Technology and Livelihood Education: Ict-Computer Hardware Servicing
Technology and Livelihood Education: Ict-Computer Hardware Servicing
Technology and Livelihood Education: Ict-Computer Hardware Servicing
Technology
and
Livelihood Education
ICT-COMPUTER HARDWARE
SERVICING
1
Alternative Delivery Mode
Republic Act 8293, Section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of
such work for profit. Such agency or office may, among other things, impose as a
condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.
2
10
Technology
and Livelihood
Education
ICT-COMPUTER
HARDWARE SERVICING
Quarter 1 -Module 8
CONFIGURE COMPUTER
SYSTEMS AND NETWORKS
3
For the learner:
This module is provided as your alternative instruction for learning in which content
and activities are based on your needs. It is a self-paced approach wherein you will
work on different activities that are interesting and challenging.
To accomplish what is expected from you, you are encouraged to stay focused and
develop a sense of responsibility and independence in doing the different tasks
provided in the module. Be an empowered learner. Always believe that nothing is
impossible and nobody can stop you from reaching your dreams.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.
4
What’s In This is a brief drill or review to help you link
the current lesson with the previous one.
5
At the end of this module you will also find:
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain
deep understanding of the relevant competencies. You can do it!
6
Table of Contents
Lesson 1
What’s In ------------------------- 3
What is It ------------------------- 4
Assessment ------------------------- 12
References ------------------------- 14
7
What I Need to Know
This module was designed and written with you in mind. It is here to help you understand
Computer Hardware Servicing.
This module is focused on developing skills in configuring computer systems and networks.
You will study techniques on how to plan and configure pc essential to be successful in
computer hardware servicing as one of the career option in ICT.
The lessons are arranged to follow the standard sequence of the course.
8
What I Know
(PRE-TEST)
______2. It is a command used to find out the IP address of a certain network you are
connected to.
______3. It is a Command Prompt command used to test the ability of the source computer
to reach a specified destination computer.
IP Addressing
Lesson
9
4
What’s In
Aside from the main lesson, this module consists of pre and post assessment tests together
with various activities which you are required to perform in order to measure your level of
understanding. Each of the activities has corresponding rubrics as your guide.
What’s New
A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part
of the protocol specifies where on the envelope the delivery address needs to be written. If
the delivery address is written in the wrong place, the letter cannot be delivered. Internet
protocol works in a similar way. Internet protocols are sets of rules governing
communication within and between computers on a network. Protocol specifications define
the format of the messages to be exchanged.
10
WHAT IS IT
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP address, the
subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same
subnet mask. Table 3 shows default subnet masks for usable IP addresses that are
mapped to the first three classes of IP addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address is the network
portion
255.255.0.0: Class B, which indicates that the first two octets of the IP address are the
network portion
255.255.255.0: Class C, which indicates that the first three octets of the IP address are
the network portion
Class D addresses are used for multicast groups. There is no need to allocate octet or bits to separate
Class D addresses are used for multicast groups. There is no need to allocate octet or bits
to separate network and host addresses. E addresses are reserved for research use only.
IpConfig
Ipconfig is a command used to find out the IP address of a certain network you are
connected to.
1) Click on Start Button, then type cmd (command prompt) on the search box.
11
3) Type ipconfig and press enter. The figure below shows the IP configuration window using
the ipconfig command. The information from this window will be useful because it shows
the IP address, subnet mask and default gateway of a network you are connected to.
12
5. Click the Properties button. The
Internet Protocol (TCP/IP) Properties dialog box appears.
9. Type the address for the preferred DNS server. The address should be obtained from
your Internet Service Protocol. It is used to help your computer find web pages and other
addresses on the internet.
13
10.Type the address for the alternate DNS server. The alternate Domain Name System
(DNS) server’s IP address is something that your ISP provides.
If more than a few computers comprise the LAN, manually configuring IP addresses for
every host on the network can be time-consuming and prone to errors. In this case, using a
Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP
addresses and greatly simplify the addressing process.
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server address
14
The DHCP server receives a request from a host. The server then selects IP address
information from a set of predefined addresses that are stored in a database. After the IP
address information is selected, the DHCP server offers these values to the requesting host
on the network. If the host accepts the offer, the DHCP server leases the IP address for a
specific period of time.
Using a DHCP server simplifies the administration of a network because the software
keeps track of IP addresses. Automatically configuring TCP/IP also reduces the possibility
of assigning duplicate or invalid IP addresses. Before a computer on the network can take
advantage of the DHCP server services, the computer must be able to identify the server
on the local network. You can configure a computer to accept an IP address from a DHCP
server by clicking the Obtain an IP address automatically option in the NIC configuration
window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain an IP address, the
Windows operating system automatically assigns a private IP address. If your computer is
assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, it can
communicate with only other computers in the same range. An example of when these
private addresses would be useful is in a classroom lab where you want to prevent access
outside to your network. This operating system feature is called Automatic Private IP
Addressing (APIPA). APIPA continually requests an IP address from a DHCP server for
your computer.
Ping
The ping is a Command Prompt command used to test the ability of the source computer to
reach a specified destination computer. The ping command is usually used as a simple way
to verify that a computer can communicate over the network with another computer or
network device. The ping command operates by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination computer and waiting for a response.
How many of those responses are returned, and how long it takes for them to return, are
the two major pieces of information that the ping command provides.
15
Using the
ping Command Ping is one of your most important tools in troubleshooting Internet
problems. It shows you whether the Domain Name Server is working, whether the computer
you are trying to talk to is reachable, and how long it takes to get there. It does this at a very
low level — only the most basic Internet functions have to be up and running. 1) Click on
16
What I Have Learned
17
What I Can Do
1. What are the different IP Classes? Discuss each briefly and give examples.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
________________________________________________________________
18
Assessment
Matching Type
Direction: Match column A with column B. Write your answer on a separate sheet of paper.
A B
___1. Using this option will ping the target until
you force it to stop using Ctrl-C.
___2. this ping command option to prevent ICMP A. –a-
Echo Requests from being fragmented by B. Target
routers between you and the target. C. –t
D. -6
___3. This forces the ping command to use IPv6
E. –n count
___4. value when executing the ping command F. –r
adjusts the amount of time, in milliseconds, that G. –f
ping waits for each reply. H. -4
I. –wtimeout
___5. This option tells the ping command to
J. –s count
trace the round trip path.
___6. This forces the ping command to use IPv4
___7. Use this option to report the time, in
Internet Timestamp format
___8. This ping command option will resolve, if
possible, the hostname of an IP address target.
___9. This option sets the number of ICMP Echo
Request messages to send.
___10. This is the destination you wish to ping,
which is either an IP address or a hostname.
Answer Key
1. Subnet mask
2. IP config
19
3. Ping
4. Class D
5. DHCP
ASSESSMENT
What I have learned
1. A 1. C
2. B 2. G
3. C 3. D
4. B 4. I
5. B 5. F
6. H
7. J
8. A
9. E
10. B
References
D-CHS_Grade10_-Q1-Q2
20
For inquiries or feedback, please write or call:
21