-2008

IV. Activity Proper

Activity 1. Direction: Identify the different steps and description in configuring


user access in Windows Server 2008.
Step No. Description

4
5
Activity 2. Directions: Enumerate and differentiate the following using the table
below:

1. Types of Network Operating Systems

2. Examples of Network Operating Systems

Rubric for Scoring


Criteria 3 2 1 Score
Cleanliness Readable, Mostly Not
/Neatness Understandable understandable understandable
and clean and clean and untidy
Accuracy/ Evident of own Evident of own Evident of
Clarity ideas and ideas most of confused ideas
imagination the time or imagination
Organizatio Evident of Evident of some Unorganized
n of Idea/ depth insight insight and understanding
understandi and understanding /idea. Needs
ng understanding improvement

Total:

6
Activity 3. Direction: Enumerate the following:

1. Common features of network operating systems


________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________
________________________________________________

V. Reflection
How does network operating system works?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

2. What is the importance of configuring user access?


________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

You might also like