Professional Documents
Culture Documents
Teachers Guide
GOVERNMENT PROPERTY
NOT FOR SALE
ALLOTTED TO
Department of Education
Republic of the Philippines
Computer Hardware Servicing Grade 10
Learners Material
First Edition, 2013
ISBN: ___________
Republic Act 8293, section 176states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein the
work is created shall be necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Published by the Department of Education
Secretary: Br. Armin A. Luistro FSC
Undersecretary: Dina S. Ocampo, Ph.D.
Assistant Secretary: Lorna Dig Dino, Ph.D.
Ronaldo V. Ramilo
Education Program Specialist
Division of Tanauan
ii
TABLE OF CONTENTS
Module 1: PERSONAL ENTREPRENUERIAL COMPETENCIES (PECs)
Grade Level Standard..
Content Standard.
Performance Standard..
Learning Competencies ..
Introduction
Objectives..
Presentation of Content ..
Introduction
Objectives
Pre- Assessment
Guide Question
Learning Goals and Target
Know...
Process .
Reflect and Understand ...
Transfer ..
Feedback
References .
Module 2: ENVIRONMENT AND MARKET (EM)
Grade Level Standard..
Content Standard...
Performance Standard ..
Learning Competencies .....
Introduction
Objectives
Presentation of Content
Introduction
Objectives
Pre- Assessment
Guide Question
Learning Goals and Target
Know .
Product Development
Concept of Developing Product
Finding Value
Innovation
iii
1
1
1
1
1
2
2
3
3
4
4
4
4
6
6
6
6
6
7
7
iv
9
9
9
9
10
10
10
10
10
12
12
12
12
13
13
14
18
18
-
Fire
19
19
20
21
22
23
25
25
26
28
28
What to Know
28
28
28
29
29 Category R
29
29
30
30
31
31
32
32
33
34
35
36
38
40
41
41
42
44
48
50
51
55
62
62
63
63
63
63
vi
66
66
67
70
73
73
73
73
74
74
76
76
76
76
77
77
84
84
Plan on how to m
Material Safety D
87
88
90
95
95
95
96
96
97
97
98
103
104
105
105
109
What to Transfer
viii
Quarter I
4 hrs.
Have learners actively perform task 2, and let them share their answers and
relevant experiences with the class.
Process learners understanding of the guide questions presented on task 2.
Learning Goals and Target
Group the learners, then ask them perform task 3. Let them share their
thoughts with the class.
Process learners understanding and guide them in arriving at a relevant and
acceptable generalization.
Know
Discuss / present the importance of assessing personal entrepreneurial
competencies (PECs) and skills vis--vis a practicing entrepreneur or
employee; provide an actual example of an entrepreneur or employee
existing in your province.
Expand learners curiosity by asking essential questions on the important
characteristics / traits / attributes, and skills of a good entrepreneur.
Assist / Guide learners in understanding the entrepreneurial competencies
(characteristics, traits, attributes) and skills of a good entrepreneur.
Have an appropriate, relevant, and timely learning activity for the learners to
appreciate the best entrepreneurial competencies.
Assess learners knowledge and skills on understanding of topic. Use the
result of the pre-assessment to improve their learning.
Process
Ask the learners accomplish task 4 (PECs Checklist) on page 8-9. Let them
make their interpretation or personal insights based on the accomplished
task.
Facilitate
student-to-student
interactions
and
process
learners
understanding.
Reflect and Understand
E
K
H
A
J
6. B
7. C
8. I
9. D
10. F
VI References
1. Module 5, Project EASE, Effective and Affordable Secondary Education
2. http://www.entrepreneur.com/article/77408#ixzz2twpYG49A
3. http://www.thetimes100.co.uk/theory/theory--opportunities-constraints4
business-environment--165.php#ixzz1PVjUuaWu
4. http://www.thetimes100.co.uk/theory/theory--constraints-421.php#ixzz1PVki8a36
5. http://www.thetimes100.co.uk/theory/theory--constraints-on-production-303.php#ixzz1PVkyDy8k
6. http://www.thetimes100.co.uk/theory/theory--production-and-resourcerequirements--354.php#ixzz1PVlGG7zv
7. http://www.thetimes100.co.uk/theory/theory--nature-and-role-of-marketing-245.php#ixzz1PVlc88gR
Quarter I
4 hrs.
cultural, and social conditions prevailing in an area. Needs and wants of the
people in a certain area that are not met may be considered as business
opportunities. Identifying the needs of the community, its resources, available
raw materials, skills, and appropriate technology can help a new entrepreneur in
seizing a business opportunity.
To be successful in any kind of business venture, potential entrepreneurs
should always look closely at the environment and market. They should always
be watchful on the existing opportunities and constraints. The opportunities in
the business environment are those factors that provide possibilities for a
business to expand and make more profits. Constraints, on the other hand, are
those factors that limit the business to grow, hence reduce the chance of
generating profit. One of the best ways to evaluate the opportunities and
constraints is to conduct Strengths, Weakness, Opportunities and Threats
(SWOT) Analysis.
VI. Objectives
With your assistance and guidance in facilitating this module,
learners are expected to understand the underlying principles and concepts
of environment and market more particularly in:
-
Presentation of Content
Introduction
Using appropriate activities, lead learners in giving value to environment
and market and its implication to be successful in a business related to
Computer Hardware Servicing.
Guide learners in understanding the importance of environment and
market; likewise, lead them in appreciating the value of SWOT Analysis.
Provide relevant, appropriate, and meaningful examples of SWOT
Analysis pertaining to Computer Hardware Servicing.
Help learners in presenting the importance of assessing their immediate
7
Help learners in planning their own learning goals and target as reflected
on page 18.
Provide enrichment activities and guide them in analyzing available
resources and technology in the community to be used in accomplishing
their learning goals and targets.
VIII.
Product development
Know
Discuss product development, concept of developing a product,
finding value, innovation, unique selling proposition, and its
relationship to environment and market and business at large.
Let learners participate in the discussion on the aforementioned
topics. Assist and/or guide learners in presenting their ideas and
relevant experiences.
Design varied levels of learning activities for the learners to better
8
Transfer
Transfer
Have learners prepare task 8 (Designing a Logo). Assist learners in
accomplishing this task by letting them adhere to their real life
experience.
Assess learners output using teacher-made rubrics following the
standards and objectives of this module.
Have learners prepare task 9 (Making My Own Vicinity Map). Guide
learners in creating their own vicinity map reflective of potential
market in computer technician in your province. Ask them to present
their output and process their understanding by asking relevant and
essential questions.
10
V Feedback
Pre / Post Assessment
6. D
7. C
8. A
9. B
10. A
6. D
7. B
8. C
9. D
10. D
VI References
8. Module 5, Project EASE, Effective and Affordable Secondary Education
9. http://www.entrepreneur.com/article/77408#ixzz2twpYG49A
10. http://www.thetimes100.co.uk/theory/theory--opportunities-constraintsbusiness-environment--165.php#ixzz1PVjUuaWu
11. http://www.thetimes100.co.uk/theory/theory--constraints-421.php#ixzz1PVki8a36
12. http://www.thetimes100.co.uk/theory/theory--constraints-on-production-303.php#ixzz1PVkyDy8k
13. http://www.thetimes100.co.uk/theory/theory--production-and-resourcerequirements--354.php#ixzz1PVlGG7zv
14. http://www.thetimes100.co.uk/theory/theory--nature-and-role-ofmarketing--245.php#ixzz1PVlc88gR
11
60 hrs
12
II - Learning Competencies
The competencies expressed as learning outcomes in this teaching
guide are the exact competencies that will be used to assess the learners /
trainees for them to secure COC or NC in Computer Hardware Servicing.
This teaching guide would allow teachers / instructors to strategically
teach the competencies spread out in the module; guide the learners in
performing the activities; process learners understanding; and assist the
learners in applying what they have learned to an entirely new context.
Utilizing effective teaching methodology and strategies suitable to the
learning needs and requirements of the learners, the following are the
competencies that should be mastered by learners / trainees after finishing
this module.
Lesson 1. Plan and prepare for configuration
Follow OHS in planning and preparing for configuration of computer
systems and networks
Prepare computer systems, tools, devices, equipment and materials
Check computer systems and networks configuration against specified
requirements
Identify the procedures in using the tools and equipment
Lesson 2. Configure computer systems and networks
Follow OHS procedures in configuring computer systems and
networks
Inspect networking devices, media and connectors
Create cross-over and straight-through cables
Assign IP address to clients and servers
Configure the assigned IP address to clients and servers
Enable network security to the computer systems
Configure file and printer sharing
Lesson 3. Inspect and test configured computer systems and networks
Follow OHS procedures in testing systems and networks
Test computer systems and networks in accordance with the job
requirements
Accomplish technical reports on the tests conducted
13
c. msconfig
d. dxdiag
14
a. Default gateway
c. IP address
b. DNS Server
d. subnet mask
12. In which of the following IP address classes does 192.168.1.105
belong?
a. Class A
c. Class C
e. Class E
b. Class B
d. Class D
13. What command is used to test the ability of the source computer to
reach a specified destination computer?
a. Ipconfig
c. Ping
b. Msconfig
d. Regedit
14. What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. Client server
c. Peer to client
b. Peer to peer
d. None of the options
15. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0
b. 255.255.0.0
c. 255.255.255.0
d. 255.255.255.255
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
l.
Crimping tool
Cross- over
Fiber- optic
Ipconfig
Multi- mode
Ping
Protocol
RJ45
Single- mode
Straight through
Subnet mask
Twisted pair
I can do it
confidently
3
I can do it
but with
assistance
2
I am not
confident
1
Verbal Interpretation
Confident
Confident but needs assistance
Not yet Confident
18
1.2
1.3
What to PROCESS
1.1- Safety Procedures
Guide learners in performing a peer to peer activity on page 45.
Instruct the students to get a partner in order to perform the said
activity.
Explain the general directions and show example evidences and
picture for a certain circumstances of the activity.
Task: Peer to Peer activity
General Directions: Get a partner to perform the next activity, because this
involves a two- person activity. Identify whether the succeeding statements
are true or false. You and your partner should gather evidences that make it
true and false. Show the effects of not following the safety precautions
through a picture presentation.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
Answer
Picture Presentation
Evidence
Effect
True
TRUE OR
FALSE
EVIDENCE
1. A safe workplace is
clean,
organized
and well lit.
2. Before opening the
case
and
19
PICTURE
performing
services, one must
unplug the power
from the source.
3. It is a best practice
that
a
fire
extinguisher
and
first aid kit must be
available in the
workplace.
4. You are allowed to
open the power
supply or a monitor.
5. You can eat inside
the laboratory.
1.2
20
1.3
21
Criteria
Poor (70-75)
Good (76-85)
The provided
information was
not necessary
Technically sound or not sufficient
information
to the computer
Coherence of
laboratory
information
safety
precautions.
The provided
information
was, for the
most part,
necessary and
sufficient to the
computer
laboratory
safety
precautions.
It lacks clarity
Most part is
Quality of Video
(30%)
and/or does not well organized,
present ideas in clear and
Clarity and
cohesiveness of a coherent way. presents ideas
the video
in a coherent
Organization and
way.
coherence of
ideas
Content/Informatio
n (50%)
Interview on
practitioner (20%)
Congruency of
questions to the
topic
Clarity of
questions
1.2
Questions were
not congruent
with the topic
and were not
delivered
clearly.
Most of the
questions were
congruent with
the topic and
delivered
clearly.
Excellent (86100)
The provided
information was
necessary and
sufficient to the
computer
laboratory
safety
precautions.
All of the
questions were
congruent with
the topic and
delivered
clearly.
Good (7579)
Some
format and
layout
related
requiremen
ts were
met.
Very Good
(80-89)
Most format
and layout
related
requiremen
ts were
met.
Excellent
(90-100)
All the
requiremen
ts related to
format and
layout were
strictly
followed.
The
research
was
objective
and for
some part
addresses
an in depth
analysis
The
provided
information
was, for
some part,
necessary
and
sufficient to
discuss
The
research
was
objective
and for the
most part
addresses
an in depth
analysis of
most issues
referred in
the
proposed
topic.
The
provided
information
was, for the
The
research
was
objective
and
addresses
with an in
depth
analysis all
the issues
referred in
the
proposed
topic.
The
provided
information
was
23
discuss
these
issues.
these
issues.
most part,
necessary
and
sufficient to
discuss
these
issues.
The essay
The essay
The essay
Quality of
was not
was well
was well
Writing (25%)
well written, written for
written for
Clarity and
and
some part, the most
cohesiveness
contains
without
part,
of sentences
many
spelling,
without
and paragraphs
spelling
grammar or spelling,
No errors in
errors,
use of
grammar or
spelling,
and/or
English
use of
grammar and
use of English
grammar
errors.
English
Organization
errors
The essay
errors.
and coherence and/or use is for some The essay
of ideas
of English
part well
is for the
errors.
organized,
most part
It lacks
clear and
well
clarity
presents
organized,
and/or does ideas in a
clear and
not present coherent
presents
ideas in a
way.
ideas in a
coherent
coherent
way.
way.
References Some of
Most of the
References
were not
the
references
(10%)
appropriatel references were
Soundness of
y used and were
appropriatel
references
cited.
appropriatel y used and
y used and cited.
cited.
24
necessary
and
sufficient to
discuss
these
issues.
The essay
was well
written from
start to
finish,
without
spelling,
grammar or
use of
English
errors.
The essay
was well
organized,
clear and
presents
ideas in a
coherent
way.
All of the
references
were
appropriatel
y used and
cited.
1.3
What to TRANSFER
1.1- Safety Procedures
Let learners showcase their understanding on safety procedures
through a role playing using the collected and collaborated information
gathered from the research and investigation activity.
Rate the learners performance using the rubric for role playing
provided on page 47 of Learners Material.
Task: Application of Safety Procedures while accomplishing a task
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
base on the Rubrics written below:
Rubrics for Role Playing
Criteria
Excellent
4
Good
3
Content (40%)
-Conveys full
understanding of
the content
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%)
-Displays
interesting purpose
Speak Clearly
(10%)
-Group members
speaks clearly at all
25
Fair
2
Weak
1
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
1.2
CRITERIA
B
(70- 74)
D
(75-79)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
26
AP
(8084)
P
(85-89)
A
(90100)
7. Maintained eye
contact
8. Maintained acceptable
posture.
9. Utilized audio-visual
aids
10. Handled questions
and comments
confidently
Total
Grand Total
1.3
Excellent
4
Good
3
Safety Procedures
(15%)
-Applied / manifested
safety precautions
while working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Had organized
materials and tools
while accomplishing the
task and has time
management
Quality of work (40%)
-the windows registry
was fully backed up
27
Fair
2
Poor
1
What to PROCESS
2.1- Safety Precautions Related to Networks
The teacher is suggested to craft appropriate activities to process
learners understanding relevant to safety precautions in system and
network configuration.
2.2- Networking Devices, Media and Connector
Let learners answer the criss- cross puzzle on page 86.
Task: Criss- Cross Puzzle
Direction: Complete the criss- cross puzzle and familiarize the cables being
described.
CABLES
29
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
2.3- Internet Protocols
Instruct learners to accomplish the worksheet for the task entitled
Protocols.
Task: Protocols
Direction: In this worksheet, you will write the name of the protocol and the
default port(s) for each protocol definition in the table.
Be prepared to discuss your answers.
Protocol Definition
Protocol
Default
Port(s)
The teacher shall provide several IP address for the task entitled
Identifying IP address classes. It must be written in the board or any
visuals available. Give the directions and instruct the learners to
accomplish the worksheet for the said activity.
30
Subnet Mask
255.0.0.0
IP Address Class
A
Peer-to-peer Network
Client/Server Network
1.
2.
3.
4.
5.
31
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
l.
32
B
Accidental threats
Antivirus software
Data encryption
Firewall
Malicious threats
Traffic
Trojan horse
Virus
VPN
WPA
WEP
Worm
Disadvantages
Example Situation
Example Situation
33
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
34
2. http://www.professormesser.com/n10-005/ip-classes/
35
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
36
Good (7579)
Some
format and
layout
related
requiremen
ts were
met.
Very Good
(80-89)
Most format
and layout
related
requiremen
ts were
met.
Excellent
(90-100)
All the
requiremen
ts related to
format and
layout were
strictly
followed.
The
research
was
objective
and for
some part
addresses
an in depth
analysis
The
provided
information
was, for
some part,
necessary
and
sufficient to
discuss
The
research
was
objective
and for the
most part
addresses
an in-depth
analysis of
most issues
referred in
the
proposed
topic.
The
provided
information
was, for the
The
research
was
objective
and
addresses
with an indepth
analysis all
the issues
referred in
the
proposed
topic.
The
provided
information
was
37
discuss
these
issues.
these
issues.
most part,
necessary
and
sufficient to
discuss
these
issues.
The essay
The essay
The essay
Quality of
was not
was well
was well
Writing (25%)
well written, written for
written for
Clarity and
and
some part, the most
cohesiveness
contains
without
part,
of sentences
many
spelling,
without
and paragraphs
spelling
grammar or spelling,
No errors in
errors,
use of
grammar or
spelling,
and/or
English
use of
grammar and
use of English
grammar
errors.
English
Organization
errors
The essay
errors.
and coherence and/or use is for some The essay
of ideas
of English
part well
is for the
errors.
organized,
most part
It lacks
clear and
well
clarity
presents
organized,
and/or does ideas in a
clear and
not present coherent
presents
ideas in a
way.
ideas in a
coherent
coherent
way.
way.
References Some of
Most of the
References
were not
the
references
(10%)
appropriatel references were
Soundness of
y used and were
appropriatel
references
cited.
appropriatel y used and
y used and cited.
cited.
38
necessary
and
sufficient to
discuss
these
issues.
The essay
was well
written from
start to
finish,
without
spelling,
grammar or
use of
English
errors.
The essay
was well
organized,
clear and
presents
ideas in a
coherent
way.
All of the
references
were
appropriatel
y used and
cited.
CRITERIA
B
(70- 74)
D
(75-79)
AP
(8084)
P
(85-89)
A
(90100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
7. Maintained eye
contact
8. Maintained acceptable
posture.
9. Utilized audio-visual
aids
10. Handled questions
and comments
confidently
Total
Grand Total
39
Website
URL
Cost
Subscription Length
(Month/Year/Lifetime)
Hardware
Features
2. Which hardware firewall would you purchase? List reasons for your
selection.
3. Using the Internet, research two different software firewalls. Based on
your research, complete the table below.
Company/Software
Name
Website Cost
URL
Subscription Length
(Month/Year/Lifetime)
Software
Features
4. Which software firewall would you purchase? List reasons for your
selection.
2.6- File and Printer Sharing
Instruct learners to do the Read and Examine task on page 148. Ask
them to use supplementary references and inform them to prepare for
an oral presentation.
Prepare a rubric for the oral presentation.
Task: Read and examine
Direction: Examine these topics carefully to deepen your understanding
about sharing a printer, read books /other references. Prepare for an oral
presentation.
1. What is a print server?
2. What are the functions of a print server?
3. What are the different types of print servers? Describe each.
40
What to TRANSFER
2.2- Networking Devices, Media and Connector
Guide the learners in creating their own Ethernet cable by stating the
general directions, materials and tools needed and by discussing the
procedures for the said activity.
Inform the learners about the rubrics to be used in order to rate their
performance (rubrics is on page 90).
Task: Create your own Ethernet Cable
Directions: Prepare the following tools and materials in fabricating your own
cross over and straight- through cables.
Materials:
1) 6 meters Ethernet Cable Category 5e or Cat5e- standard wire for
cabling;
2) RJ45 crimpable connectors for Cat5e;
Tools:
3) RJ45 Crimping tool;
4) Wire cutter, stripper or pliers; and
5) Ethernet cable Tester / LAN Tester
Take Note: Be careful when using the tools.
You just need to follow the procedures cited in this module and apply
the safety precautions to avoid injury or any unwanted incident. You will be
given 30 minutes to complete the task. You will be rated according to the
performance rubric.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as
shown. The color order is important to get correct.
4. Use scissors to make a straight cut across the wires 1/2 Inch from the
cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.
41
6. A view from the top. All the wires are all the way in. There are no short
wires.
7. Crimping The Cable carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
8. For a standard "Straight Through" cable, repeat all steps and wire color
order on the other end of cable. For a cross-over cable, the other end
will have a different color order as shown by the crossover picture
above.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
Excellent
4
Good
3
Safety Procedures
(15%)
-Applied / manifested
safety precautions
while working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Organized materials
and tools while
accomplishing the task
and has time
management
42
Fair
2
Poor
1
Quality of Product
(40%)
-produced a fully
functional Ethernet
Cable
Poor
(0-80)
Good
(80-90)
43
Excellent
(90-100)
Comprehension (10%)
(Interview / Guide questions
were answered correctly
according to the job
requirements)
Recommended Equipment
Linksys 300N router
A Computer running Window XP Professional
Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into Port 1 on the back of
the router.
Plug the other end of the Ethernet patch cable into the network port on
the NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click start
Right-click My Network Places, and then choose Properties.
The Network Connections window appears.
Step 2
Right-click Local Area Connection, and then choose Properties.
The Local Area Connection Properties window appears.
44
Activity Questions:
1. What is the name and model number of the NIC in the Connect
using: field?(Answers may vary)
2. What are the items listed in the This connection uses the
following items: field? (Answers may vary but must include
Internet Protocol (TCP/IP)
Step 3
Choose Internet Protocol (TCP/IP).
Click Properties.
The Internet Protocol (TCP/IP) Properties window appears.
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway
listed in the fields of the Use the following IP address: area?
Answers may vary. If the computer is configured to obtain an IP
45
Click OK.
Restart your computer.
Step 4
Log on to Windows as an administrator.
Check the lights on the back of the NIC. These lights will blink when
there is network activity.
Choose Start > Run....
Type cmd and click OK.
46
Activity Questions:
1. What is the IP address and subnet mask of the Ethernet Adapter
Local Area Network Connection? Answers may vary.
2. What is the IP address of the DHCP server? Answers may vary.
3. On what date was the Lease Obtained? Answers may vary.
4. On what date does the Lease Expire? Answers may vary.
Task 2
Configure Wireless Router
Directions: Configure and test the wireless
LinksysWRT300N.
Recommended Equipment
A computer with Windows XP Professional
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
settings
on
the
Connect the computer to one of the Ethernet ports on the wireless router
with an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as
an administrator.
Step 2
Choose start > Run, and type cmd. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
47
Step 3
Open Internet Explorer. Type 192.168.1.1 in the Address field, and
then press Return.
48
Type CHS# in the Network Name (SSID): field, where # is the number
assigned by your instructor.
Click Save Settings.
The Settings are successful screen appears.
Excellent
4
Safety Procedures
(15%)
-Applied / manifested
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Organized materials
and tools while
accomplishing the task
and has time
management
Quality of Service
(40%)
-Had set- up a fully
functional peer-to-peer
and client/server
network.
50
Good
3
Fair
2
Poor
1
51
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
Step 3
From the Windows Firewall control menu select the Exceptions tab.
Programs and services that Windows Firewall is not blocking will be
listed with a checkmark.
You can add applications to this list. This may be necessary if your
customer has an application that requires outside communications but
for some reason the Windows Firewall cannot perform the
configuration automatically. You must be logged on to this computer as
an administrator to complete this procedure.
52
Essential Question:
Creating too many exceptions in your Programs and Services file
can have negative consequences. Describe a negative consequence of
having too many exceptions.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Step 4
From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings.
Network Connection
Settings displays the different connections configured for your
computer.
Step 5
There are many applications that users do not normally see that also
need to get through the Windows Firewall to access your computer.
These are the network level commands that direct traffic on the
network and the Internet.
53
Under the ICMP heading, click the Settings button. You will see the
menu where ICMP exceptions are configured.
Procedures:
Step 1
Choose My Computer > Tools > Folder Options
Click the View tab.
Uncheck the Use Simple File Sharing (Recommended) checkbox,
and then click OK.
Step 2
Step 3
Right-click the Example folder, and then choose Sharing and
Security
Click the Share this folder radio button, and then click OK.
55
56
Step 7
Return to the computer that is not directly connected to a printer.
Open the Control Panel. Choose Printers and Other Hardware >
Printers and Faxes.
Choose File > Add Printer on the screen below.
57
58
Step 8
Choose start > Printers and Faxes.
59
Click OK in the confirmation dialog box, and then click OK to close the
printer properties window.
Step 9
To test the functionality of file and printer sharing, you must be able to
print a document or try the sample print feature of a printer.
60
Excellent
4
Good
3
Fair
2
Poor
1
Safety Procedures
(15%)
-Applied / observed
safety precautions
while working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Had organized
materials and tools
while accomplishing
the task and has time
management
Functionality (40%)
-had set up a
functional file and
printer sharing
system and was able
to come up with a
printed hard copy
through it
61
What to PROCESS
3.1- Safety Precautions
Teacher may provide variation of activities for this lesson to process
learners understanding on the subject matter.
3.2- Guidelines for Testing Configured Computer System and Network
Teacher shall fabricate variation of activities for this lesson to process
learners understanding on the subject matter.
Step 1
Disconnect the Ethernet patch cable from your computer.
A red X appears over the Local Area Connection icon.
63
64
Specification:
Diagnosis:
Action Taken:
Remarks:
65
V Summative Assessment
Prepare a comprehensive summative assessment that covers all the
important topics that were discussed.
Guide learners in assessing their themselves using:
1. Paper and pencil test
2. Performance test
3. Other appropriate tools
Check their answers using the answer key
VI Feedback
Pre / Post- Assessment
I.
True or false
1. True
2. True
3. True
4. False
5. False
6. True
7. True
8. True
9. False
10. True
II.
Multiple Choices
1. C
2. B
3. D
4. A
5. C
6. A
7. C
8. B
9. D
10. A
11. C
12. C
13. C
14. B
15. A
66
III.
Matching Type
1. L
2. J
3. I
4. E
5. A
6. H
7. G
8. K
9. D
10. C
IV.
Acronyms
67
2.
3.
4.
5.
VIRUS- PRIMARY
SECURITY
SECURITY
SECURITY
Electronic Resources:
Definition of Configuration Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
File Sharing Retrieved from
http://www.techopedia.com/definition/16256/file-sharing
Fundamentals of PC repair Retrieved from http://www.ustudy.in/ce/hard/u1
Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best
Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 |
Networking Tips | UNIX and LINUX Usability | Installation Procedure Of
Various Operating Systems | computer repair | computer problems
Retrieved
from
http://101-computertroubleshooting.blogspot.com/2009/09/directx-diagnostic-tooldxdiag.htmlHow to configure peer to peer workgroup network step by step Guide
Retrieved from http://computernetworkingnotes.com/basic-workgroupnetworking/workgroup-set-up.htmlHow
from
On
the
Windows
70
Firewall
Retrieved
from
http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-onoff#turn-windows-firewall-on-off=windows-7
Windows Registry Retrieved from
http://pcsupport.about.com/od/termsr/p/registrywindows.htm-http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf
60 hrs
CONTENT STANDARD
The learner demonstrates understanding of the underlying concepts and
principles in maintaining computer and network systems.
PERFORMANCE STANDARD
The learner independently demonstrates skills in computer systems as
prescribed in the TESDA Training Regulations.
LEARNING COMPETENCIES
Plan and prepare for diagnosis of computer systems errors
Diagnose and configure computer systems and networks
Inspect and test the configured computer systems and networks
Test Systems and Networks
I. OBJECTIVES
Guided by the teacher and this module the learner is expected to:
Acquire knowledge, skills and underlying principles in the process and
delivery of Computer Hardware Servicing such as:
1.Plan and prepare for the maintenance of computer systems and
networks
Follow OHS procedures in maintaining computer systems and
networks
Plan on how to maintain computer and networks systems
Identify faulty computer and networks systems
Identify tools in maintaining computer and network systems
Inspect testing equipment/devices
Check PC specifications
Verify network functions and specifications
2. Maintain computer systems
72
II. PRE-ASSESSMENT
Guide learners in assessing their prior knowledge and skill in
Computer Hardware Servicing using:
Direction: Listed below are some of the most important skills that you
must gain in order to render quality service when you enter the real world of
Computer Hardware Servicing. Read the skills carefully. Write YES if you
are familiar with the skill and NO if not. Feel free to answer each skill. Write
your answers in your notebook.
I can
YES
73
NO
74
Based on the objectives of the lesson and results of the preassessment, let the learners define their personal goals and targets to be
achieved at the end of this module. Ask the learners to write their
goals/targets on their notebook/ answer sheet.
Discuss the use and relevance of setting goals and targets for the
mini- course.
Assist/Guide learners in accomplishing their goals and targets
using the format provided in the module.
What to PROCESS
76
Status
Status
(Before
Updates)
(After Updates)
Security
1)Anti-Spyware Programs
2)Anti-Virus
Maintenance
1)System Maintenance
Internet Research
Students will answer pages 215-216.
Guide the students in answering the worksheet. Show examples on
hardware components, their specifications and cost.
Let the students browse online.
Let the students go to the community and ask the computer stores and
shops.
Network Layout
77
Investigative Report
Answer activity on page 209.
In this activity, the students may search online about computer
systems status or interview a practitioner lending a service in computer
78
hardware servicing.
Encourage them to make profiling as a source of evidence of their
reports.
Ask the students to make documentations.
Brand
No.1
Cost
Brand
No.2
Cost
Strengths Weakness
Processor
Motherboard
Memory
Graphic
Card
Sound Card
Details
Points
79
Critical Review
Answer the activity on page 222.
Let the students create a table of specifications on network hardware.
List brand names and compare.
Direction: To increase students understanding about network specifications.
Make a market study on components, its brand, functionality and cost.
Students can ask computer vendor of the price lists and inquire of its
specifications. Choose two brands then make comparisons. Be ready for an
oral presentation.
Components
Router
Hub 8-port
UTP cable
Rj45 connector
Sound Card
Brand No.1
Brand No.2
Cost
What to TRANSFER
Video Demo Application of Diagnosis on Faulty Computer and Network
Systems
PERCENTAGE
30%
80
30%
SCORE
Clarity
(Clearly
delivered
diagnosis)
Team work (cooperation of
member)
each
30%
each
10%
Performance Rating
Magazine Article
Answer activity on page 209.
Let the students write an article on the risk about turning off messages
about spyware and virus protection.
Students may base their idea on the interview taken.
Encourage students to ask help from their English teachers in
generating idea.
81
Contents
Rubrics
Excellent
(5)
Good
(3)
Poor(1)
Computer Specifications
Students will answer activity on page 217.
Make a market scanning and look for business establishments for
computer sales and services. Create a price list of brands and sample
model of computer parts with its price.
Show a sample complete hardware components and their prices.
Directions: In this activity, students will create a complete list of
specifications of a one set desktop computers including its brand name and
cost. Total all the amount and present it to the class.
Computer Shop Network Layout
82
Direction: In this activity, students will draw in a short coupon, layout plan of
a computer caf connected to a network. Write the specifications of the
network hardware. Incorporate the following requirements:
1.
2.
3.
4.
5.
CRITERIA
Percentage Score
40%
40%
10%
4. Observance
Precautions.
10%
of
Safety
PERFORMANCE RATING
2.2
2.4
UNDERSTANDING PARTITIONS
2.5
Adhere to the recommended schedule and techniques in
maintaining and cleaning computer systems
Scan Disk
http://www.computerhope.com/jargon/d/diskclea.htm
http://www.theeldergeek.com/disk_cleanup_utility.htm
http://support.microsoft.com/kb/310312
http://windows.microsoft.com/en-us/windows/delete-files-using-diskcleanup#delete-files-using-disk-cleanup=windows-7
e) http://www.udel.edu/it/help/best-practices/running-disk-cleanupwindows-computer.html
85
What to PROCESS
2.1 Essay Activity
Let the student answer the activity on page 229.
Let the students write an essay on the importance of data backup
Directions: In this activity, write an essay about the importance of Data
Backup. Relate your statements to the most treasured thing you possessed.
Give also your own title for the essay. Minimum of 400 words.
2.2 Critical Review: Problems Encountered
Directions: In this activity, list down at least five (5) problems, error
messages or incidents you encountered while working or using the computer.
Then your actions you have taken.
Problems Encountered
Actions Taken
1.
2.
3.
4.
5.
2.5 .1
Let the students do process activity on page 265-266.
86
Directions: Have five members per group and make a research on the
different cause and effect of data backup, malware maintenance and disk
maintenance. You can also interview / observe a practitioner while lending a
quality service in computer hardware servicing. This event will be presented
orally through a role playing.
2.5.1
What to TRANSFER
2.1
Role Playing
Application on Maintenance of Computer System
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
base on the Rubrics written below:
89
Criteria
Excellent
4
Good
3
Fair
2
Weak
1
Content (40%)
-Conveys full understanding
of the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting
purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with
props and costumes
Cooperation (10%)
-displays teamwork
2.2 Video Tutorials
90
Excellent
4
Good
3
Fair
2
Weak
1
Content (40%)
-Conveys full understanding of
the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with props
and costumes
Cooperation (10%)
-displays teamwork
2.3
Directions: The class will be divided into five (5) groups. Each group has its
own respective leader. The group will perform a task regarding familiarizing
the cleaning components of computer. After the activity they will be graded
using the given Performance Score Card below:
91
Percentage
20%
15%
25%
30%
10%
Grade
Performance Rating
1. Concept Mapping
In this activity, you will write on the figures the concept which will relate
to the word scan. Add more shapes if you want.
92
SCAN
Directions: Pair the students. Let them perform the deleting of temporary
internet files. After the activity they will be graded through the given
Performance Score Card below:
CRITERIA
Passed
93
Failed
2.5.3
Answer activity on page 274-275.
Let the students perform the activity.
Activity
Directions: You are to delete temporary files in the different Operating
Systems.
1. Delete Temporary Files in Windows 7 and Windows 8
2. Delete Temporary Files in Windows XP
Guide them in performing the task. Ask if they have any suggestions.
Accomplish the maintenance inspection checklist below: Put a check mark on
the column which states an action taken.
MAINTENANCE INSPECTION CHECKLIST
Equipment
PERSONAL COMPUTER
Type
Property
PC001
Code
Location
Practical Work Area
YES
NO INSPECTION ITEMS
1. Do the stability of the male plug and other
power connections checked regularly?
2. Is the machine regularly cleaned?
3. Is the monitor checked and cleaned
regularly?
4. Are the peripherals cleaned and checked
regularly?
5. Is the hard disk checked and cleaned
regularly?
6. Are the applications regularly updated?
7. Do the files back up done regularly?
3.2 Perform Immediate Burn-In Testing
Excellent
(5)
Hardware/
Peripherals
All hardware/peripherals
were enumerated
Format
Details
Handwriting
Good
(3)
Poor(1)
What to KNOW
4.1
4.6
4.7
What to PROCESS
Let the students do the activity on page 293.
Let the student download and explore free network diagnostic tool.
Experiment and Demonstrate
To check the vulnerability or stability of your network connection, go to the
internet and download a free network diagnostic tool.
Go to any search engine and type network diagnostic tool.
97
After downloading the application, run the setup file of the program and
install it into your computer.
If the program was already installed, run the application. Take note of the
diagnosis. Do some action if there are problems or errors encountered.
1.
98
99
100
101
Excellent
4
Good
3
Fair
2
Poor
1
Adherence to the
sequence of setup
-Followed carefully the
given instructions.
Workmanship
-Had organized
materials and tools
while accomplishing
the task and has time
management.
Quality of work
-The final output is neat
Practicing TCP/IP Networking Skills
Direction: You are to enumerate the hardware items that can be seen inside
the computer laboratory, applications installed in a computer, network
devices, computer tools and others.
What to TRANSFER
Excellent
(3)
Good
(2)
Poor (1)
3. Ping a terminal/computer
Rubric for your performance Test
Criteria
Accuracy
Adherence to the procedures
Workmanship(applied safety
precautions)
Speed
Percentage
50 %
20%
20%
Grade
10%
Performance Rating
Total:
Percentage
40%
40%
10%
10%
PERFORMANCE RATING
VI Feedback
Answer key for Module 4
What to Process (page 60)
1. Tablet PC
2. Server
3. Minicomputer
4. Microcomputer
5. Netbook
6. Desktop computer
7. Digital
8. Mainframe
9. PDA
10. Wearable computer
Matching Type (page 61)
1. C
2. A
3. K
4. J
5. H
6. D
7. G
105
Score
8. L
9. B
10. F
What to Process (page 68)
1. Network Firewall
2. WAN
3. Network gateway
4. Network
5. Modem
6. Network Interface
7. Bridge
8. Ethernet Switch
9. Routers
10. LAN
What to Process (page 78)
1. True
2. True
3. True
4. True
5. False
6. True
7. True
8. True
9. True
10. True
106
Summative Test
Test 1.
1. Tablet PC
2. Server
3. Minicomputer
4. Microcomputer
5. Netbook
6. Desktop computer
7. Digital
8. Mainframe
9. PDA
10. Wearable computer
11. Operating system
12. Input devices
13. Output device
14. Storage devices
15. Firewall
16. WAN
17. Network gateway
18. Network
19. Hub
20. Bridge
Test II
1. True
2. True
3. True
4. True
5. True
6. True
7. True
8. True
9. True
10. True
11. True
12. True
13. False
107
14. True
15. True
Test III.
1. C
2. D
3. A
4. C
5. B
6. B
7. A
8. D
9. C
10. B
Test IV
1. C
2. A
3. P
4. O
5. J
6. E
7. H
8. Q
9. B
10. G
11. D
12. M
13. L
14. I
15. K
Answer key for Module 4
Test I
1. Place computer in a well-ventilated area.
2. Schedule the use of computer for its longer life
3. Treat your computer properly
4. Backup your files.
5. Delete temporary files.
108
Electronic Resources:
Computer Memory Types Retrieved from
http://www.buzzle.com/articles/computer-memory-types.html
Measurements for Memory & Storage Retrieved from
http://www.athropolis.com/popup/c-comp2.htm
Fundamentals of PC repairRetrieved from http://www.ustudy.in/ce/hard/u1
Occupational Health and Safety PrecautionsRetrieved from
http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20%20With%20Oral%20Questioning_0.pdf
Puzzles for Activities Retrieved from
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp
Occupational Safety Precautions Retrieved from
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf
110
111