Académique Documents
Professionnel Documents
Culture Documents
Quarter I 4 hrs.
Content Standard
Performance Standard
Learning Competencies
I. Introduction
This teachers guide will lead you to effectively and efficiently teach
Module 1. Moreover, this will guide you in determining relevant and appropriate
teaching techniques and strategies that will fit the learning needs and demands of
the learners to make them best understand and appreciate the importance of
entrepreneurship and the entrepreneurial competencies related to Computer
1
Hardware Servicing.
II. Objectives
With your assistance and the guidance of this module, learners are
expected to understand the underlying principles and concepts of PECs,
particularly in:
- identifying areas for improvement, development, and growth,
- aligning learners PECs according to their business or career choice, and
- creating a plan of action that ensures success in their business or career
choice.
III. Presentation of Content
Introduction
Guide learners in appreciating and understanding PECs for them to be
successful in business or in the workforce by sharing inspiring real-life
stories of successful businessman and or well-known employees in the field
of Computer Hardware Servicing in the province.
Explain to learners the importance of assessing their PECs.
Guide learners in understanding the importance of entrepreneurs and
entrepreneurship.
Objectives
Guide learners in identifying and understanding the objectives of Module 1.
Pre-Assessment
Use the sample pre-assessment test available in the learners materials or
craft a comprehensive teacher-made test to assess learners prior
knowledge and skills in PECs.
Evaluate the result of the pre-assessment and prepare a plan of action to
strategically address the learning needs and requirements of the learners.
2
Guide Questions
Have learners actively perform task 2, and let them share their answers and
relevant experiences with the class.
Process learners understanding of the guide questions presented on task 2.
V Feedback
1. E 6. B
2. K 7. C
3. H 8. I
4. A 9. D
5. J 10. F
VI References
5. http://www.thetimes100.co.uk/theory/theory--constraints-on-production--
303.php#ixzz1PVkyDy8k
4
6. http://www.thetimes100.co.uk/theory/theory--production-and-resource-
requirements--354.php#ixzz1PVlGG7zv
7. http://www.thetimes100.co.uk/theory/theory--nature-and-role-of-marketing--
245.php#ixzz1PVlc88gR
5
Teachers Guide
Quarter I 4 hrs.
Content Standard
Performance Standard
The learner independently creates a business vicinity map reflective of
potential market in Computer Hardware Servicing in a province.
Learning Competencies
V. Introduction
6
To be successful in any kind of business venture, potential entrepreneurs
should always look closely at the environment and market. They should always
be watchful on the existing opportunities and constraints. The opportunities in
the business environment are those factors that provide possibilities for a
business to expand and make more profits. Constraints, on the other hand, are
those factors that limit the business to grow, hence reduce the chance of
generating profit. One of the best ways to evaluate the opportunities and
constraints is to conduct Strengths, Weakness, Opportunities and Threats
(SWOT) Analysis.
VI. Objectives
7
Guide learners in identifying and understanding the objectives of this
module.
Pre-assessment
Use the sample pre-assessment test available in the learners materials
or craft a comprehensive teacher-made test to assess learners prior
knowledge and skills in environment and market.
Evaluate the result of the pre-assessment and prepare a plan of action to
strategically address the learning needs and requirements of the
learners.
Guide Questions
Ask learners to perform task 2 and guide them in presenting their
answers to the class.
Process learners responses and guide them in making appropriate
generalizations.
Learning Goals and Target
Help learners in planning their own learning goals and target as reflected
on page 18.
Provide enrichment activities and guide them in analyzing available
resources and technology in the community to be used in accomplishing
their learning goals and targets.
8
Use the result of the assessment in designing / developing learning
activities that will enrich learners understanding.
Process
Guide learners in accomplishing task 3 on pages 24 to 25. Let them
conduct a research by interviewing a successful entrepreneur or
practitioner within the province.
Have learners present their research to the class. Process their
understanding in relation to the objectives of this module.
Reflect and Understand
Inspire learners to deepen their understanding about the environment
and market by carefully watching the videos related to the prescribed
topics on task 4 on page 25.
After watching the videos, let them prepare a comprehensive narrative
report on the topics they watched.
Encourage learners to present their accomplishments to the class.
Process learners understanding in relation to the objectives of this
module.
Transfer
Guide learners in developing concepts for their own product or service
as reflected on task 5 on page 26.
Assist learners in analyzing and utilizing available resources in
developing their concept of their own product or service.
Evaluate learners output by referring to teacher-made rubrics which is
aligned to the performance standards.
Let learners eloquently share and present their output with the class.
Lead learners in reflecting on the importance of product
conceptualization.
Generating Ideas for Business
Know
Let learners read and understand topics related to generating ideas
for business, selecting a business idea, and branding.
Let learners undergo varied levels of learning activities to better
appreciate the importance of generating ideas for business, selecting
a business idea, and branding.
Process learners understanding relative to the objectives of this
module.
Process
Lead learners in reflecting on their SWOT Analysis and its importance
in generating business ideas by engaging them in learning
9
opportunities for interaction with others outside the classroom and
with the use of technology.
Instruct learners to enrich their knowledge on SWOT Analysis by
conducting researches.
Provide an appropriate type of assessment to evaluate learners
understanding of the SWOT Analysis. Use the result of the
assessment to craft more appropriate and productive learning
activities.
Assist learners in performing task 6 (SWOT Analysis).
Evaluate / Assess learners output and check it against the objectives
of this module.
Reflect and Understand
Let learners work on an independent learning activity or cooperative
learning (ICL) in accomplishing task 7 (Extra Readings and Video
Viewing) on page 33.
Assist learners in presenting their output. Assess the evidence of
learning and provide useful input to improve their output.
Transfer
Have learners prepare task 8 (Designing a Logo). Assist learners in
accomplishing this task by letting them adhere to their real life
experience.
Assess learners output using teacher-made rubrics following the
standards and objectives of this module.
Have learners prepare task 9 (Making My Own Vicinity Map). Guide
learners in creating their own vicinity map reflective of potential
market in computer technician in your province. Ask them to present
their output and process their understanding by asking relevant and
essential questions.
Assess learners output using teacher-made rubrics following the
standards and objectives of this module.
Assess learners output using teacher-made rubrics following the
standards and objectives of this module.
V Feedback
Pre / Post Assessment
6. D 6. D
7. C 7. B
8. A 8. C
10
9. B 9. D
10. A 10. D
VI References
11
Grade Level Standard
Information and Communication Technology (ICT) is one of the four (4)
components of Technology and Livelihood Education (TLE). One of the
courses offered is Computer Hardware Servicing (CHS). This course covers
Process and Delivery (PD) which consists of the core competencies that a
Grade 10 student ought to possess namely: plan and prepare for
configuration, configure computer systems and networks and inspect and test
configured computer system and network.
Content Standard
Performance Standard
I - Introduction
II - Learning Competencies
12
performing the activities; process learners understanding; and assist the
learners in applying what they have learned to an entirely new context.
13
clean sheet of paper.
14
maintenance category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following is a wizard used to configure MS Windows for
vision, hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. A tab in direct X Diagnostic tool that displays your current audio
settings.
a. Input c. Sound
b. Music d. System
8. Which of the following networking cable category is the most commonly
used?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. What copper-cored cable is surrounded by a heavy shielding?
a. coaxial cable c. optical fiber
b. fiber optics d. twisted pair
10. What Ethernet cable is used to connect two devices directly?
a. cross- over c. both A and B
b. straight through d. none of the options
11. Which of the following is a number used to identify a device on a
network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12. In which of the following IP address classes does 192.168.1.105
belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer to
reach a specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. Client server c. Peer to client
b. Peer to peer d. None of the options
15. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
15
Directions: Match the definition in Column A with the networking terminologies
in Column B.
A B
1. Copper cabling used for a. Crimping tool
telephone communication b. Cross- over
2. Standard Ethernet cable c. Fiber- optic
3. Cable that has a very thin d. Ipconfig
core e. Multi- mode
4. Cable that has a thicker core f. Ping
5. Tool used for crimping RJ45 g. Protocol
6. Connector for Cat 5e cable h. RJ45
7. Set of rules i. Single- mode
8. Indicates the network portion j. Straight through
of an IP address k. Subnet mask
9. Command used find out the l. Twisted pair
IP address
10. Glass or plastic conductor
Test IV. ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
Configuration Skills
Directions: Below is a matrix containing the most important skills that one
must have to configure computer systems and networks successfully. Check
() the appropriate column which describes the level of your confidence in
performing the given tasks.
16
Configuration Skills I can do it I can do it I am not
confidently but with confident
3 assistance 1
2
1. I can use the different
tools for configuration
2. I can inspect networking
devices and connectors
3. I can create a cross-
over and straight
through Ethernet cable
4. I can test the
functionality of an
Ethernet cable
5. I can assign and
configure IP address
6. I can execute the
ipconfig command
properly
7. I can manage to create
a peer to peer
networking
8. I can configure Network
Interface Card using
DHCP
9. I can enable firewall
10. I can configure file
and printer sharing
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
17
C. Other appropriate tools
Check their answers using the answer key on the Feedback portion of
this guide.
What to KNOW
1.1- Safety Procedures
Guide the learners in understanding safety procedures and general
safety guidelines
Let learners understand the fire safety guidelines.
What to PROCESS
1.1- Safety Procedures
Guide learners in performing a peer to peer activity on page 45.
Instruct the students to get a partner in order to perform the said
activity.
Explain the general directions and show example evidences and
picture for a certain circumstances of the activity.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
18
Evidence Effect
True
1. Event Viewer
19
2. Safe Boot
3. List of services that start when computer boots
4. Make all boot settings permanent
5. Normal startup
6. No GUI Boot
7. OS Boot information
8. Hide All Microsoft Services
9. Convenient List of Diagnostic Tools
10. Base Video
20
Research and Investigate
Directions: Form a group of five members and research on the different
safety precautions used in computer laboratory. Interview/Observe a
practitioner while lending a quality service in computer hardware servicing.
Use a video camera to record the event stressing the safety guidelines and
procedures in the laboratory. You will be rated according to the following
rubrics:
Excellent (86-
Criteria Poor (70-75) Good (76-85)
100)
Content/Informatio The provided The provided The provided
n (50%) information was
information information was
not necessarywas, for the necessary and
Technically sound or not sufficient
most part, sufficient to the
information to the computer
necessary and computer
laboratory sufficient to the laboratory
Coherence of
safety computer safety
information
precautions. laboratory precautions.
safety
precautions.
Quality of Video It lacks clarity Most part is The video was
(30%) and/or does not well organized, well organized,
Clarity and present ideas in clear and clear and
cohesiveness of a coherent way. presents ideas presents ideas
the video in a coherent in a coherent
Organization and way. way.
coherence of
ideas
21
Clarity of
questions
22
addresses some part most part addresses
addressed the issues addresses addresses with an in
The information referred in an in depth an in depth depth
is technically the analysis analysis of analysis all
sound
proposed The most issues the issues
Information topic. provided referred in referred in
based on The information the the
careful provided was, for proposed proposed
research
information some part, topic. topic.
Coherence of was not necessary The The
information necessary and provided provided
or not sufficient to information information
sufficient to discuss was, for the was
discuss these most part, necessary
these issues. necessary and
issues. and sufficient to
sufficient to discuss
discuss these
these issues.
issues.
Quality of The essay The essay The essay The essay
Writing (25%) was not was well was well was well
well written, written for written for written from
Clarity and and some part, the most start to
cohesiveness contains without part, finish,
of sentences many spelling, without without
and paragraphs
No errors in
spelling grammar or spelling, spelling,
spelling, errors, use of grammar or grammar or
grammar and and/or English use of use of
use of English grammar errors. English English
errors The essay errors. errors.
Organization and/or use is for some The essay The essay
and coherence
of English part well is for the was well
of ideas
errors. organized, most part organized,
It lacks clear and well clear and
clarity presents organized, presents
and/or does ideas in a clear and ideas in a
not present coherent presents coherent
ideas in a way. ideas in a way.
23
coherent coherent
way. way.
What to TRANSFER
1.1- Safety Procedures
Let learners showcase their understanding on safety procedures
through a role playing using the collected and collaborated information
gathered from the research and investigation activity.
Rate the learners performance using the rubric for role playing
provided on page 47 of Learners Material.
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
base on the Rubrics written below:
24
Criteria Excellent Good Fair Weak
4 3 2 1
Content (40%)
-Conveys full
understanding of
the content
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%)
-Displays
interesting purpose
Speak Clearly
(10%)
-Group members
speaks clearly at all
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
25
AP A
B D P
CRITERIA (80- (90-
(70- 74) (75-79) (85-89)
84) 100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
7. Maintained eye
contact
8. Maintained acceptable
posture.
9. Utilized audio-visual
aids
10. Handled questions
and comments
confidently
Total
Grand Total
26
(15%)
-Applied / manifested
safety precautions
while working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Had organized
materials and tools
while accomplishing the
task and has time
management
Quality of work (40%)
-the windows registry
was fully backed up
LESSON2. CONFIGURE COMPUTER SYSTEM AND NETWORK
What to KNOW
Introduce the concept of system configuration to the learners by citing
circumstances related to configuration.
27
in using it.
Discuss and demonstrate the procedures in assigning a static IP
address of a computer.
The teacher may use differentiated strategies to discuss and
demonstrate the procedures in assigning a dynamic IP address of a
computer.
Introduce the ping command and demonstrate the procedure in using
the ping command.
What to PROCESS
2.1- Safety Precautions Related to Networks
The teacher is suggested to craft appropriate activities to process
learners understanding relevant to safety precautions in system and
network configuration.
28
Direction: Complete the criss- cross puzzle and familiarize the cables being
described.
CABLES
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
Task: Protocols
Direction: In this worksheet, you will write the name of the protocol and the
default port(s) for each protocol definition in the table.
29
TCP/IP network
Sends e-mail over a TCP/IP network
Translates URLs to IP address
Transports Web pages over a TCP/IP network
Automates assignment of IP address on a
network
Securely transports Web pages over a TCP/IP
network
Transports files over a TCP/IP network
The teacher shall provide several IP address for the task entitled
Identifying IP address classes. It must be written in the board or any
visuals available. Give the directions and instruct the learners to
accomplish the worksheet for the said activity.
Task: Comparison
Direction: Using the table below, cite the features of peer-to-peer and
client /server network that describes their difference.
30
Peer-to-peer Network Client/Server Network
1.
2.
3.
4.
5.
A B
1. when an employee intends to a. Accidental threats
cause damage b. Antivirus software
2. when user damages data or c. Data encryption
31
equipment unintentionally d. Firewall
3. attached to small pieces of e. Malicious threats
computer code, software and f. Traffic
documents g. Trojan horse
4. a self-replicating program that is h. Virus
harmful to network i. VPN
5. it is technically a worm j. WPA
6. software designed to detect, k. WEP
disable and remove viruses l. Worm
7. it involves using codes and
ciphers
8. a way of protecting a computer
from intrusion through the ports
9. an encryption system that
protects data
10. data being transported on a
network
1. Cite the importance of file sharing and give an example scenario where its
worth was proven.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
32
1. Cite the advantages and disadvantages of printer sharing.
Advantages Disadvantages
33
What to REFLECT and UNDERSTAND
2.1- Safety Precautions Related to Networks
Teacher may provide variation of activities for this lesson to process
learners understanding on the subject matter
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
34
What to TRANSFER
2.2- Networking Devices, Media and Connector
Guide the learners in creating their own Ethernet cable by stating the
general directions, materials and tools needed and by discussing the
procedures for the said activity.
Inform the learners about the rubrics to be used in order to rate their
performance (rubrics is on page 90).
Materials:
1) 6 meters Ethernet Cable Category 5e or Cat5e- standard wire for
cabling;
2) RJ45 crimpable connectors for Cat5e;
Tools:
3) RJ45 Crimping tool;
4) Wire cutter, stripper or pliers; and
5) Ethernet cable Tester / LAN Tester
You just need to follow the procedures cited in this module and apply
the safety precautions to avoid injury or any unwanted incident. You will be
given 30 minutes to complete the task. You will be rated according to the
performance rubric.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as
shown. The color order is important to get correct.
4. Use scissors to make a straight cut across the wires 1/2 Inch from the
cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.
6. A view from the top. All the wires are all the way in. There are no short
35
wires.
7. Crimping The Cable carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
8. For a standard "Straight Through" cable, repeat all steps and wire color
order on the other end of cable. For a cross-over cable, the other end
will have a different color order as shown by the crossover picture
above.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
36
2.3- Internet Protocols
The teacher may group the learners with two or three members for the
activity entitled Configure an Ethernet NIC using DHCP. Give the
details of the activity such as materials, equipment, tools and
procedures to be used. Inform the learners that along with the ongoing
activity, they need to answer the given questions next to the
procedures in a clean sheet of paper. Check and rate their
performance using the configuration rubrics on page 106.
Configuration Rubrics
Adherence to the
Procedures (30%)
(The specified job was done
by following the procedures.
Safety measures were
observed during the activity)
Quality of Work (30%)
(The device was configured
properly)
Comprehension (10%)
(Interview / Guide questions
were answered correctly
according to the job
requirements)
Recommended Equipment
37
Linksys 300N router
A Computer running Window XP Professional
Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into Port 1 on the back of
the router.
Plug the other end of the Ethernet patch cable into the network port on
the NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click start
Right-click My Network Places, and then choose Properties.
The Network Connections window appears.
Step 2
Right-click Local Area Connection, and then choose Properties.
The Local Area Connection Properties window appears.
38
Activity Questions:
1. What is the name and model number of the NIC in the Connect
using: field?(Answers may vary)
2. What are the items listed in the This connection uses the
following items: field? (Answers may vary but must include
Internet
Protocol
(TCP/IP)
Step 3
Choose Internet
Protocol
39
Click the Obtain an IP address automatically radio button.
Click OK. The Internet Protocol (TCP/IP) Properties window closes.
Click OK.
Restart your computer.
Step 4
Log on to Windows as an administrator.
Check the lights on the back of the NIC. These lights will blink
when there is network activity.
Choose Start > Run....
Type cmd and click OK.
40
Type ipconfig/all, and then press the Enter key.
Activity Questions:
1. What is the IP address and subnet mask of the Ethernet
Adapter Local Area Network Connection? Answers may
vary.
2. What is the IP address of the DHCP server? Answers may
vary.
3. On what date was the Lease Obtained? Answers may vary.
4. On what date does the Lease Expire? Answers may vary.
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the LinksysWRT300N.
Recommended Equipment
A computer with Windows XP Professional
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router
with an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as
an administrator.
Step 2
Choose start > Run, and type cmd. Press the Return key.
41
Type ipconfig.
What is the default gateway for the computer?
Step 3
Open Internet Explorer. Type 192.168.1.1 in the Address field, and then
press Return.
42
Type CHS# in the Network Name (SSID): field, where # is the number
assigned by your instructor.
Click Save Settings.
The Settings are successful screen appears.
Unplug the Ethernet patch cable from the rear of the computer.
Choose start, and then right-click My Network Places. Choose
Properties.
Double-click the wireless adapter, and then select View Wireless
Networks.
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log into the wireless router.
Close Internet Explorer.
43
2.4- Peer-to-Peer and Client/server Network
Let the learners perform the hands- on activity setting up a peer-to-
peer and client / server network. Rate them according to the
performance indicators provided on page 128.
Hands- on Activity
44
2.5- Network Security
Assist learners in performing the task entitled Configure Windows XP
Firewall. Ask them to answer the essential questions along with the
procedures given in the activity.
In order to validate their performance, the teacher must construct a
rubric appropriate to the activity.
Step 1
Navigate to the Windows XP Firewall:
Start > Control Panel > Security Center
The Firewall indicator shows the status of the firewall. The normal
setting is ON.
Step 2
45
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
Step 3
From the Windows Firewall control menu select the Exceptions tab.
Programs and services that Windows Firewall is not blocking will be
listed with a checkmark.
You can add applications to this list. This may be necessary if your
customer has an application that requires outside communications but
for some reason the Windows Firewall cannot perform the
configuration automatically. You must be logged on to this computer as
an administrator to complete this procedure.
46
Essential Question:
Creating too many exceptions in your Programs and Services file
can have negative consequences. Describe a negative consequence of
having too many exceptions.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Step 4
From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings. Network Connection
Settings displays the different connections configured for your
computer.
Essential Question:
In the space below, list the services that are available.
___________________________________________________________
___________________________________________________________
___________________________________________________________
Step 5
There are many applications that users do not normally see that also
need to get through the Windows Firewall to access your computer.
These are the network level commands that direct traffic on the
47
network and the Internet.
Under the ICMP heading, click the Settings button. You will see the
menu where ICMP exceptions are configured.
Essential Question:
In the space below, list the requests for information that your computer will
respond to.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
48
A printer installed on one of the two computers
Procedures:
Step 1
Choose My Computer > Tools > Folder Options
Click the View tab.
Uncheck the Use Simple File Sharing (Recommended) checkbox,
and then click OK.
Step 2
Right-click the desktop, and then choose New > Folder.
Type Example, and then press the Return key.
Open WordPad. Type This is an example document.
Save the file in the Example folder with the name Brief.doc, and then
close WordPad.
Step 3
Right-click the Example folder, and then choose Sharing and
Security
Click the Share this folder radio button, and then click OK.
49
What is the icon of the Example folder?
On the computer with the shared folder, right-click My Computer, and
then click the Computer Name tab.
Step 4
On the other computer, choosestart > Run
Type \\computername\Example, where computer name is the name
of the computer with the Example folder, and then press the Enter
key.
Open the Brief.doc file.
Delete the text in the Brief.doc file, and then choose File > Save.
Click OK. Close WordPad, and then choose NO when prompted to
save changes to the file.
Step 5
Return to the computer with the shared folder.
Right-click Example folder > Sharing and Security, and then click
Permissions.
Step 6
Open the Control Panel on the computer with the attached printer.
Choose Printers and Other Hardware > Printers and Faxes.
Right-click the icon of the installed printer, and then choose Sharing.
Click the Share this printer radio button, and then click OK.
50
Step 7
Return to the computer that is not directly connected to a printer.
Open the Control Panel. Choose Printers and Other Hardware >
Printers and Faxes.
Choose File > Add Printer on the screen below.
51
The Local or Network Printer of the Add Printer Wizard window
appears. Click the A network printer, or a printer attached to
another computer radio button, and then click Next.
52
The Browse for a Printer window appears.
53
Step 8
Choose start > Printers and Faxes.
Right-click the printer you installed, and then choose Properties.
The Printer Properties window appears.
Choose the General Tab, and then click Print Test Page.
Click OK in the confirmation dialog box, and then click OK to close the
printer properties window.
Step 9
To test the functionality of file and printer sharing, you must be able to
print a document or try the sample print feature of a printer.
54
Performance Rubrics for Sharing Files and Printer
55
LESSON3. INSPECT AND TEST CONFIGURED COMPUTER SYSTEM
AND NETWORK
What to KNOW
3.1- Safety Precautions
Let the students be aware of Occupational Health and Safety Policy.
Cite examples and different situations.
What to PROCESS
3.1- Safety Precautions
Teacher may provide variation of activities for this lesson to process
learners understanding on the subject matter.
3.2- Guidelines for Testing Configured Computer System and Network
Teacher shall fabricate variation of activities for this lesson to process
learners understanding on the subject matter.
What to TRANSFER
3.2- Guidelines for Testing Configured Computer System and Network
Guide the students in performing the final task on page 161 entitled
Test the Wireless NIC.
Ask learners to accomplish the technical report on page 165 after
performing the final task.
The teacher must construct rubrics to validate the performance of
learners.
56
Task: Test the Wireless NIC
Direction: In this activity, you will check the status of your wireless
connection, investigate the availability of wireless networks, and test
connectivity. After accomplishing the task you need to write a technical report
regarding the test conducted.
Recommended Equipment
A computer with Windows XP Professional installed
A wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Internet connectivity
Step 1
57
Ping the default gateway.
Step 2
Open a web browser.
Type www.google.com in the Address field, and then press Return.
Step 3
58
Right-click the wireless connection and choose Properties.
Click the Wireless Networks tab.
Name of Technician:_______________________________________
Date of Inspection: __________________ Time: _______________
Device Tested:
Specification:
Diagnosis:
59
Action Taken:
Remarks:
V Summative Assessment
VI Feedback
Pre / Post- Assessment
I. True or false
1. True
2. True
3. True
4. False
5. False
6. True
7. True
8. True
9. False
10. True
1. C
2. B
60
3. D
4. A
5. C
6. A
7. C
8. B
9. D
10. A
11. C
12. C
13. C
14. B
15. A
1. L
2. J
3. I
4. E
5. A
6. H
7. G
8. K
9. D
10. C
IV. Acronyms
61
Lesson 1.2- Prepare Tools used for Configuration
I. MS Configuration Command Classification
1. Tools
2. Boot
3. Services
4. Boot
5. General
6. Boot
7. Boot
8. Services
9. Tools
10. Boot
Security Center
1) Automatic updates
2) Windows Firewall
3) Internet Options
62
Across
1. STP
3. FIBEROPTICCABLE
5. CROSSOVER
6. UTP
7. STRAIGHTTHROUGH
Down
1. SINGLEMODE
2. MULTIMODE
4. TWISTEDPAIR
5. COAXIALCABLE
63
Companion Guide 3rd Edition- 2008 at 800 East 96th Street
Indianapolis, Indiana 46240 USA
Electronic Resources:
Definition of Configuration Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
64
http://h10025.www1.hp.com/ewfrf/wc/document?
cc=us&lc=en&dlc=en&docname=bph05694-
65
K to12 BASIC EDUCATION CURRICULUM
Information and Communications Technology
COMPUTER HARDWARE SERVICING
(SPECIALIZATION)
Module 4
Maintaining computer systems and network
Quarter 3-4 60 hrs
CONTENT STANDARD
The learner demonstrates understanding of the underlying concepts and
principles in maintaining computer and network systems.
PERFORMANCE STANDARD
The learner independently demonstrates skills in computer systems as
prescribed in the TESDA Training Regulations.
LEARNING COMPETENCIES
66
I. OBJECTIVES
Guided by the teacher and this module the learner is expected to:
67
Computer system and network checked to ensure safe operation
Run the burn-in test on computer systems
Conduct final inspection on the tests undertaken
Prepare technical reports that comply with the job requirements
II. PRE-ASSESSMENT
I can YES NO
Plan and prepare work to ensure occupational
health and safety (OHS) policies and procedures
are followed
Obtain materials, tools, equipment and testing
devices needed to conform with job requirements
Interpret work instructions according to job
requirements
68
Configure the identified systems and networks
based on specifications and job requirements *
Inspect and test configured computer systems and
networks in conformity with manufacturer's
instructions / manual *
Correct / Adjust components or parts of computer
systems and networks in accordance with job
requirements *
Test computer systems and networks to ensure safe
operation
69
What to KNOW
70
specifications.
Security
1)Anti-Spyware Programs
2)Anti-Virus
Maintenance
1)System Maintenance
Internet Research
Students will answer pages 215-216.
Guide the students in answering the worksheet. Show examples on
hardware components, their specifications and cost.
Let the students browse online.
Let the students go to the community and ask the computer stores and
shops.
Network Layout
72
Let the students answer the activity on page 221.
Ask the students to bring their drawing materials.
Let them draw a simple schematic layout of one computer connected to
a network system.
Guide them on the requirements needed to setup network connections.
Direction: In a short coupon, students are task to draw a simple schematic
diagram of a computer connected to a network. Label the parts and present
their drawing to the class. Students work will be rated according to the
following criteria:
CRITERIA Excellent Good Fair Poor
4 3 2 1
Adherence to the
proper network
setup (50%)
-drawn the diagram
with right setup
Workmanship
(20%)
-Had organized
materials and tools
while accomplishing
the task and has
time management
Quality of work
(30%)
-the final output is
neat
73
Details Points
Brand Model is precisely given What to REFLECT and
Cost are based on the market UNDERSTAND
selling price
Strength/Weakness are realistic Pictorial Tour
Presentation (Clarity of the voice)
The students will answer the activity on page 204.
Instruct the students to group with five members and let them have a
research on the different diagnosis on faulty computer and network
systems.
Tell them to have a pictorial documentation of their activity. And ask
them to give captions or make a narrative reports.
Investigative Report
Answer activity on page 209.
In this activity, the students may search online about computer systems
status or interview a practitioner lending a service in computer
hardware servicing.
Encourage them to make profiling as a source of evidence of their
reports.
Ask the students to make documentations.
74
Motherboard
Memory
Graphic
Card
Sound Card
Performance Score Card
Details Points
Brand Model is precisely given
Cost are based on the market
selling price
Strength/Weakness are realistic
Presentation (Clarity of the voice)
75
Score Reference:
0 = Some facts are clearly inconsistent with source material
1= Some facts are questionable/unrealistic
2 = All facts seem accurate/good.
Critical Review
Answer the activity on page 222.
Let the students create a table of specifications on network hardware.
List brand names and compare.
What to TRANSFER
76
Accuracy (Accurate role and function of 30%
a device was accurately shown)
Performance Rating
Magazine Article
Answer activity on page 209.
Let the students write an article on the risk about turning off messages
about spyware and virus protection.
Students may base their idea on the interview taken.
Encourage students to ask help from their English teachers in
generating idea.
1. What is the risk of turning off messages about spyware and related
protection?
2. What is the risk of turning off messages about virus protection?
77
Rubrics
Contents Excellent Good Poor(1)
(5) (3)
Computer Specifications
Students will answer activity on page 217.
Make a market scanning and look for business establishments for
computer sales and services. Create a price list of brands and sample
model of computer parts with its price.
Show a sample complete hardware components and their prices.
78
Answer activity on page 223.
Ask the student to bring short coupon and drawing materials.
Guide the students in doing the activity.
Show sample schematic layout of a network computers.
Direction: In this activity, students will draw in a short coupon, layout plan of a
computer caf connected to a network. Write the specifications of the network
CRITERIA Percentag Score
e
1. Originality of network layout 40%
2. Neatness of the drawing 40%
3. Proper use of equipment and 10%
materials is observed.
4. Observance of Safety 10%
Precautions.
PERFORMANCE RATING
hardware. Incorporate the following requirements:
1. One computer server
2. 20 client computers
3. One DSL modem
4. UTP cables
5. Hub
79
Define Malware and give examples.
Refer to this link http://www.hyperlogik.com/Blog/virus-spyware-and-
malware-maintenance-and-prevention/
Present the video from http://www.youtube.com/watch?
v=dhQjH6UZA7g http://www.youtube.com/watch?v=_qNd22tijWw
2.2 Identify faulty computer systems
UNDERSTANDING PARTITIONS
80
The teacher and the class may go to the nearest computer repairs
shop in their immediate community to observe and consult their
expertise on computer hardware servicing and the subject matter.
Show more videos with regards to the lesson if necessary
Refer to the following links
http://www.bleepingcomputer.com/tutorials/understanding-hard-disk-
partitions/
http://www.pcworld.com/article/185941/how_and_why_to_partition_you
r_hard_drive.html
http://diligent.tripod.com/hd-partn.htm
Scan Disk
http://pcsupport.about.com/od/maintenance/ht/manualtempxp.htm
http://www.computerhope.com/issues/ch000225.htm
http://www.wikihow.com/Delete-Temporary-Internet-Files
http://www.youtube.com/watch?v=_jrCVrMnct8
Disk Cleanup
Discuss lesson on page 271-272.
Define and discuss disk cleanup.
Mention / Infer to the following references
a) http://www.computerhope.com/jargon/d/diskclea.htm
b) http://www.theeldergeek.com/disk_cleanup_utility.htm
c) http://support.microsoft.com/kb/310312
d) http://windows.microsoft.com/en-us/windows/delete-files-using-disk-
81
cleanup#delete-files-using-disk-cleanup=windows-7
e) http://www.udel.edu/it/help/best-practices/running-disk-cleanup-
windows-computer.html
What to PROCESS
2.1 Essay Activity
Let the student answer the activity on page 229.
Let the students write an essay on the importance of data backup
Directions: In this activity, list down at least five (5) problems, error messages
or incidents you encountered while working or using the computer. Then your
actions you have taken.
82
Do Peer tutoring if necessary
2.5 .1
Let the students do process activity on page 265-266.
Guide the students in doing the scan disk
Let the students demonstrate the process.
Directions: Have five members per group and make a research on the
different cause and effect of data backup, malware maintenance and disk
maintenance. You can also interview / observe a practitioner while lending a
quality service in computer hardware servicing. This event will be presented
orally through a role playing.
83
manufacturer and model of the motherboard by looking for the manufacturers
name and model number stamped on the board. Research the Web site for
that manufacturer. Print the list of processors the board can support.
Afterwards, make a slide presentation and report it to the class.
Before you start, ask yourself the following questions to help you determine
the kind of partitions to create:
Now, that you are done with the disk image, to enlighten your
understanding and knowledge have some more readings about it thru books
and other resources. You should consider the following topics for research:
1. Acronis True Image
2. Norton Ghost Image
3. Other disk Image backup software
2.5.1
1. What are the things that the scan disk could do in a computer? How
often do you scan disk your computer?
2. Computers should be protected from errors to prevent component
malfunction. What anti-static are the things you should do to avoid
such malfunction?
2.5.2
Computer Terminologies
84
Let the students perform the activity on page 270
In this activity, you will learn how useful the Internet can be for a PC support
technician.
1. Research the Web site for the importance of Disk Cleanup and
when to apply it.
2. Know the advantages and effects to the computer system.
What to TRANSFER
2.1
The students will have a group activity on pages 230-231.
Guide the students to analyze the given situations and perform the task
required.
Let the students showcase their talents in acting.
Role Playing
85
Criteria Excellent Good Fair Weak
4 3 2 1
Content (40%)
-Conveys full understanding
of the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting
purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with
props and costumes
Cooperation (10%)
-displays teamwork
86
Application on Diagnosis of Faulty Systems
Directions: In this activity, the students will group into three (3) and make an
interview and observation with a practitioner, the group will showcase what
you have learned through a video demo or tutorials. Use your digital cameras
or cell phones. You will be rated base on the Rubrics written below:
Criteria Excellent Good Fair Weak
4 3 2 1
Content (40%)
-Conveys full understanding of
the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with props
and costumes
Cooperation (10%)
-displays teamwork
2.3
Student will answer the activity on page 258.
Let the students perform the activity
Directions: The class will be divided into five (5) groups. Each group has its
own respective leader. The group will perform a task regarding familiarizing
the cleaning components of computer. After the activity they will be graded
using the given Performance Score Card below:
87
PERFORMANCE SCORE CARD
Performance Rating
2.5
Answer activity on page 267.
Guide the students in answering the following activities.
Let the students follow the procedure on scanning flash drives
1. Concept Mapping
In this activity, you will write on the figures the concept which will relate
to the word scan. Add more shapes if you want.
88
SCAN
Here's How:
Directions: Pair the students. Let them perform the deleting of temporary
internet files. After the activity they will be graded through the given
Performance Score Card below:
CRITERIA Passed Failed
89
2.5.3
Answer activity on page 274-275.
Let the students perform the activity.
Activity
Directions: You are to delete temporary files in the different Operating
Systems.
1. Delete Temporary Files in Windows 7 and Windows 8
2. Delete Temporary Files in Windows XP
What to KNOW
Maintain Network Systems
Discuss the lesson on pages 276-282.
Educate the students on how to create a simple maintenance schedule
and how to fill-up the checklist.
Teach the students how to perform network maintenance procedure.
Show Teachers personal monitoring checklist for the computer
laboratory
Discuss procedures for General Safety
Burn-In Testing
Discuss the lesson on page 283-284.
Demonstrate the burn-in testing procedure.
Follow the step by step process.
What to PROCESS
3.1
Let the students answer the activity on page 282.
Guide the students in filling-up the Maintenance Inspection Checklist
Let the students accomplish the maintenance inspection checklist.
Guide them in performing the task. Ask if they have any suggestions.
90
Accomplish the maintenance inspection checklist below: Put a check mark on
the column which states an action taken.
Video Tutorial
Direction: To deepen your understanding about maintaining networks system,
watch the video on http://www.youtube.com/watch?v=cMCCLKDHXqI and
make an outline steps or procedure of the action taken presented or shown in
the video.
What to TRANSFER
Let the students do the activity on page 276.
Weekly Maintenance Checklist
91
Direction: In this activity, you will create a either a daily, weekly or monthly
maintenance checklist for the computer laboratory. Include all the computer
and network hardware. You will be given 30 minutes to complete the task.
Present your output in the class.
What to KNOW
Discuss the lesson on page 290-292.
Share best practices in the maintenance of the computer system and
networks.
4.3 Network Monitoring
92
Present the different Network Monitoring Software Tools.
Demonstrate the Ping Command
IV.4 Computer Communications
Discuss the lesson on pages 301-302.
Teach the students on how DSL or cable networks are connected.
Know the connections commonly used in internet connections.
Show the network connections of the computer laboratory
Suggested topics and activities
http://www.laneye.com/network/how-network-works/computers-in-
network.htm
http://www.laneye.com/network/how-network-works/computers-in-
network.htm
IV.5 Run or conduct computer to computer communications
4.7 Prepare technical reports that comply with the job requirements
Discuss the lesson on General Safety Guidelines on page 305.
What to PROCESS
Let the students do the activity on page 293.
Let the student download and explore free network diagnostic tool.
Experiment and Demonstrate
To check the vulnerability or stability of your network connection, go to the
internet and download a free network diagnostic tool.
Go to any search engine and type network diagnostic tool.
After downloading the application, run the setup file of the program and
93
install it into your computer.
If the program was already installed, run the application. Take note of the
diagnosis. Do some action if there are problems or errors encountered.
94
A combined modem and router properly plugged in
Plug one end of an Ethernet cable into the local area network (LAN)
port on the device, and then plug the other end into the networking port
of the computer that you want to connect to the Internet. The LAN port
should be labeled "LAN." (If you are connecting wirelessly, skip this
step.)
Open the Connect to the Internet wizard by clicking the Start button
, clicking Control Panel, clickNetwork and Internet, clickNetwork
and Sharing Center, clickSet up a connection or network, and then
clickConnect to the Internet.
95
A modem and router properly plugged in
Plug one end of an Ethernet cable into the modem, and plug the other
end into the wide area network (WAN) port on the router.
Plug one end of an Ethernet cable into the local area network (LAN)
port on the router, and plug the other end into the networking port on
the computer that you want to connect to the Internet. (If you are
connecting wirelessly, skip this step.)
Instruct and assist the students to fill up sample technical reports form
on pages 308-309.
96
Detailed Technical Reports
97
What to REFLECT and UNDERSTAND
98
4.What is your adapter address for this connection?
5.What is your default gateway IP address?
Video Tutorial
Let the students perform the task on page 304.
Direction: You are to enumerate the hardware items that can be seen inside
the computer laboratory, applications installed in a computer, network devices,
computer tools and others.
What to TRANSFER
System Restore
After doing so the performed task, students will be assessed using the
following criteria:
99
Network Checking
Guide the students in doing the activity on pages 300.
Let the students apply the Ping Command in doing the activity.
Direction: In this activity, you will check the network status by using the ping
command. Make a status report on the results.
1. Ping a website
2. Ping the router
3. Ping a terminal/computer
100
2 PC unit
DSL connection
CRITERIA 1 2 3 4 5
Total:
101
CRITERIA Percentag Score
e
1. Originality of format and layout 40%
PERFORMANCE RATING
VI Feedback
Answer key for Module 4
102
8. L
9. B
10. F
Summative Test
103
Test 1.
1. Tablet PC
2. Server
3. Minicomputer
4. Microcomputer
5. Netbook
6. Desktop computer
7. Digital
8. Mainframe
9. PDA
10. Wearable computer
11. Operating system
12. Input devices
13. Output device
14. Storage devices
15. Firewall
16. WAN
17. Network gateway
18. Network
19. Hub
20. Bridge
Test II
1. True
2. True
3. True
4. True
5. True
6. True
7. True
8. True
9. True
10. True
11. True
12. True
13. False
14. True
15. True
Test III.
1. C
104
2. D
3. A
4. C
5. B
6. B
7. A
8. D
9. C
10. B
Test IV
1. C
2. A
3. P
4. O
5. J
6. E
7. H
8. Q
9. B
10. G
11. D
12. M
13. L
14. I
15. K
Test I
1. Place computer in a well-ventilated area.
2. Schedule the use of computer for its longer life
3. Treat your computer properly
4. Backup your files.
5. Delete temporary files.
6. Update antivirus and spyware.
7. Move the computer only when it is turned off and unplugged
8. Install or secure password.
9. Preventive Maintenance
10. Condition Based Maintenance
Test II
1. a
2. b
3. c
105
4. b
5. c
6. c
7. b
8. b
9. a
10. a
11. a
12. b
13. a
14. c
15. c
16. a
17. a
18. c
19. d
20. d
Test III
1. e
2. c
3. b
4. d
5. a
VII. REFERENCES
106
LujeroTechnology and Livelihood Education- Information and
Communications Technology Learners Manual Grade 7 & 8
Electronic Resources:
107