Competency-Based Learning Material: Sector: Qualification: Unit of Competency: Module Title
Competency-Based Learning Material: Sector: Qualification: Unit of Competency: Module Title
Competency-Based Learning Material: Sector: Qualification: Unit of Competency: Module Title
Welcome!
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Remember to:
• Work through all the information and complete the activities in each
section.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
• When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
TABLE OF CONTENTS
Page
A. LIST OF COMPETENCIES 5
Settings.……………..........................................................14-
25 o Self Check 1.3-1.…………….............................................26
o Answer Key 1.3-1............................................................27
o Information Sheet 1.3-2 Configure Local Area
Network.…………….........................................................28-
34 o Self Check 1.3-2.…………….............................................35
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
List of Competencies
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
ASSESSMENT CRITERIA:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Contents:
Assessment Criteria
Conditions
1. Workplace Location
2. Computer Network materials:
1. UTP Cable
2. RJ45
3. Router/Hub
4. Modem
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
1. Written Works
2. Actual Application
3. Performance Criteria Learning Experiences
Learning Outcome 3
again.
Learning Objective:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
There are different versions of DriverPack Solution: 15, 14, 13, 12,
11, 10 & 8. You should be careful on choosing a driver pack; it
should be compatible with your PC specification.
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Click Properties.
Type 192.168.1.50
into the IP address field.
Type 255.255.0.0
into the Subnet mask
field.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
TRUE OR FALSE: Write the word TRUE in the space provider if the statements
are correct and FALSE if it is not.
______2. On Windows 10 OS, to set up the Time and Date go to the upper left
of your taskbar.
______3. Setting up your Computer Name is important. This will serve as the
Identity of your computer.
______8. In setting up the Time Zone, you could use "Philippines" for the
setting.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
TRUE OR FALSE
1. False
2. False
3. True
4. True
5. True
6. True
7. False
8. False
9. False
10. True
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
When Equipments and Peripherals are all ready, we will now proceed on
Installing and Configuring Local Area Network. Below are steps in configuring
Local Area Network.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
SELF-
CHECK. 1.3-2
__________4. Is a way stations that control the traffic of data within a network,
assigns a unique IP Address to each computer.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
__________7. Default Username and Password use for Logging in on your Router
Portal.
__________8. A tab on your Router Portal that can be used to change your IP
Address.
IDENTIFICATION:
1. Personal Computer
2. Modem
3. Ethernet Cable
4. Router
5. LAN
6. 192.168.0.1
7. Admin
8. Network Tab
9. Reset
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
• Personal Computer
Steps/ Procedure:
1. Prepare your Workplace
a. Make sure that you have the necessary Materials/Peripherals
b. Make sure that the workplace is clean and dry.
2. Start
a. Connect Router and Personal Computer using your Ethernet Cable
b. Reset your Router using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer
d. Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Assessment Method:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
2. Reset the Modem. In resetting your Modem just click the small button
at the back and wait until all the icons in front of the Modem will Lights
on. See figure below.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Rearrange the given steps on how to configure WAN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.
______1. Gather your Modem, Ethernet Cable and Personal Computer. Connect
each peripheral using the Ethernet Cable.
______3. Go to Network Tab. Change your IP address. Click Save then it will
reboot.
______4. Reset the Modem. In resetting your Modem just click the small button
at the back and wait until all the icons in front of the Modem will Lights on.
______7. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and password.
REARRANGE:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
2. 5
3. 7
4. 4
5. 3
6. 8
7. 6
8. 1
9. 5
10. 10
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
• Personal Computer
Steps/ Procedure:
3. Prepare your Workplace
a. Make sure that you have the necessary Materials/Peripherals
b. Make sure that the workplace is clean and dry.
4. Start
a. Connect Modem and Personal Computer using your Ethernet Cable
b. Reset your Modem using Pins/Ballpen
c. Go to your Browser (Google Chrome or Iexplorer)
d. Type in the Default IP Address
e. Type in the default username and password
f. Set up Network Tab
g. Set up DHCP Tab
h. Set up Wireless Tab
Assessment Method:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
A wireless local area network (WLAN) links two or more devices over a short
distance using a wireless distribution method, usually providing a connection
through an access point for internet access. The use of spreadspectrum or
OFDM technologies may allow users to move around within a local coverage
area, and still remain connected to the network.
Products using the IEEE 802.11 WLAN standards are marketed under the
Wi-Fi brand name. Fixed wireless technology implements point-topoint links
between computers or networks at two distant locations, often using dedicated
microwave or modulated laser light beams over line of sight paths. It is often
used in cities to connect networks in two or more buildings without installing a
wired link.
After configuring the Router and Modem we will now proceed on setting
up the wireless network.
a. Select the Start button, type Device Manager in the search box,
and then select Device Manager.
b. Expand Network adapters.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
After you have all the equipment, you'll need to set up your modem and
Internet connection. If your modem wasn't set up for you by your Internet
service provider (ISP), follow the instructions that came with your modem to
connect it to your PC and the Internet. If you're using Digital Subscriber Line
(DSL), connect your modem to a phone jack. If you’re using cable, connect your
modem to a cable jack.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Security is always important; with a wireless network, it's even more important
because your network's signal could be broadcast outside your home. If you
don't help secure your network, people with PCs nearby could access info
stored on your network PCs and use your Internet connection.
Change the default user name and password. This helps protect your router.
Most router manufacturers have a default user name and password on the
router and a default network name (also known as the SSID). Someone could
use this info to access your router without you knowing it. To help avoid that,
change the default user name and password for your router. See the
documentation for your device for instructions.
Set up a security key (password) for your network. Wireless networks have a
network security key to help protect them from unauthorized access. We
recommend using Wi-Fi Protected Access 2 (WPA2) security if your router
supports it. See the documentation for your router for more detailed info,
including what type of security is supported and how to set it up.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
1. Select the Start button, look for Control Panel and click Network and
Internet. Then look for Network and Sharing Center.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Write down your security key and keep it in a safe place. You can also save
your security key on a USB flash drive by following the instructions in the
wizard. (Saving your security key to a USB flash drive is available in Windows 8
and Windows 7, but not in Windows 10.)
2. In the list of networks, choose the network that you want to connect to,
and then select Connect.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
SELF-CHECK. 1.3-4
Rearrange the given steps on how to configure WAN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.
_____5. Select the Start button, look for Control Panel and click Network and
Internet.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
REARRANGE:
1. 5
2. 6
3. 9
4. 4
5. 7
6. 8
7. 3
8. 10
9. 2
10. 1
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
The Windows Firewall with Advanced Security is a tool which gives you
detailed control over the rules that are applied by the Windows Firewall. You
can view all the rules that are used by the Windows Firewall, change their
properties, create new rules or disable existing ones. In this tutorial we will
share how to open the Windows Firewall with Advanced Security, how to find
your way around it and talk about the types of rules that are available and
what kind of traffic they filter.
You have several alternatives to opening the Windows Firewall with Advanced
Security:
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
8. In the Properties window, you will find complete information about the
selected rule, what it does and in when it is applied. You will also be able
to edit its properties and change any of the available parameters.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
10. What Does the Windows Firewall with Advanced Security Monitor?
11. You should note that the Monitoring section shows only the active
rules for the current network location. If there are rules which get
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
SELF-CHECK. 1.3-5
TRUE OR FALSE: Write the word TRUE in the space provider if the statements
________1. A firewall is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).
________3. In order to provide the security you need, the Windows Firewall has
a standard set of inbound and outbound rules.
________4. These rules can't be configured so that they are specific to:
computers, users, programs, services, ports or protocols.
________5. In the Windows Firewall with Advanced Security, you can access all
rules and edit their properties.
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
________7. Monitoring section shows only the active rules for the current
network location.
________8. Unlike the inbound or outbound rules, which are applied only to one
computer, connection security rules require that both computers have the
same rules defined and enabled.
________10. Inbound rules are applied to the traffic that is coming from the
network and the Internet to your computer or device.
TRUE OR FALSE:
1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
6. TRUE
7. TRUE
8. TRUE
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II
10. TRUE
REFERENCES:
INTERNET
1) http://www.tesda.gov.ph
a. CSS NCII TR
b. CSS NCII CBC
c. CSS SAG
2) http://wikihow.com
a. Configure Local Area Network
b. Configure Wide Area Network
3) http://www.slideshare.net
a. Configure Client Device Settings
b. Configure Wireless Settings
c. Setting up Firewall with Advance Security
Date Developed:
CBLMs on Computer
July 2017 Document No.:
Systems Servicing
Date Revised:
NC II