CSS NCII Module
CSS NCII Module
Objectives -----------------------------------------------------------------------------------------------------------------------1
Pre-Test -------------------------------------------------------------------------------------------------------------------------3
UNIT I - Exploring the Electronics Industry ----------------------------------------------------------------------------4
LESSON 1: CSS in the Electronics Industry ----------------------------------------------------------------------------4
LESSON 2: OHS Policies and Procedures -------------------------------------------------------------------------------7
LESSON 3: Applying Quality Standards ----------------------------------------------------------------------------------
UNIT TEST I --------------------------------------------------------------------------------------------------------------------
Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT III - Performing Computer Hardware Services ------------------------------------------------------------------
LESSON 1: Disassembling a Computer -----------------------------------------------------------------------------------
LESSON 2: Assembling a Computer ---------------------------------------------------------------------------------------
LESSON 3: Installing I/O Devices ------------------------------------------------------------------------------------------
UNIT TEST III ------------------------------------------------------------------------------------------------------------------
Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT V - Setting Network Configuration ---------------------------------------------------------------------------------
LESSON 1: Understanding Network Devices ----------------------------------------------------------------------------
LESSON 2: Creating Network Cables -------------------------------------------------------------------------------------
LESSON 3: Configuring the Network --------------------------------------------------------------------------------------
UNIT TEST V -------------------------------------------------------------------------------------------------------------------
Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT VII - Set-up User Access ----------------------------------------------------------------------------------------------
LESSON 1: Understanding the "Server" and "Client" ----------------------------------------------------------------
LESSON 2: Creating User Folder -------------------------------------------------------------------------------------------
LESSON 3: Configure User Access -----------------------------------------------------------------------------------------
UNITN TEST VII
---------------------------------------------------------------------------------------------------------------
i
UNIT VIII - Configure Network Services ---------------------------------------------------------------------------------
LESSON 1: Checking Normal Functions ----------------------------------------------------------------------------------
LESSON 2: Installing Modules and Add-ons -----------------------------------------------------------------------------
LESSON 3: Performing Network Service ---------------------------------------------------------------------------------
UNIT TEST VIII
----------------------------------------------------------------------------------------------------------------
Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT IX - Planning and Preparing to Maintain Computer Systems and Networks -----------------------------
LESSON 1: Planning and Preparing for Maintenance -----------------------------------------------------------------
LESSON 2: Maintaining Computer Systems and Networks ----------------------------------------------------------
OBJECTIVES
d. Power Supply*
Pre-Test 6. This is a kind of port that is used in
modern monitors and home theaters. It
1. This is a tool used in locking Rj45 into also transmits digital audio and video.
UTP Cables
a. Firewire
a. LAN Tester b. HDMI*
b. Precision Tools c. VGA
c. Crimping Tools* d. S/PDIF
d. Desoldering Tool
7. The following are FACTS about the
2. When working with electronic equipment, Central Processing Unit (CPU) EXCEPT
it is important to make sure that there is FOR:
no static electricity to avoid damage of
computer parts that is why it is important a. It is the brain of the computer. It
to use these tools: interprets and carries out the basic
instructions to operate a computer.
a. Compressed Air b. It is also called the processor.
b. Crimping Tool c. A fan and a heat sink is usually
c. Antistatic Mat and Wrist Wrap* installed to regulate its
d. LAN Tester temperature.
d. Intel is the only brand of CPU
3. The computer, since it was made in the available in the market.*
19th century, have been developed and
improved through the years. The 8. There are various types of computers
following are the computers made during depending on its purpose. The following
those years EXCEPT FOR: are types of computers EXCEPT FOR:
a. MS-Dos a. Supercomputer
b. Value Machine* b. Mainframe Computer
c. Atanasoff-Berry Computer c. Market Computer*
d. Analytical Engine d. Microcomputer
4. The computer is a device that accepts 9. How much GB of RAM (at least) should
information in the form of the following require?
___________________, and manipulates it
for some result based on a program or Basic application software such as Office
sequence of instructions on how the data Suite at least ___ GB. Programs and
is to be processed. multimedia at least ___ GB.
Modern games and editing software at
a. Analog Frequencies least ___ GB.
b. Digitalized Data*
c. Electric Blasts a. 1, 2, 4
d. Controlled Currents b. 2, 6, 8
c. 1, 4, 8*
5. This serves as the source for electricity to d. 4, 8, 16
the computer. Attached are vital
hardware cables and buses for 10. The following are storage devices
transferring power to various components EXCEPT FOR:
in the computer.
a. Random Access Memory*
a. Battery b. Flash Drive
b. System Unit c. Solid State Drive
c. Central Processing Unit d. Hard Disk Drive
3
UNIT I - Exploring the Electronics Industry
LESSON 1: CSS in the Electronics Industry
Introduction
As many of today's basic functions are being simplified by technology, computers have been on the forefront in
developing innovations through its many functions. Many of the things that we thought were impossible before
are now being achieved by computers nowadays. In this digital economy, having the knowledge and skills in
computer servicing is the start and most fundamental of all.
In today’s industry, almost every establishment needs the assistance of technology. Even establishments and
businesses are now gearing towards the use of information technology to promote their services. The demand
for people who offer computer servicing and repair continues to increase as society rapidly changes.
For example:
Computer hardware needs maintenance services in order to repair normal wear and tear. Network
infrastructures used by organizations will need maintenance and monitoring. Computer equipment would need
occasional repair and maintenance; thus, requiring the assistance of computer systems service providers.
Commonly, the industry’s main line of business is on selling computer hardware systems and components, as
well as providing repair and installation services. Thus, if you were to venture in this industry, you must be
well informed on basic concepts related to computer systems servicing.
Since society is now becoming more technology-driven and technology-dependent, it is no wonder that more
and more establishments are in need of the expertise of computer service providers. The Computer Systems
Servicing National Certificate (NC II) Qualification trains its learners with competencies that will allow them to
diagnose and troubleshoot PC systems and software issues, as well as restoring its parts to return the device to
its normal function.
4
A person who has achieved the Computer Systems Servicing NC II Qualification is competent to be a:
Having a CSS NC II qualification is an entry point for a career in the computer field.
Being a computer technician may require you to travel to see clients or be at an office and workplaces as a
member of the IT support team. As a technician, you must possess the interests and skills that the job demands.
As much as possible, you will need some prior knowledge and skills so that you will be able to perform
computer servicing easily.
6
LESSON 2: OHS Policies and Procedures
Introduction
Occupational Health and Safety or OHS is concerned with health, safety, and welfare issues in the workplace.
Policies and procedures are important in discussing OHS because it aims to make the workplace safer and
better for workers and stakeholders. It is concerned with many factors such as removal of hazards and reducing
accidents in the workplace. As a future computer technician, it is your responsibility to know these standard
protocols especially since you will be assembling and repairing expensive and sensitive equipment that need
care and proper handling.
Three steps may be done to facilitate OHS procedures in a CSS work space:
Hazard identification
Risk assessment
Risk control
In addition to that, here are some additional OHS Procedures that must be observed in computer
servicing:
7
TOPIC 2: Hazard Identification
Hazards are anything that can hurt a person. Example of hazards that can be encountered when conducting
computer systems servicing are:
Hazard identification involves observing the workplace’s surroundings to recognize potential risks.
What are common hazards that can be encountered in the electronic industry?
8
9
TOPIC 3: Risk Assessment
10
TOPIC 4: Risk Control
Once the hazard has been identified and its risks have been evaluated, it is time to address these issues:
Ask your supervisor for instruction and training before using or repairing an equipment.
Do not carry or move heavy objects by yourself.
11
12
LESSON 3: Applying Quality Standards
Introduction
Standards are sets of rules that outline specification of dimensions, design of operation, materials, and
performance. Standards provide basis for good quality and protocol. When it comes to computer systems
servicing, standards are important as it serves as comparison for computer performance. Maintaining quality is
important to manage customer satisfaction where the revenue and profits will depend upon.
Here are some standard protocols in checking the materials and goods you will be receiving in work.
13
TOPIC 2: Documentation
Here are some samples of log reports and documentation assessed by a quality checker. Take note however, that
not all organizations will make use of the same form.
TOPIC 3: Inventory Form
Here is an example of an inventory form. You will be encountering this after disassembling computers. You
will be listing down the PC specifications in this form. You can write the general description of what the item is
under while you can write the specifications or necessary description below, Description/Specification.
Anything else that you think are important notes should be written on the Remarks column.
14
1. Having a Computer Systems Servicing
UNIT TEST I NC II qualification is an entry point for a
career in the computer field.
True*
False a. Electric Shock Hazards
b. Thermal Hazards*
2. _____________________ is the possibility c. Physical Hazards
of the hazard harming someone. d. Chemical Hazards
a. Standards*
b. Assessments
c. Quality
d. Guidelines
True*
False
True*
False
16
TOPIC 2: Types of Computers
1. Supercomputer
Most powerful and most advance in terms of performance and data processing. These computers are commonly
used by large organizations to conduct specific tasks such as weather forecasting, research, and exploration.
2. Mainframe Computer
Large and expensive computer capable of handling thousands of users and programs simultaneously.
Mainframe computers can handle, process, and store large amount of data. These are commonly stored in large
air-conditioned rooms because of its big size.
3. Minicomputer
Also known as midrange computers. It features all the functions of a large size computer, but has a smaller size.
Minicomputers can support many users because of its multi-processing system.
Most widely used and fastest growing type of computer. Desktop computers, laptops, tablets, and smart phones
are types of microcomputers.
17
TOPIC 3: Fundamental Elements of a Computer
Processing Devices
Processing devices are the computer’s circuitry in the system unit.
Motherboard – the circuit board housing the memory and the central processing unit (CPU)
18
Central Processing Unit (CPU) – manipulates input data into the information needed by the users.
Memory – also known as Random Access Memory or RAM. It is a series of electronic elements that act as
temporary storage of data and program instructions while the instructions are being processed by the CPU.
Chips – these make up the CPU and the memory; these are electronic devices that contain many microscopic
pathways designed to carry electrical currents.(picture 6.3)
Storage Devices
Storage devices store data and programs. These hold data, information, and programs permanently.
Solid State Drive (SSD) – mass storage device that stores data in a permanent state even
without power. Similar to an HDD’s function, only the internal components are different. SSDs do not
have moving parts but store data on magnetic platters making use of flash memory.
19
Hard Disk Drive (HHD) – often called hard drive or hard disk. This is the most common
storage device that does not need power to maintain data; these store data through spinning platters or
magnetic disks, recording individual bits written into the disk.
Flash Drive – highly portable small data storage devices making use of flash memory and a
Input Devices
Input devices allow the user to communicate with the computer by entering data or commands.
Keyboard – primary input device used to input alphanumeric data and commands to the computer.
20
Mouse – primary input device used to navigate and interact with the monitor output.
Scanner – scans documents and converts them digitally, which can be edited on a computer.
Webcam – small cameras attached to a monitor or desk that record or broadcast video.
Joystick – device used to control video games, aside from the keyboard.
Output Devices
Output devices enable the computer to show the processed data and information understandably to the user.
Printer – prints paper documents, photographs, and other outputs called hard copies which are
physical versions of the documents.
21
Monitor – acts as the primary display of the unit where the user interface and programs are reflected.
Speakers – sound system device that produce audio output from the computer.
TOPIC 2: The System Unit
The System Unit is the overall structure that houses the processor, memory, and electronic components of the
computer that are used to process data. All input and output devices are connected into the system unit. The
system unit is housed by what is known as system case or computer case. It holds and protects most
components of a computer.
The Computer Case contains the framework to support and enclose internal components of the computer. It
helps to prevent damage from static electricity. It typically made up of plastic, steel, and aluminum which are
available in a variety of styles. The size and layout of a case is called a form factor. It is also designed to keep
internal components cool by using airflow vents and cooling fans.
Computer chassis
Cabinet
Tower
Box
Housing
Types:
22
TOPIC 2: The System Unit
Power Supply
Power supplies serve as the source for electricity to the computer. Attached are vital hardware
cables and buses for transferring power to various components in the computer.
The
following are the basic connector you can see in a power supply:
ATX 24 pin main power connector is the standard motherboard power connector used in nearly every
computer.
SATA 15 pin power supply connector is one of several standard peripheral power connectors. SATA power
connectors only connect to SATA drives like hard drives and optical drives. SATA power connectors do not
work with older PATA devices.
Molex 4 pin power supply connector is a standard peripheral power connector. Molex power connectors
connect to many different kinds of internal peripherals including PATA hard drives and optical drives, some
video cards, and even some other devices.
23
Floppy drive 4 pin power supply connector is the standard floppy drive power connector. The floppy power
connector, also called a Berg connector or Mini-Molex connector, is included in even the newest power supplies
even though floppy drives are becoming obsolete.
ATX 4 pin power supply connector is a standard motherboard power connector used to provide +12 VDC to
the processor voltage regulator. This small connector usually attaches to the motherboard near the CPU.
ATX 6 pin power supply connector is a motherboard power connector used to provide +12 VDC to the
processor voltage regulator but the 4-pin variety is the more commonly used connector. This small connector
usually attaches to the motherboard near the CPU.
Motherboard
The motherboard is also known as mainboard, system board, logic board, or MOBO. It holds and allows
communication between the crucial components of the computer such as the CPU and memory. It also provides
connection for other peripherals. This provides the path which the processor (CPU) communicates with all the
components of the computer.
There are several components that are attached to the motherboard. These include:
1. Chip – small piece of semiconducting material, where more integrated circuits are embedded. They have
standard-sized pin connectors that allow them to be attached to the motherboard.
2. Bus - an electrical path that enables data flow between various system components.
3. Integrated Circuit (IC) – contains microscopic pathways that carry electric current. The IC
contains millions of elements such as resistors, capacitators, and transistors. Many different kinds of chips are
located in the motherboard
24
Different variety of chip packages:
1. Dual Inline Package (DIP) – this has two parallel rows of pints that attach the chip package to
the circuit board
2. Pin Grid Array (PGA) – holds a larger number of pins because the pins are mounted on the
surface of the package.
3. Flip Chip-PGA (CF-PGA) Package – higher performance PGA packaging that places the
chip on the opposite sides of the pins.
4. Single Edge Contact (SEC) Cartridge – does not use pins but connects to one of the edges
in the motherboard.
The form factor of motherboards pertains to the size and shape of the board. It also describes the physical
layout of the different components and devices on the motherboard. Various form factors exist for
motherboards:
The function of the Northbridge is primarily a fast path between the CPU and the video bus and system RAM.
While the Southbridge connects with the slow hardware/components of the system.
25
See the photo below (courtesy of Quora) to understand the function of these bridges:
AMD and Intel are the two most popular brands of processors in the market nowadays. Bundled with the
processors are the heat sinks. A heat sink consists of metal fins that draw heat away from a component. The
fan and heat sink together are called the processor cooler. The photo below shows CPU with a heat sink
mounted on the motherboard.
26
1. Dynamic RAM (DRAM) – This kind of RAM needs to be recharged by the CPU. If not, it loses
its contents. There are many variations of DRAM such as:
Synchronous DRAM (SDRAM) – faster than DRAM because it is synchronized to the system clock
Double Data Rate (DDR) SDRAM – faster than SDRAM because they transfer data twice for each
clock cycle
DDR2 and DDR3 SDRAM – faster than DDR SDRAM
Ambus DRAM (RDRAM) – type of DRAM faster than SDRAM that uses pipelining techniques
2. Static RAM (SRAM) – This kind is faster and more reliable than any form of DRAM. Unlike the
DRAM, this does not need to be re-energized. However, it is much more expensive and it used for special
purposes.
3. Magnetoresistive RAM (MRAM) – This kind stores data using magnetic charges instead of
electrical charges. It has greater storage capacity, consume less power, and faster access times.
27
The RAM chips are housed in a small circuit board called the memory module, which is inserted into the
motherboard.
1. Single Inline Memory Module (SIMM) – this has pins on opposite sides of the circuit
board which connect together to form a single set of contacts. This houses SDRAM chips along with DIMMs.
2. Dual Inline Memory Module (DIMM) – the pins on the opposite sides of the circuit board
do not connect and form two sets of contacts. This houses SDRAM chips along with SIMMs.
The computer will need a certain amount of memory to be able to handle programs, data, and information,
depending on the types of applications used. The more RAM a computer has, the faster the computer will be.
To be able to use basic application software such as Office Suite, one needs at least 1GB of RAM.
Using programs and multimedia should have at least 4GB.
Playing modern games or using editing software will require at least 8GB.
Today the RAM ranges up to 64GB depending on the programs that will be used for the computer.
Cooling Technology
Cooling technologies are essential in avoiding the computer from overheating and maintaining a good, well-
ventilated system.
28
Several cooling technologies are present throughout the system unit:
Fans are also present in several components such as the power supply, ports, processor, hard disk etc.
Heat sink, on another hand, is a small metal or ceramic component with fins on the surface which
absorbs and distributes heat produced by electrical components.
Heat pipe is used on smaller devices like notebook computers since this is smaller in size.
Expansion Cards
A motherboard has expansion slots to be used by expansion cards. An expansion card, also called an adapter
card, is a circuit board that provides more ports than those provided by the motherboard.
The photo below shows a Video Card where it provides three video ports. Notice the cooling fan and heat sink
on the card, which help to keep the card from overheating. The trend today is for most ports in a system to be
provided by the motherboard (called onboard ports) and less use of expansion cards.
There are also other variants of expansion cards such as network cards, sound cards, video capture cards,
interface cards, and other expansion cards that cater to whatever the computer user for his/her needs and
improvements for the system.
Storage
A system might have one or more hard drives, an optical drive, a tape drive, or, for really old systems, a floppy
drive.
A hard drive, also called a hard disk drive (HDD), is permanent storage used to hold data and programs.
For example, the Windows operating system and applications are installed on the hard drive. All drives in a
system are installed in a stack of drive bays at either the front or on the lower portion of the case. Nowadays,
users use Solid State Drive or SSDs because of its use of flash memory, which does not use physical disks to
write memory/data.
29
Each drive has two connections for cables: the power cable connects to the power supply and another cable,
used for data and instructions, connects to the motherboard.
The port basically serves as an interface between the computer and other computers or peripheral devices.
A port generally refers to the female part of connection. Computer ports have many uses, to connect a monitor,
webcam, speakers, or other peripheral devices.
On the physical layer, a computer port is a specialized outlet on a piece of equipment to which a plug or cable
connects. Electronically, the several conductors where the port and cable contacts connect, provide a method to
transfer signals between devices.
Familiarize yourself with the following ports usually found with computer systems below:
30
31
TOPIC 3: Ports, Sockets, Slots, & Connectors Ports
Slots
Sockets
The following are the most common sockets found in the motherboard. The CPU socket where the CPU itself is
inserted and the CMOS slot where the CMOS battery (which lets the motherboard remember the date and time
of the computer) that is replaced after it has worn out.
32
Connectors & Ports
LESSON 3: Hand Tools and Equipment
Introduction
Most tools used in computer system servicing are hand tools. These can be part of a computer repair toolkit as
well. In this lesson, you will learn about the common hand tools and equipment that you will be using especially
in handling computer equipment such as disassembly/assembly of a computer, as well as repair and
maintenance.
Static electricity can be easily generated by friction on carpets, clothing, hair, fabric, flooring, etc.
33
Thus, these tools should be utilized:
Anti-static mat - Used to stand on or place tools to prevent buildup of static electricity.
Torx Screwdriver – for loosening or tightening screws that have a star-like head
Lint-free cloth - For cleaning computer parts without leaving marks or scratches.
Cable Ties - Used to organize and bundle cable together.
36
Parts organizer - For holding and organizing screws and other small computer parts.
Digital Multimeter - A tool that can be used to measure amps, volts, and ohms. It can test the integrity
of circuits and the quality of electricity in computer components. Information is flashed on the screen.
Loopback Adapter - Also called as loopback plug. This tool tests the basic functionality of computer
ports. The adapter is specific to the port that you want to test.
Toner Probe - A two-part tool that generates a tone that travels the length of the cable. The toner part is
attached to a cable at one end using specific adapters, such as RJ-45, coaxial, or metal clips. When the probe is
near to the cable where the toner is attached, a tone can be heard from the speaker.
c. Precision Tools
d. Crimping Tools*
True
False*
a. BIOS
b. Device Drivers
c. Program Applications
d. Operating System*
a. VGA
b. DVI
c. RPS*
d. HDMI
39
UNIT III - Performing Computer Hardware Services
LESSON 1: Disassembling a Computer
Introduction
It is important that you have taken and reviewed the prerequisite module (Intro to CSS) before going into this
hands-on course.
Performance Checklist
If you tried disassembling a computer on your own, this checklist might be able to help you if you've done the
job correctly.
40
1. Unplug the System Unit before proceeding to disassembling?
a. Outer Steel/Casing?
b. Case Fan?
c. CPU Fan?
d. Power Supply?
e. Memory (RAM)?
Now that you've learned how to disassemble a PC, we are now going to proceed to assembling what we just
disassembled. Ideally, as seen in the last part of the disassembly video, you need to document the
specifications/status of the components before putting back the system unit together again.
A helpful tip is since you worked your way part by part in disassembly, now you are just going to retrace your
steps in assembling it.
Before going into the assembly proper, you will have to prepare all the materials that you will need.
41
VIDEO: Assembly Proper
Performance Checklist
If you tried assembling a computer on your own, this checklist might be able to help you if you've done the job
correctly.
CRITERIA
YES NO
Did you…?
a. CPU Fan?
c. Optical Drive?
e. Power Supply?
g. System Fan?
42
Activity: True/False
If you still do not have an installed operating system, you can simply install the keyboard and mouse first. Then,
install an operating system. After installing an operating system, install the rest of your peripherals.
These devices are important since it lets you control your computer.
It is important that you have assembled a PC by this time. If not, please finish the previous lesson first.
43
The process to installing this device is similar to that of the keyboard. Check whether your mouse is using a
PS/2 Connector or a USB connector then connect it to its proper port.
1. Identify the connection type that will connect the monitor to the motherboard or the graphics card.
2. A DVI, VGA, or HDMI are common ports in the monitor and used to produce best picture qualities.
3. Once the display is plugged to its proper connector on the video card or the motherboard, the display is
ready. Most of the time, drivers are not required but it should be downloaded to utilize a maximum
resolution.
44
TOPIC 5: Installing the Webcam
Common webcams can be simply plugged into the USB port and you will be prompted to install their drivers.
Some webcams would need to have its driver installed first. Make sure to read the manufacturer’s instruction
manual first.
Drag the correct cable from the word box associated with the input/output device.
True*
False
True
False*
The BIOS basically sets up your computer -- it loads your drivers and boots the operating system.
It is usually stored on a Flash memory chip on the motherboard, but sometimes the chip is another type of
ROM.
When you turn on your computer, the BIOS does several things. The sequence is as follows:
BIOS setup would depend on the motherboard manufacturer. However, these are the common, standard options
you may see in the BIOS setup:
If you would like to boot from a certain device, say a USB Flash Drive to install an Operating System (which
we will demonstrate later), click advanced set-up and look for the first, second, and third boot device.
Select first boot device. By default, it would be the hard drive on the installed computer.
Make sure to choose "Save Changes" when you are changing settings in the BIOS. Afterwards, this will restart
the computer so the new settings take effect.
47
Power Management - Select whether to use power management, as well as set the amount of time for
standby and suspend
Exit - Save your changes, discard your changes or restore default settings
48
49
WHY IS BOOTING REQUIRED?
Hardware doesn’t know where the operating system resides and how to load it.
Need a special program to do this job – Bootstrap loader (e.g. BIOS – Boot Input Output System)
Bootstrap loader locates the kernel, loads it into main memory and starts its execution.
In some systems, a simple bootstrap loader fetches a more complex boot program from disk, which in
turn loads the kernel.
Bootable Devices
Booting is a startup sequence that launches the operating system of a computer when it is turned on.
A boot sequence is the initial set of operations that the computer performs when it is switched on. Every
computer has a boot sequence.
A boot device is any device or drive that has the required boot files that allows the computer to start.
In this case, if we are building a PC from scratch, usually there is still no operating system. With this, an
operating system can be booted or installed from a boot device.
50
A boot drive commonly used is the hard drive. Usually, an operating system like Microsoft Windows is
installed in a hard drive to load Windows.
Using a third party application (Rufus), scroll the demonstration slides below to see the step-by-step process on
creating a bootable USB device.
51
52
53
ACTIVITY: Fill in the blanks!
When you open a computer, usually this will either be a Windows PC or a Macintosh computer. They will have
different user interfaces or applications that may be specific to that computer. The Windows or the Mac are
called operating systems.
The Operating System (OS) is a layer of software which is used to manage computer resources. It also provides
an interface, so that users can utilize computer resources. It configures and manages hardware to connect the
components and the applications.
Windows is the dominant over the other two. 90% of computer users use Windows operating system. Windows
and MAC are expensive operating systems however, MAC OS requires the users to buy the MAC systems
(Macbook, Mac) built by Apple.
Windows and MAC have similar file structures while Linux has a different code base (single file tree compared
to Windows and MAC's many directories) Windows interface has a Start menu, Taskbar, System Tray, and the
Windows Explore while Linux has easy to switch interfaces.
Linux is most preferred by programmers, MAC is preferred by graphic artists, and Windows is preferred by
gamers.
54
Installing Windows Operating System
58
ACTIVITY: Guess the word!
Windows is the dominant over the other two. 90% of computer users use Windows operating system. Windows
and MAC are expensive operating systems however, MAC OS requires the users to buy the MAC systems
(Macbook, Mac) built by Apple.
On the other hand, Linux is a free operating system. Linux is most preferred by programmers, MAC is preferred
by graphic artists, and Windows is preferred by gamers.
This is an essential step that you need to be aware of after installing an operating system. Basically, the device
drivers tell your operating system how to use the components like the motherboard, graphics card, network
interface cards, sound cards, and other devices.
Most of the time, Windows would be able to recognize a device and will install drivers automatically. Some
cases would require installing generic drivers.
Drivers – small software programs that help the operating system use the device. When a device is
malfunctioning, one should ask whether the right driver has been installed.
2. Driverpack Solution – A free tool which automatically finds proper drivers for a computer then
downloads and installs it without wizards or installation prompts.
59
3. Device Manager (Driver Update) – Can be accessed by clicking Start > Computer > Manage >
Device Manager. From here, each component can have the option to install a driver through a CD or through
searching automatically online.
In this simple procedure, we are looking if there drivers are already installed. If the device driver is installed,
updating it through the device manager would prompt to say that the drivers are installed.
Software is basically the instructions and programs that tells the computer to run different tasks.
It can be categorized into system or OS, application, and programming.
64
System/Operating System - tells the CPU what to do. The most common types of operating systems
are MS DOS Windows, MAC OS, and Corel Linux.
Installer - computer program that installs files, such as applications, drivers, software onto a computer.
Installation (setup) of a computer program is making a program ready for execution or user access. This
process may vary depending on the program, type of computer, computer operating system, etc.
Most common examples include Windows, MAC OS, MS-DOS and Linux.
Application Software
It accomplishes specific tasks intended for personal, business, or scientific purposes. Example tasks include
inventory management, payroll processing, human resource management, etc.
65
Programming Software
Use to make computer programs. Programming language is used to create computer programs.
Eclipse
Coda
Notepad ++
Sublime Text
File System – A program used by the operating system to organize data or application files. The type of file
system is used to determine how data and programs will be accessed. In addition to that, it can also control what
data or programs will be available to users.
3. ExFAT
Extended File Allocation Table. A file system type that can be use for memory sticks and SD cards.
– If you try to format an internal hard disk that is smaller than 32 GB, you will see the options for NTFS, FAT
and FAT32.
– If you try to format an internal hard disk that is larger than 32 GB, you will only see the option for NTFS.
– If you try to format an external USB device smaller than 32 GB, you will see all the options.
– If you try to format and external USB device larger than 32 GB, you will only see NTFS and exFAT.
2. Devices smaller than 32 GB should be formatted in FAT or FAT32 for more reliability and less disk space
wastage.
3. Files larger than 32GB should be formatted in exFAT for latest operating systems.
4. For other compatible devices and other operating systems, files larger than 32 GB should be formatted
using NFTS.
66
Common File Formats
The following are the most common file formats that you will encounter when working in a computer.
Sound
Text
Image*
67
Click through the step-by-step presentation below in installing a web browser.
68
69
LESSON 5: Conducting Tests
Introduction
After installing hardware and software, it is important that we make sure that the computer runs perfectly.
Testing the computer through stress tests is a good example to check if there are remaining issues in the
computer. There are procedures such as gathering test information; validating and responding to these may help
in making sure that everything runs smoothly.
Make sure that you have reviewed the use of diagnostic tools before proceeding to this lesson.
fDisk
A command-line tool that creates and deletes partitions on a hard drive. It is available from Windows 2002
onwards. For newer units (from Windows XP onwards) the disk management tool is used.
70
Disk Management Tool
This is used to manage disks and drives (like internal and external hard drives), create partitions, and format
devices. This is used on newer versions of Microsoft Windows.
Format
It is the process of preparing a data storage device (i.e. hard drive, USB drive, solid-state drive) to store
information.
71
ScanDisk or CHKDSK
Used to check integrity of files and folders in your unit. This can also be used to check the disk surface for
physical errors.
Defrag
It optimizes space on hard drive and allow faster access to programs and data.
Disk Cleanup
A software utility for Windows that lets users remove files and speed up computer performance.
72
System File Checker (SFC)
A tool in Microsoft Windows that allows users to scan and restore corrupt Windows system files. This is
available in Windows 98 and later.
3. Watch the NUM LOCK, CAPS LOCK, and SCROLL LOCK keys light in the keyboard.
1. Like in conducting external visual inspection, make sure that you have turned off the computer including its
devices and peripherals. Disconnect all power cables and electrical outlets.
3. Examine whether all chips, expansion cards, and SEC cartridge and heat sink assembly or assemblies are
fully seated in their sockets or connectors.
4. To ensure that chips are fully seated in their sockets, press firmly on the top of each chip.
73
6. Check whether all cable connectors inside the computer to verify that they are firmly attached to its right
connection.
7. Reinstall the computer cover.
Reconnect the computer and any attached peripherals to their power sources, and turn them on.
Performance testing is checking the software whether it can cope up with the current system performance.
You can conduct stress test by monitoring your computer performance through the Task Manager (Just press
CTRL + ALT + DEL keys to launch the Task Manager).
a. USB
b. Random Access Memory
c. Flash Drive
d. Hard Drive*
a. .EXE organizer
b. File System*
c. Winzip
d. Installation Procedure
a. MAC OS
b. Reaver
c. Linux 75
d. Windows*
7. Which of the following is a FREE Pre-Test
operating system?
1. This is a network device that forwards
a. Windows data packets along networks. It is connected to at
b. MAC OS least two networks, usually two LANs or WANs
c. Reaver or a LAN and the ISP network.
d. Linux*
a. Switch
8. Third party applications like Rufus make b. Repeater
use of bootable devices in the process of c. Router*
installing an operating system. Which device do d. Hub
we usually use to install an operating system?
2. It is the actual measurement of the
a. Hard Drive network's state of operation over a period of
b. Flash Drive* time. The record is used as basis for comparison
c. Cloud Drive or control.
d. Random Access Memory
a. Network Testing*
9. These are several ways in installing device b. Strategic Network Plan
drivers EXCEPT FOR: c. Ping Results
d. Utility Command Tool
a. Downloading drivers online
b. None* 3. All modern routers support 802.11n or
c. Manufacturer's DVD Installer Wireless-N which offer the most stable speeds.
d. Driverpack Solution
e. Driver Update through Device Manager True*
False 9. The following are encryption methods for
wireless networks EXCEPT FOR
4. 192.168.0.1 is the most common default IP
Address when you are accessing the router. a. 802.1X Authentication
b. Wired Equivalent Privacy (WEP)
True* c. Wi-Fi Protected Access (WPA and WPA2)
False d. Weblock System*
5. It is the medium through which 10. A good network testing strategy is one
information usually moves from one network where the network manager is able to predict the
device to another. operation of the network.
True*
a. Cable* False
b. Wire Packet
c. Patch Panels
d. Topology
e. Modular Box
a. DHCP Server
b. Client
c. Local Area Network*
d. IP Address
e. Hub
a. Modular Box
b. Switch
c. Hub
d. Router
e. Patch Panel* 76
We aim to understand how computers are connected to each other that is why it is essential that we should be
familiar with the different devices found in the workplace to perform network connectivity.
It is important to understand that each workplace has a unique plan/map of how the organization distributes
information and who has access.
This lesson's goal is to simply familiarize ourselves with the different network devices which we'll get to
connecting later.
A device that forwards data packets along networks. A router is connected to at least two networks, commonly
two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or
more networks connect.
Switch
A device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer
2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet
protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet
networks, switched Ethernet LANs.
Hub
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.
Hubs and switches serve as a central connection for all of your network equipment and handles a data type
known as frames. Frames carry your data. When a frame is received, it is amplified and then transmitted on to
the port of the destination PC.
77
Repeater
A network device used to regenerate or replicate a signal. Repeaters are used in transmission systems to
regenerate analog or digital signals distorted by transmission loss. Analog repeaters frequently can only amplify
the signal while digital repeaters can reconstruct a signal to near its original quality.
Bridge
A device that connects two local-area networks (LANs), or two segments of the same LAN that use the
same protocol, such as Ethernet or Token-Ring.
A LAN is where computers and mobile devices may share resources like printers, scanners, storage, etc.
The protocol that enables the computer to communicate with other computers in the network. This can be set
automatically or manually specified along with other network information to work properly. Make sure
however that each device has a unique IP.
LAN Settings
78
DHCP Server
Stands for Dynamic Host Control Protocol. This gives the IP Addresses when a device starts and requests an IP
address from the network. It can be set to obtain IP address automatically.
This type is ideal for home networks where you trust all the people and the devices using the network. By
default, network discovery is turned on, allowing you to see other computers and devices, and others can see
you as well.
Work Network
This type is used in small office or other workplace networks. By default, network discovery is enabled
allowing other computers on a network. However, you cannot join or create a home group.
Public Network
This type is the safest. This is designed to keep your computer from being visible to others and helps protect
your computer from malicious software from the Internet. However, network discovery is turned off and home
group is not available on this network.
Domain Network
This is used for domains and at enterprise networks. This is controlled by the network administrator.
The following are the WAN settings used to connect to the Internet Service Provider (ISP):
Dynamic IP Address
MAC Address
This is optional. MAC stands for Media Access Control. The MAC Address is set by default to the MAC
Address of the WAN interface in the device.
This is optional. A Domain Name Server (DNS) is entered. If left blank, the ISP provides the DNS address.
Auto-Reconnect
This feature allows the router to reconnect to the ISP automatically if connections is disconnected.
Static IP Address
This is to set a specific IP Address that is still provided by the ISP. However, this is avoided because this
requires a lot of work and manual entry of network information.
79
PPPoE
Stands for Point-to-Point Protocol over Ethernet. Only used if the ISP uses this protocol. The ISP provides the
username and password.
IP Addressing
IP Address, or the Internet Protocol Address, is a numerical label assigned to a device within a computer
network that uses the Internet Protocol. It has two functions: (1) network hosting; and (2) location addressing.
Cable is the medium through which information usually moves from one network device to another.
There are several types of cables which are commonly used with LANs. In some cases, a network will utilize
only one type of cable, while other networks will use a variety of cable types.
The type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.
The following are different wired connections commonly used in networking. However for this Qualification,
we are focusing on UTP and STP Cables which are most common for Local Area Networks.
A popular type of cable that is commonly used for Local Area Networks. It has a two shielded wires twisted
around each other.
80
The extra covering of the STP Cable provides extra protection to prevent electromagnetic interference.
3. Coaxial Cable
This the cable commonly used in television industries. The metal shield surrounding the cable helps block
interference from fluorescence lights, motors, and other computers.
4. Fiber Optic Cable
Transmits light rather than electronic signals which reduce the risks of electrical interference. It is ideal for
environments where electrical interference is present.
Wireless Connections
Wireless connections make use of LANs which allow high frequency radio signals to communicate between
work stations, servers, or hubs.
Wireless networks are ideal for allowing laptops, portable devices, and other devices to connect to the LAN.
This is also beneficial in establishments where it may be harder to install cables.
81
Wireless Networking
A wireless network is any type of computer network that use wireless data connections for connecting network
nodes.
Wireless PAN
Stands for Wireless Personal Area Networks (WPANs). This connection interconnect devices within a small
area. An example would be bluetooth and infrared.
Wireless LAN
Known as WLANs. This is used to connect to local resources and the internet. It links two or more devices over
a short distance using a wireless distribution method - usually through an wireless router/wireless access point
for internet access. Wi-Fi falls under WLANs.
This is a wireless network made up of radio nodes organized in a mesh topology. It can be a:
(1) Wireless MAN or Wireless Metropolitan Area Network which connects several WLANs.
(2) Wireless WAN or Wireless Wide Area Network which covers large areas such as cities/towns, branch
offices, business, public internet access system, etc.
(3) Global Area Network (GAN) for used for mobile technology such as texting, calling, etc.
(4) Space Network which is used between spacecrafts within the vicinity of earth. NASA's Space Network
makes use of this technology.
TOPIC 2: Cable Installation
In network installation, we have to be familiar with the RJ45 (Registered Jack). It is a jack used for Ethernet
networking and used for cables. Both T568A and T568B are common wiring standards however the T568B is
widely used in the Philippines.
There are two common network cabling namely the straight-through and the crossover cables. A straight-
through cable is also known as the patch cable or Ethernet cable. This is the most common format for
network cables. The wires have same pins from either end. This is used when connecting a computer to a
modem, router, or switch. This is also used between networking equipment that are not similar to each other.
A crossover cable crosses the wires from the other end differently to the other. We use these when we connect
two devices of the same type like two computers or two similar networking devices. These wirings use two
different ends, T568A and T568B.
However, if we use a device between two devices (such as a switch), all cables are straight through.
82
VIDEO: Creating Network Cables
Watch the video below to learn how to create straight-through and crossover cables.
Having an organized patch panel is important in the workplace. Although the patch panel is meant for
organization, it is still essential to minimize hazards such as hanging and open network cables.
Good patch panel cable management is important. Neat patch, for example, is one of the most common patch
panel cable management systems.
It allows users to store patch panels in a neat and tidy compartment. It is also compliant with industry standards.
Patch Panel to Modular Box
In connecting a patch panel to a modular box, it is important to take note that the UTP cable at this time is
neither a straight-through or crossover.
A – white blue / blue / white green / green / white orange / orange / white brown / brown
B – white blue / blue / white orange / orange / white green / green / white brown / brown
83
A computer network is a collection of computers and other devices linked together via use networking devices.
Networking devices are also called as communicating devices.
Computer networks are important because it ensures effective transmission and sharing of data between
different computer devices.
Setting-up computer networks at your homes does not need to be complicated. Few basic pieces of computer
hardware are needed to connect your computers and other devices to each other and to the Internet.
Metropolitan Area Network Larger than LAN. It can span in no more than 50 miles. It is used to
(MAN) cover a small
Wide Area Network (WAN) This type of network covers a large geographic area such as a city or
even a country. Different types of communication channels such as
telephone lines, cables, and air waves are used for this to be possible.
The Internet is an example of a WAN and it is the worlds largest
WAN.
There are different types of network topologies that we will be going through in this topic.
Bus Topology
This is a network type in which the computers and network devices are connected to a single cable.
This type of network can transmit data in only one direction. Each device is connected to a single cable.
PROS
☑ Cost-effective
☑ Cable is required
☑For small networks
☑ Easy to understand and create
☑ Easy to expand (through joining two cables)
CONS
Ring Topology
This network forms like a ring where a computer is connected to another computer. The last computer is
connected to the first. Each computer has two neighbours.
CONS
☑ Hard to troubleshoot
☑ Adding or removing a computer will disturb network activity
☑ When a computer fails, the whole network is disturbed
Star Topology
This type features all computers connected through a single hub/switch through a cable. The hub/switch is a
central node and all others are connected to a central node.
Each node has a dedicated connection to the hub/switch. This will act as a repeater as well for data flow. This
can be done using a UTP, optical fiber, or coaxial cable.
PROS
CONS
☑ High cost
☑ Expensive to maintain
☑ When switch/hub fails, whole network stops
☑ Switch/hub capacity controls the performance
Mesh Topology
This type is a point-to-point connection with other devices. The traffic is carried between two devices which it
is connected.
86
(1) partial mesh topology where some of the systems are connected in the same fashion as mesh topology but
some devices are connected to two or three devices; and
(2) full mesh topology where each and every device is connected to each other. This type features a full, robust
connection. However, it is not flexible.
PROS
CONS
☑ Difficult to install and configure
☑ Expensive cabling cost
☑ Bulk wiring
Tree Topology
This type has a root device and other devices are connected to form a hierarchy. Also known as hierarchical
topology. It should have at least three levels in the hierarchy.
PROS
CONS
☑ Heavily cabled
☑ Expensive
☑ The more devices, the harder the maintenance
☑ If central switch/hub fails, network fails
Hybrid Topology
This type is a mixture of two or more topologies. You may have a department in the office using ring topology
while the other uses a star topology. This is called a Hybrid Topology.
87
It can combine even more than two topologies. Both the advantages and disadvantages are included when you
create a hybrid, thus, ideal for a non-conventional set-up.
PROS
☑ Reliable
☑ Easy troubleshooting
☑ Errors are easily detected
☑Easily scalable
☑ Flexible
CONS
☑ Complex
☑ Expensive
ASSIGNMENT:
Using the network devices you've learned at the previous lesson, try to draw your own office network.
Imagine at least 10 workers but they are divided at far ends of a building.
You have a pool of options to create a topology that will fit them to still have a network connection. You may
use any (e.g. wireless, wired) connections that you deem appropriate.
88
2. There are two wiring standards used for
UNIT TEST V Ethernet networking and for cables. Which of
the wiring standards is most commonly used in
1. This is how the network of the Philippines?
devices/computers is arranged through the
connection of various nodes through lines of a. T568B*
connections. b. T478A
c. T683A
a. Computer Network d. T568A
b. Network Category
c. Network Topology* 3. For a crossover cable of T568A and
d. Hybrid Connection T568B wires, what are the four wires that
change their places?
a. Orange Stripe, Orange, Blue Stripe, Blue*
b. Brown Stripe, Brown, Blue Stripe, Blue a. Router*
c. Blue Stripe, Blue, Green Stripe, Green b. Hub
d. Green Stripe, Green, Orange Stripe, Orange c. Repeater
d. Switch
4. It is used to connect and route circuits for
monitoring, interconnecting, and testing circuits 9. This is a Local Area Connection Property
in a convenient and flexible network. Organizing protocol which enables the computer to
these is important in the workplace to minimize communicate with other computers in the
hazards like hanging and open network cables. network. This can be set automatically or
manually specified along with other network
a. Modular Box information properly. It is also uses a 32-bit
b. Hub address space consisting of numbers.
c. Switch
d. Patch Panel* a. Internet Protocol Version 6 (TCP/IPv6)
e. Router b. Wide Area Network
c. DHCP Server
5. This is a group of computers and d. Internet Protocol Version 4 (TCP/IPv4)*
connected devices that share a common e. Clients for Microsoft Networks
communication line to a server.
10. This transmits light rather than electronic
a. Local Area Network* signals which reduce the risks of electrical
b. Client interference.
c. DHCP Server
d. IP Address a. Shielded Twisted Pair
e. Hub b. Fiber Optic Cable*
c. Coaxial Cable
6. This is the most popular type of cable d. Unshielded Twisted Pair
used for Local Area networks. It has two
shielded wires twisted around each other.
a. Coaxial Cable
b. Shielded Twisted Pair Cable
c. Unshielded Twisted Pair Cable*
d. Fiber Optic Cable
a. Cable*
b. Modular Box
c. Topology
d. Patch Panels
e. Wire Packet
Having a wireless network will let people communicate and access applications and information without
physical wirings. This advantage of cleaner, tidier, and freer space lets people access the internet with ease.
ISPs provide the broadband connection. For example, PLDT, a telephone company, provides DSL, and SKY, a
cable TV company, provides internet connection too. These ISPs provide broadband modems, and nowadays,
even combination modem/wireless routers.
A wireless router is essential in a WLAN for home and small office networks. It allows connection to the
Internet as well as local network access. The router can be connected through a wired or wireless WAN.
There are varieties of routers still being developed and improved today that allow capabilities such as being able
to filter traffic.
All modern routers nowadays support 802.11n, or Wireless-N, which offer the most stable speeds. These routers
still offer backward compatibility with older standards like the 802.11g.
The wireless router is ideally placed somewhere in the home/small office where it can receive a strong
signal and has least amount of interference.
Follow these guidelines to ensure the best out of your wireless router:
That is why it is important to set certain protocols in ensuring privacy of personal information and files as these
can lead to identity theft or malicious practices.
Simply putting a network security key to your wireless router can prevent unauthorized access to the network.
This security method encrypts the information and assures that the security key has not been modified. WPA is
for all wireless network adapters, but not in older routers and access points. WPA2 is a secure version, but does
not work in older adapters.
This is an older method but not recommended anymore. When enabled, the security key is set up. This key
encrypts the information that one computer sends to another through the network. This, however, is easy to
crack.
3. 802.1X Authentication
This helps improve security for 802.11 wireless networks and wired Ethernet networks. It makes use of a server
to validate users and provide network access. This is common in workplaces.
(1) Open Network and Sharing Centre (Start> Control Panel > Network and Sharing Centre)
(2) Click Set up a new connection or network.
(3) Click Set up a new network, then next.
The wizard will walk you through with a network name and security key; the default will be a Wi-Fi WPA2
91
Then, we can add computers to the network:
Follow the step-by-step procedures on how to change the router username and password.
102
103
104
105
106
Changing Wireless Name and Security Key
Follow the step-by-step procedures on how to change the wireless name and security key.
107
108
109
The difference is that the previous topic is on the administrative privileges of accessing the router itself while
this is when you connect wirelessly; what name appears on your phone's Wi-Fi connection options.
Follow the step-by-step procedures on how to configure the MAC Address Reserve.
110
111
112
113
114
115
116
117
118
119
This is done when you want to reserve specific devices to connect exclusively to the router, no matter how
much limit you put into wireless devices to connect, for example. Each device has a MAC Address so this
means that you are reserving these devices. Most of the time these devices are your own or the family's. So no
matter how many neighbors or friends connect to your router, and you've limited to only 5, for example, your
devices will still connect.
Creating a Workgroup
(1) First, find the basic wireless settings. Maximize the broadcast of the signal to the highest Mbps as possible.
(2) Select Repeating Functions or Signal Repeat Settings or menu items that mention repeating. From here, you
identify the primary router as the base station where the internet, for example, is connected first.
(3) If prompted, enter the MAC Address of the router/repeater. This is a 16-character name located at the sticker
below the device.
(4) Unplug the Ethernet from the primary router. Connect it to the repeater or secondary router that will be a
wireless repeater. Log in to the router at 192.168.0.1
(5) Type in the SSID you will use. Repeat the previous process: Enable the signal repeating functions. Enter the
MAC address. Save and disconnect repeater from computer.
(6) Make sure you find a good location for the wireless repeater. It should still reach the Wi-Fi signal area but
enough to maximize its extended signals.
123
LESSON 2: Securing the Network
Introduction
There are many security threats that are spread over the internet. Viruses, worms, Trojan horses, zero-day
attacks, hacker attacks, denial of service (DOS) attacks, data interception, and theft.
That is why it is important that there are security protocols aside from router configuration to further protect the
network. It is wise to prevent these threats from entering and spreading on the network.
TOPIC 2: Firewall
Basically, a firewall is a device -- that can be hardware or software based -- which controls access to the
organization's network.
There are several types of firewalls depending on the security needed by the network.
These operate at a low level of TCP/IP protocol where packets are not allowed to pass through unless they
match the rules set by the firewall administrator.
These work on the application level of the TCP/IP stack. These can intercept all packets traveling to or from the
application. They can block other packets - unwanted outside traffic can be prevented.
Application Firewalls
These are network-layer and application-layer types that overlap. An example is restricting ftp services
through /etc/ ftpaccess file.
Proxy Firewalls
These operate at the firewall's application layer. These act as intermediary for requests from one network to
another for a specific network application. These prevent direct connections between either sides allowing or
blocking traffic based on the rules set.
It is important to test computer networks to assure that these networks will be effective especially in the long
run.
Aside from ensuring that these networks are secure, it is essential that we know in the first place that they are
working correctly to avoid issues in the future.
124
TOPIC 1: Network Testing
Network Testing is the actual measurement of the network's state of operation over a period of time. This record
will be the basis for comparison or control.
A good network testing strategy is one where the network manager is able to predict the operation of the
network.
Testing the reliability and its ability to support new applications and users are among the list of factors in
examining a good network.
From here, a network manager is able to obtain valuable insight where s/he may use for further improvements
and troubleshooting.
We should look for the following when we are testing the network:
The following steps may require you to be an Administrator to access some of the features in this procedure.
To enable diagnostic logging;
(1) Open the Network Connections folder and view the available connections.
(2) Press ALT to display the menu bar, then access Advanced, click Remote Access Preferences.
(3) Access Diagnostics, you can do one or more of the following:
a) You can enable logging for all remote access connections. Select Enable logging. Then
click Generate Report.
b) You can clear logs that were created during previous connection attempts. Select Clear Log. Then
click Generate Report.
To view this report, click View Report.
To save it to a file, click Save report to this file.
To send report to an e-mail address, click Send report to this e-mail address.
To generate a more concise report, click Generate summary report. 125
True
UNIT TEST VI False*
1. The following are encryption methods for 9. A firewall is a device which controls
wireless networks EXCEPT FOR access to the organization's network. There are
several types depending on the security needed
a. 802.1X Authentication by the network such as network layer,
b. Weblock System* application layer, application, and proxy
c. Wired Equivalent Privacy (WEP) firewalls.
d. Wi-Fi Protected Access (WPA and WPA2)
True*
2. It is important to set certain protocols in False
ensuring privacy of personal information and
files since an unsecure network can lead to 10. The following are good practices in
identity theft or malicious practices. ensuring the wireless router can receive a strong
signal and has least amount of interference,
True* EXCEPT FOR:
False
a. Place the center at the center of the house
3. Having a wireless network will let people b. Place it away from microwaves/cordless
communicate and access applications and phones
information without physical wiring. There are c. Place the router on the floor.*
many advantages such as cleaner, tidier, and d. Move it away from walls and metal objects
freer space.
True*
False
a. Network Testing*
b. Strategic Network Plan
c. Ping Results
d. Utility Command Tool
True*
False
True*
False
True*
False
a. Multiple clients, single server 10. It is the storage of files stored by the user
b. Single client, single server to the computer server.
c. Multiple clients, multiple servers
d. Multiple clients, no server* a. Memory
b. ADDS
3. This service is one of the most used on a c. User folder*
Windows network. It enables one to realistically d. Random Access Memory
assess operational requirements and server
performance for each computer.
a. Web Services
b. File Services
c. Domain Controller*
d. Remote Access
True
False*
a. Modules*
b. Commands
c. Actions
d. Configuration
True*
False
Maintenance cost
Training cost
Hardware cost
127
UNIT VII - Set-up User Access
LESSON 1: Understanding the "Server" and "Client"
Introduction
To understand this, this module will run you through how computer networks are connected in sharing
information and resources through servers and clients.
Since you've just learned about networks in the previous module, the computer server will be an example of a
network that you will be working with in the workplace.
This lesson will run you through the client/server network model. You will be able to enumerate the various
functions of the client/server model and as well as discuss their different topologies.
TOPIC 1: Client/Server
Client/Server, according to the Management Information System, is the new technology that yields solutions to
many data management problems faced by modern organizations.
This is a model based on the distribution of functions between two types of independent and autonomous
processes: Server and Client.
Server - a process which provides requested services for the Client.
Basically, the two processes reside on two or more independent computers on a network. The server gives
services for more than one client.
Disadvantages
Maintenance cost
Training cost
Hardware cost
Software cost
Complexity
In this lesson, you will learn how to create a user folder with Network Operating System, or NOS, features.
Basically, a user folder is the storage of files stored by the user to the computer server.
Before creating a user folder, the administrator of the server should first install the Active Directory Domain
Services (ADDS) and create a user account.
To install the ADDS, the administrator should open command prompt (Ctrl + R then cmd), and type dcpromo to
install ADDS, DNS, and create a forest and domain.
Validates and gives access to all users and computers in a Windows domain type network,
Appoints and creates security protocols for all computers, and
Installs and adds software.
Features of ADDS
1. Security - The data is stored securely. Each of the objects in the Active Directory has an ACL or Access
Control List which consists of the resources that one may access and along with access privileges given to each
resource.
2. Query Capabilities - The ADDS creates a global catalog to give a mechanism to handle queries. A client
which has ADDS can query the catalog to request directory data.
3. Replication - To replicate a directory to all domain controllers means easy access, high availability, and
improved fault tolerance.
4. Extensibility - Having ADDS is extensible. Meaning that new object types can be added to a directory. An
attribute can be added, for example to the user object.
131
Once a user is created, a user folder is also automatically created upon the log-in of the user to the client
computer.
You can carefully follow the steps below if you have two computer units (one installed with Windows Server OS
and a Windows 7/8/10 ) connected through a network cable.
This is a crucial step when configuring the server as this is required for the server computer itself.
Configuring the Active Directory Domain Services
Follow the step-by-step procedures on how to configure the ADDS (Active Directory Domain Services).
136
137
138
139
140
This is important since this is where all the information on resources are centered on.
.
Adding Roles
Follow the step-by-step procedures on how to create an organizational unit and a user.
145
146
147
LESSON 3: Configure User Access
Introduction
In the workplace, computers are not used by an individual for personal use. Computers are usually accessed by
more than one person. System administrators are able to log on locally if these accounts are in the domain.
A computer is able to identify between one person/people to another through a security device called the user
account object.
Each user in the network has a unique user account which contains the contact details of the users as well as
what his/her rights and restrictions in accessing resources/folders, etc.
148
TOPIC 1: Features of a User Account
The following are the features of a domain-based user account in Windows Server 2008 r2 (which we will be
using throughout this module).
Password Security
Each user account is protected by a password to provide authorization and access to the system.
Permissions
These are access privileges granted to a user account (e.g. group memberships, user-specific settings to access
resources, etc.)
Identification
Having a user account means easily identifying the person to the computer system and network.
User Rights
Having user rights is a high-level privilege given to users or groups to define their action on a computer system.
Roaming
The administrator may define user accounts in a way that a user is able to log on to any system which is a
member of a domain using a domain user account, a Remote Access Service (RAS), or gateway.
Environment Layout
Profiles are user-specific and able to store information about the layout, desktop, and user environment in
general. They are specifically restricted through the use of mandatory profiles.
Auditing
The server can track access and use by domain user accounts.
You can carefully follow the steps below if you have two computer units (one installed with Windows Server OS
and a Windows 7/8/10 ) connected through a network cable.
1. To get to Active Directory Users and Computers, choose Start> All Programs > Administrative Tools >
Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization unit to which you want to
assign this new account.
3. In the details pane, right click the group and then choose Properties.
4. On the Members tab, Click Add.
5. Fill in the following information.
6. Click the Next button to continue setting up this new user account object.
7. Type the password for this account and confirm that password to the system by retyping it.
8. Configure the password setting using the options described.
9. Click the Next button when you’re finished marking your selections.
10. Click the Finish button if everything is correct.
149
2. The Server is the process which provides
UNIT TEST VII requested services for the Client.
1. Before creating a user folder, the True*
administrator of the server should first install False
the Active Directory Domain Services (ADDS)
and create a user account. 3. One of the main disadvantages of using
server/client systems is the cost such as:
True*
False Maintenance cost
Training cost
Hardware cost
Software cost 10. It is any process that requests specific
services from the Server.
True*
False a. Network
b. Server
4. The following are client/server topologies c. Client*
EXCEPT FOR d. Boss
True
False*
True*
False
True*
False
150
UNIT VIII - Configure Network Services
LESSON 1: Checking Normal Functions
Introduction
In this lesson, you will be able to identify various boot processes. This is important because a startup failure
might occur. To successfully boot the server operating system is the first step in handling the server.
Some issues may be easily diagnosed and corrected however, take note that not all server errors occur only
during booting. It can also occur when it is running or even when the server is shutting down.
Pre-boot
Boot
Load
Initialization
Log-on
In each stage, there are steps that should be followed in loading and using files. In each of these stages, observe
how the process works, how the particular files are utilized, and what is seen on screen.
Pre-boot
By turning on or resetting the computer, you should perform the Power-On Self-Test or POST routine discussed
in the previous modules.
The BIOS shall execute the Initial Program Load where the boot devices are read and prioritized.
The partition information is seen as well as the boot sector and the Windows Boot Manager. You will also see
the memory check, hardware, and boot device search.
Corrupt MBR - This is caused by many viruses in the Master Boot Record which corrupted it.
Improperly configured hardware - This happens when the hard drive is not recognized. This error can
happen even if the device is fine and the configuration is unchanged.
No partition is marked as active - This may happen if the Fdisk utility is recently used and no partition
is made from all the free space available.
Corrupt or missing Ntldr file - This may happen when the Ntldr file is corrupted or deleted by a virus.
Boot - Windows Boot Manager reads the boot configuration data (BCD). But in the case of having more
than one boot partition, it prompts the user to choose a partition and its operating system.
If a choice is not made before the time clocks out, the default partition and operating system will be loaded. If
you are booting a Windows Server operating system, the Windows Boot Loader (Winload.exe) is started.
151
The following are common causes of error during this stage:
By this time, the Windows Server 2008 “splash” screen comes up.
While this happens, the Windows Boot Loader loads the operating system kernel, the hardware abstraction layer
that provides the interface between the operating system and a particular set of hardware, the Registry file, and
the drivers for basic hardware devices, such as the monitor, mouse, and keyboard.
Initialization
The OS kernel is initialized and takes over from the Windows Boot Loader, bringing up the graphical display
and filling the Registry with HKEY_LOCAL_ MACHINE\HARDWARE key, and
HKEY_LOCAL_MACHINE\SYSTEM\SELECT subkey (called the “Clone Control Set”) and loads the
remainder of the device drivers.
Logon
The Windows Server OS graphic user interface (GUI) comes up and the logon screen will show.
After a successful logon, the necessary services are prompted, the Last Known Good control set is written on
the basis of the Clone Control Set, and the start-up programs are started.
1. If logon errors occur, they are usually due to an incorrect username or password or to the unavailability of a
DNS server or a domain controller to authenticate the request (if the computer is a part of a domain).
2. Errors can also occur if a service cannot be loaded. If a service fails to load, you will see a message in the
System Log of Event Viewer.
One must be able to load modules and add-ons so that you can access their functions. Modules will contain
other modules. But however, modules are independent and can be used without the other depending on the
needs of the server.
This lesson will briefly go through the different modules and add-ons that you may utilize for the server.
152
You are able to write commands with these modules to organize commands and share with others.
Those who will receive modules can add commands in the modules to their Windows Power Shell sessions to
use them like built-in commands.
List of Modules/Add-ons
The following are modules which support different functions and features in the Windows Server OS.
Procedure:
Step 3: Load the Server Manager module into the current session
In the Power Shell window, type the following command and press ENTER:
Get-Help Import-Module
In the Power Shell window, type the following command and press ENTER:
Import-Module Server Manager
When you are managing a NOS or Network Operating System, you should know there are different network
services that are available.
These services need to be configured so that communication will flow easily within the network.
You are expected to learn most of these network services and configure them.
There are seven basic network services that you need to be familiar with: remote access, domain controller, web
services, database services, proxy server, file services, and printer services.
We will go through each of these through this lesson.
153
One of the most common form of remote access is the remote desktop. This basically allows a server computer
can control with the actual desktop user interface of another computer.
To setup a remote desktop, both the host and target (controlling computer and remote computer to be accessed)
need to be installed certain software.
TOPIC 2: Domain Controller
This service is one of the most used on a Windows network. It enables one to realistically assess operational
requirements and server performance for each computer.
It responds to security authentication requests and the like that need verification from the host for many security
and validation doors across the network.
Several web applications that have many roles and functions can also be hosted using ASP.NET and .NET
Framework 3.0, among others.
The term may also refer to a computer dedicated to running such a program. Database management systems
frequently provide database server functionality.
A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other
resource available from a different server and the proxy server evaluates the request as a way to simplify and
control its complexity.
Includes these role services and subservices: File Server, Distributed File System, DFS Namespace, DFS
Replication, File Server Resource Manager, Services for Network File System (NFS), Windows Search Service,
Windows Server 2003 File Services, File Replication Service (FRS), and Indexing Service.
154
TOPIC 7: Print Services
For print servers, this resource type provides for high availability of network-attached print devices.
Printers connected directly to print servers cannot be included because there is no way to fail over control to a
different server.
If a print server fails, all jobs that are currently spooling are restarted. Jobs that are in the process of spooling
are discarded and must be re-spooled or reprinted to the Print Spooler resource.
TOPIC 8: Performing basic network service configuration
You will be needing a computer installed with Windows Server 2008 R2 operating system to perform the
following procedures.
Steps/Procedure:
Folder Sharing
Follow the step-by-step procedures on how to configure folder sharing where folders across a network are
shared to all connected devices.
155
156
157
158
159
160
Folder Redirection
169
170
171
172
6. It is a server (a computer system or an
UNIT TEST VIII application) that acts as a middle ground for
requests from clients seeking resources from
1. The _______________ is the package that other servers. These are created to add structure
contains Windows PowerShell commands. and encapsulation to distributed systems.
a. Commands a. Simple Server
b. Actions b. Proxy Server*
c. Modules* c. Windows Server 2008
d. Configuration d. Domain Controller
2. To successfully boot the server operating 7. There are five basic network services that
system is the first step in handling the server. you need to be familiar with: remote access,
domain controller, database services, file
True* services, and printer services.
False
True
3. The Windows Boot Manager reads the False*
boot configuration data (BCD).
8. One of the most common form of remote
True* access is the _________________________.
False
This basically allows a server computer can
4. The printer services role provides control with the actual desktop user interface of
essential services for managing files and the way another computer.
they are made available and replicated on the
network. a. Remote Desktop*
b. Control from Remote
True c. Automated Computing
False* d. Airplane Mode
5. This service is one of the most used on a 9. Those who will receive modules can add
Windows network. It enables one to realistically commands in the modules to their Windows
assess operational requirements and server PowerShell sessions to use them like built-in
performance for each computer. commands.
a. Domain Controller* True*
b. Web Services False
c. File Services
d. Remote Access 10. The boot process has four major stages:
1. Pre-boot
2. Boot
3. Load
4. Initialization
True
False*
173
d. Check cable issues
Pre - Test
5. ____________________ is the copy of data
1. The following are purposes of preventive on a computer or hard drive that is saved to an
maintenance EXCEPT FOR: external media such as a DVD, CD, or flash
drive.
a. Organize electrical-related circuit In an organization, it is routinely done—may it
maintenance* be daily, weekly, or on a monthly basis. This is to
b. Upgrading certain hardware or software for ensure that the organization’s data are protected
security and reliability and are readily available.
c. Reduces the probability of hardware or
software problems a. Emptying the recycle bin
d. Ensures minimal system failure b. Defragmentation
c. Backup*
2. The following are ways to maintain your d. Preventive Maintenance
computer EXCEPT FOR:
6. The two methods to eliminate a virus is
a. Search and delete spyware and viruses from through (1) removing the virus and (2)
the device quarantine.
b. Clean browsers
c. Uninstall programs that are no longer used True*
d. Install more programs* False
e. Defragment the hard drive routinely to keep
the device running smoothly 7. Regular cleaning of components makes
the computer at risk to overheating.
3. Which of the following are the benefits of
conducting maintenance? True
False*
a. Increased data protection
b. Extended device life 8. Troubleshooting is not honed over time.
c. Increased equipment stability Every time an issue is resolved, this should
d. Reduced repair costs follow guidelines on textbooks and manuals
e. All of the above* strictly. Through troubleshooting experience,
one should know the steps needed to resolve an
4. The following are the techniques and issue quickly.
strategies that you may perform when you are
trying to solve hardware issues EXCEPT FOR: True
False*
a. Run Cleaner*
b. Trial and Error 9. Before backup, make sure to verify the
c. Document computer issues following with the customer first:
•Date of last backup
•Content of backup
•Data integrity of the backup
•Availability of backup media for data
restoration
True*
False
True*
False
174
Introduction
Troubleshooting is an approach to locate the cause of faults in a computer system. Not all
troubleshooting experiences are the same since technicians acquire this skill based on their
knowledge and personal experience.
It is done to prevent failure of parts, materials, and systems by regularly checking whether all parts
are in good working order.
Preventive maintenance depends on the needs and specifications of the equipment. For example, a
device exposed to a dusty environment such as a construction site would need more maintenance as
compare to an office environment.
High traffic networks such as those used in schools would require more extensive scanning and
removal of malicious software and unwanted files.
Do take note that it is important to create documentation for any type of preventive maintenance, so
that you can also check how often do certain hardware and software issues occur.
175
Besides these, here are more reasons why maintenance should be conducted:
Maintenance Basics
How to Perform Disk Clean Up:
1. Start Menu > Programs > Accessories > System Tools > Disk Clean Up
2. Select Drive to Clean Up > Click Ok
3. Check all items that need to be removed > Click Ok
Dust can accumulate in your computer in less than a year, depending on how dusty your house.
Check every few months.
Make sure to follow proper computer assembly and disassembly.
(3) Be careful when plugging peripherals to the computer.
Ports can be easily damaged when mishandled. These repairs can be quite costly.