Ste10 Q3 CSS Week4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

10

STE-ICT (Computer System Servicing)


Activity Sheet Quarter 3
Inspect and test the configured computer
networks
(Safe Computer Network)

REGION VI – WESTERN VISAYAS

1
TVL 12 – ICT (Computer System Servicing)
Activity Sheet No. 7
First Edition, 2020

Published in the Philippines


By the Department of Education
Region 6 – Western Visayas

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
This Learning Activity Sheet is developed by DepEd Region 6 – Western
Visayas.

ALL RIGHTS RESERVED. No part of this learning resource may be


reproduced or transmitted in any form or by any means electronic or mechanical
without written permission from the DepEd Regional Office 6 – Western Visayas.

Development Team of TVL 12- ICT (Computer System Servicing)


Activity Sheet

Writer : Angeline D. Labiao


Reviewer : Edward E. Baña
Editors : Allan B. Montenegro
Layout Artist :
Schools Division Quality Assurance Team:
Schubert Anthony C. Sialongo
Edward E. Baña
Allan B. Montenegto
Michelle P. Jordan
Division of Antique Management Team:
Felisa B. Beriong, CESO VI
Corazon C. Tingson
Gaudencio C. Riego, PhD
Schubert Anthony C. Sialongo
Edward E. Baña
Regional Management Team
Ma. Gemma M. Ledesma,
Dr. Josilyn S. Solana,
Dr. Elena P. Gonzaga,
Mr. Donald T. Genine,
April C. Velez
Abraham P. Imas
2
Introductory Message
Welcome to TVL 12- ICT (Computer System Servicing)!

The Learning Activity Sheet is a product of the collaborative efforts of the


Schools Division of Antique and DepEd Regional Office VI - Western Visayas through
the Curriculum and Learning Management Division (CLMD). This is developed to
guide the learning facilitators (teachers, parents and responsible adults) in helping the
learners meet the standards set by the K to 12 Basic Education Curriculum.

The Learning Activity Sheet is self-directed instructional materials aimed to


guide the learners in accomplishing activities at their own pace and time using the
contextualized resources in the community. This will also assist the learners in
acquiring the lifelong learning skills, knowledge and attitudes for productivity and
employment.

For learning facilitator:

The Computer System Servicing NC II Activity Sheet will help you facilitate
the leaching-learning activities specified in each Most Essential Learning Competency
(MELC) with minimal or no face-to-face encounter between you and learner. This will
be made available to the learners with the references/links to ease the independent
learning.

For the learner:

The Computer System Servicing NC II Activity Sheet is developed to help


you continue learning even if you are not in school. This learning material provides
you with meaningful and engaging activities for independent learning. Being an active
learner, carefully read and understand the instructions then perform the activities and
answer the assessments. This will be returned to your facilitator on the agreed
schedule.

3
Quarter 2, Week 7
Learning Activity Sheets (LAS) No. 7

Name of Learner:______________________________________________________
Grade and Section:_________________________________ Date: ______________

TVL 12- ICT (COMPUTER SYSTEM SERVICING) ACTIVITY SHEET


(SAFE COMPUTER NETWORK OPERATION)

I. Learning Competency with Code


12SUCN-If-j-IIa-e-36
✓ 4.1 Undertake final inspection of the configuration to conform to the manufacturer’s
instructions/manual
✓ 4.2 Ensure the configuration conforms to the manufacturer’s instructions/manual
✓ 4.3 Check computer networks to ensure safe operation

II. Background Information for Learners

In a fast phase changing world of technology, information is very important,


like every other value, people try to save it from superfluous hands and eyes,
especially valuable personal information and work related data we sent through
electronic for business, education, government, entertainment and some other
transaction purposes. Exchanging data and information via virtual world is very
crucial. Also, proper precautions on how to configure the network cables and
operations to avoid physical harm. Thus, we need to be aware on how to
safeguard every transactions or activity we did every day to avoid computer
crimes and economic losses towards it.
Therefore, this module will discuss on how to manage properly the
computer network operations.

Preventions is better than


Cure! Hence, this activity will
tackle on how to have a Safe
Computer Network Operation.

4
Computer Network Overview:

A computer Network, or simply a network is a collection of computer and


other hardware components interconnected by communication channels that
allow sharing of resources and information.
In 1940, George Stibitz used a teletype machine to send instructions for a
problem set form his model at Dartmouth College to his complex number
calculator in New York, then in year 1950, Earl networks of communicating
computers included the military radar system Semi-Automatic Ground
Environment (SAGE), started in late 1950’s. The commercial airline reservation
system Semi-Automatic Business Research Environment (SABRE) went online
with two connected mainframes in the year 1960. The following year of 1969,
ARPANET (Advanced Research Project Agency) was created for transmission
lines of 56kb, then DECNET (Digital Electronic Corporation Network) was created
in 1970 for proper trait design. In 1980’s, GIGA BYTE network was created to
support the different applications such as FTP, SMP, HTTP, POP3, IMAP4 and
lastly, WWW (World Wide Web) was developed by Timothy John Berners-Lee.
The development of network is consistent until now. Therefore, we need to have
a proper security in our cyber world.
It is understandable that data protection in computer networks throughout
development of information systems has got on the first place on importance at
the organization of computer networks, and as to operation with them.

At present there are three basic principles of informational safety which


should provide:
1. Data integrity (solution of a problem of protection against the failures
which are carrying on to lose or change the information);

5
2. Confidentiality of the information (solution of a problem of not
authorized access to the information);

3. Availability of the information to all authorized users (solution of a


problem of failure in service).

SAFETY PRECAUTIONS RELATED TO NETWORKS

System Configuration is the way a system is set up; it is the collection of


components that make up the system. Configuration can refer to either
hardware or software, or the combination of both.

Configuration can refer to either hardware or software, or the combination of


both. For instance, a typical configuration for a PC consists of 32MB
(megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM
drive, a VGA monitor, and the Windows Operating System

Safety rules when working with cables

The tools required to install copper and fiber-optic cable may cause
danger through improper use. When working with cables, strictly follow these
safety rules:

1. Make sure that the tools you are using are in


good working condition.
2. Watch what you are doing, and take your
time. Make sure that you do not cut yourself
or place anyone in danger
3. Always wear safety glasses when cutting,
stripping, or splicing cables of any kind. Tiny
fragments can injure your eyes
4. Wear gloves whenever possible, and dispose any waste properly.

Fiber-Optic Safety

Fiber-optic cables are useful for communications, but they have certain hazards:

6
o Dangerous chemicals
o Tools with sharp edges
o Light which you cannot see that can
burn your eyes
o Glass shards produced by cutting fiber-
optic cable that can cause bodily harm.
Specific types of tools and chemicals are used when working with fiber-optic
cable. These materials must be handled with care.

Chemicals - The solvents and glues used with fiber optics are dangerous. You
should handle them with extreme care.

Tools - When working with any tool, safety should always be your first priority.
Any compromise in safety could result in serious injury or even death. The tools
used for working with fiber optics have sharp cutting surfaces that are used to
scribe glass. Other tools pinch cables with high pressure to fasten connectors to
them.
Glass Shards - The process of cutting and trimming the strands of fiber-optic
cables can produce tiny fragments of glass or plastic that can penetrate your
eyes or skin and cause severe irritation. The fibers can be extremely difficult to
see on your skin because they are clear and small. When you work with fiber-
optic cabling, the working surface should be a dark mat so that you can see the
tiny glass or plastic fragments.

Harmful light - Protect your eyes from the harmful light that may be in the fiber-
optic strands. The light is a color that humans cannot see. It can damage your
eyes before you can feel it. When you use a magnifier to inspect fiber-optic cable
and connectors, the light emitted from the fiber could be directed into your eyes.
When working with fiber, be sure to disconnect the light source. Use special
detectors to help you tell if a fiber is energized.

Important Internet Safety Precautions to help protect your information

1. Frequently check your accounts.


2. Protect your passwords.

7
3. Get up-to-date anti-virus and anti-
spyware software.
4. Use a firewall.
5. Ensure your browser and operating
system are always up-to-date.
6. Protect your Internet connection -
especially with a wireless home
network.
7. Protect yourself from online fraud.

Frequently check your accounts


Frequently check your account and actively monitor your transaction
history, including promptly reviewing correspondence, notices and account
statements, or confirmations from us.
Protect your passwords
Maintaining the confidentiality of your passwords, both the personal login
password you have chosen (your "Login Password") and the personal trading
password you have chosen (your "Trading Password"), is key to your Internet
security.

To ensure you protect your confidential information, you should:


o Create a Login Password that is different from your Trading Password.
o Choose unique passwords that you can remember so that you do not
have to write them down. A combination of letters, numbers and symbols
(e.g. "!") should be used for better protection.
o Never use passwords that are easy for others to guess such as
birthdays, family names or telephone numbers.
o Ensure that AutoComplete or other memorized password functions on
your browser are disabled.
o Never save your passwords on your computer, the Internet or on any
other software, as it will allow anyone with access to that information the
ability to potentially impersonate you.
o Never disclose your password(s) to anyone, especially online, not even
to the police, your financial institution, your Internet Service Provider or
your family or friends. Please note, we will never ask you for your
passwords.

8
Get up-to-date anti-virus and anti-spyware software

o Anti-Virus Software: Your computer can become infected with a virus in


many ways (e.g. through email attachments, from content you download
from a website or from a diskette or other media). To help prevent your
computer from becoming infected and potentially losing files or having
them corrupted, you should install anti-virus software.
o Anti-Spyware Software: Spyware runs on your computer and can gather
private information such as passwords and credit card numbers, deliver
unwanted advertising, and monitor your browsing patterns. Spyware is
typically hidden in an otherwise harmless program, often in an email,
freeware or shareware you download. Before downloading any free
software, make sure you know and trust the provider.
.
Use a firewall

To ensure you protect your confidential information, you should use a


firewall to protect your home network from offensive websites and potential
hackers. Firewalls serve as protective barriers between your computer and the
Internet, preventing unauthorized access to your computer when you're online. If
you do not have a firewall installed on your computer, your personal information
may be accessed by a hacker.
A firewall allows you to restrict
traffic through the firewall such that
only certain types of information is
allowed - ensuring only safe programs
and/or traffic.
If you are using a Windows
Operating System and are not sharing
files or documents with other
computers on your network then, as a
further precaution, you should disable
the Windows File sharing feature. This
will prevent others from being able to download or view your files or documents.
For more information on disabling Windows file sharing, please visit the
Microsoft website.
Be sure to set up a firewall around your computer. Some Internet Service
Providers offer firewall software to their customers, and you can buy firewall
software or hardware at many computer stores.

Ensure your browser and operating system are always up-to-date

You should always take advantage of software updates so that your


browser and operating system have the latest security updates to help reduce
your computer's vulnerability. To ensure that you are able to download all of the
latest updates, you should always use a legally licensed operating system and

9
browser. Most operating systems and browser versions offer the ability to be
notified automatically of product updates.

You should always use a web browser that supports 256-bit encryption or
greater when accessing secure websites. Most browsers now come with 256-bit
encryption, which provides adequate protection when transmitting confidential
data over the Internet.

Protect your Internet connection - especially with a wireless network

Computers connected to the Internet for prolonged periods of time can


become vulnerable to attacks. There are additional precautions that you should
take to ensure that your Internet connection is
secure.

Wireless Networks
The default configuration of most
wireless home networks is not secure.
Contact your wireless software vendor for
specific information about enabling
encryption and strengthening the overall
security of your wireless home network.

Exercise Caution with Wireless Hotspots

Taking a few simple precautions when using wireless hotspots can help
protect your computer:

o Install a firewall on all network computers.


o Disable wireless connectivity when not in use.
o Use reputable encryption software.
o Disable wireless ad hoc mode. This will allow only wireless networks that
you created to use your wireless software.
o If you are unsure of the security of a wireless hotspot, don't use it for
conducting confidential business, such as accessing your work email or
financial information.
o Wireless technologies are continuously changing. Consult the
manufacturer of your network hardware to ensure you have the most up-
to-date security technology.

10
Protect yourself from online fraud

Brand spoofing or phishing (pronounced "fishing") is a scam where the


perpetrator sends out authentic-looking emails appearing to come from a
legitimate company in an effort to phish for personal and financial information
from the email recipient.
If you receive one of these emails, delete it immediately and do not respond
or act on it. Please note of the following reminders:
o Never mail, call or send to your email asking for your password, account
number or personal information, except if you know that person well.
o Never provide personal or financial information to anyone in an email.

o Never enter personal information unless you are sure the website is
legitimate. You should also be certain that the site is encrypted. Look for
the letter "s" at the end of "https" at the beginning of the URL address
(e.g. "https://www.qtrade.ca.") This ensures that the site is running in
secure mode.
o Be suspicious of email attachments from unknown sources. If you do not
know or recognize the sender of the email, do not open the attachment.
o Use security software products, when navigating through the Internet to:
(i) block fake websites and crime ware; (ii) keep passwords safe; and (iii)
authenticate trusted websites.
o Do not set your email program to "auto-run" attachments. Always check
that emails you have received do not contain viruses by running your
anti-virus software when the email attachment is received.
o Frequently check your account and actively monitor your transaction
history including promptly reviewing correspondence, notices and
account statements, or confirmations from us.

Procedures on how to maintain computer system and networks

1. Create an equipment maintenance schedule.


In order to perform the maintenance of your computer efficiently, a maintenance
schedule is made to guide us or the personnel in the proper maintenance procedure. This
will help us to remember the maintenance task that we need to be done in order to
improve the functionality of the computer system and networks.

11
2. Create a maintenance checklist.
To determine if the maintenance program is implemented according to what is
planned, an assessment must be done. The assessment is through regular inspections
which assure that the maintenance activities are done on the date and time it was planned
and that the performance levels adhered to the defined standard.
The checklist provided will help us to confirm if the maintenance activities have
been performed in order to prolong the life of the particular equipment.

MAINTENANCE INSPECTION CHECKLIST


Perform the computer maintenance task regularly. Just knowing all the basics of
computer maintenance task schedule clearly will not do any good. We should find time to
apply all of them regularly and frequently. Let's make the computer maintenance activities
a regular practice, so that we always have a fine tuned computer with a good
performance.
o Hardware maintenance is the testing and cleaning of equipment.
o Information system maintenance is the routine updating of master files, such as
Adding and deleting e and customers and changing credit limits and product
prices.
o Software or program maintenance is the updating of application programs in order
to meet changing information requirements, such as adding new functions and
changing data formats. It also includes fixing bugs and adapting the software to
new hardware devices.
o Disk or file maintenance is the periodic reorganizing of disk files that have become
fragmented due to continuous updating.
Design a systematic maintenance plan for hardware.
o Design a monitoring, evaluating and updating plan.
o Place your computer in a well-ventilated area.
o Schedule use of computer for its longer life.
o Move the computer only when it is turned off and unplugged.
o Treat your computer properly.

12
o Maintain your hard disk
Design a systematic maintenance plan for your software.
o Backup your files
o Install or secure passwords
o Delete temporary files
o Update anti-virus and spy ware

III. Accompanying DepEd Textbook and Educational Sites (With Possible


Materials for experiments/activities)
o https://www.theseus.fi/bitstream/handle/10024/24069/Strelchenko_Alexander.pdf?sequence=1&i
sAllowed=y, Retrieved on November 5, 2020
o https://www.gflesch.com/elevity-it-blog/ways-to-secure-a-computer-network, Retrieved on
November 5, 2020
o https://www.qtrade.ca/en/security/safety.jsp, Retrieved on November 5, 2020
o www.academia.edu, Retrieved on November 6, 2020
o www.w3.org/People/Berners-Lee, Retrieved on November 6, 2020
o www.inspiredtech.co.uk, Retrieved on November 6, 2020
o www.medium.com, Retrieved on November 6, 2020
o www.ghcomputerneworks.com, Retrieved on November 5, 2020
o https://innovationatwork.ieee.org/cyber-security-advancing-through-
o ai/?fbclid=IwAR0DGdbaQG4g6SnvAYobrNA0rOj_2owoEDpwpZeNDCgBjpbJBwEY CtlJVlw
o https://www.channelfutures.com/from-the-industry/methods-for-easing-your-top-cyber-security-
challenges, Retrieved on November 7, 2020
o https://www.pickpik.com/datacenter-servers-computers-network-server-technology-computer-
network-10469, Retrieved on November 7, 2020

IV. Activity Proper

1. Read Information about Computer Network


2. Exercises / Activities

Activity 1 – Computer Network Operations Maintenance Checklist


Direction: Copy the table shown below on your answer sheet and put a check mark on
the specified schedule column if you perform those Computer Network Operations
Maintenance activities with any computer you had in the past or present. You may recall
your experiences last year in your grade 9 CSS workshop as part of your hands-on
activities.

13
Schedule
Activities Daily Weekly Monthly Quarterly Yearly Remarks
Update virus and spyware
and firewall
Do incremental backup –
back up updated files for
each date.
Reboot upon crash- Reboot
the computer to fix your pc
upon crash.
Full virus and spyware scan
Complete backup of files
Patch up –Get latest
software update for your
operating system.
Clean your PC inside and
out. (Especially dust).
Defrag your hard drive to
speed up its operation.
Check your programs –
clean up unused programs
Reformat your hard drive
and reinstall the operating
system
Make a full diagnostic
check on hardware and
software

Activity 2
List down at least 5 problems you encountered in your computer network
operations including your (android/smartphones etc.), then what are the
solutions you did.

14
NETWORK COMPUTER OPERATION PROVIDED SOLUTIONS
PROBLEMS

Assessment:
Direction: Read each sentence. Write True if the statement is correct
False otherwise.

1. Always wear safety glasses when cutting, stripping, or splicing cables


of any kind. Tiny fragments can injure your eyes.
2. Make sure that the tools you are using are in good working condition.
3. Always stand on the top rung of the ladder. So that you could easily lose your
balance and fall.
4. You should wear clothing such as long pants, a long-sleeved shirt, sturdy shoes
that cover your feet, and gloves to protect you from those toxic materials
5. When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.
6. Use a password that are easy for others to guess such as birthdays, family names or
telephone numbers.
7. The letter "s" at the end of "https" at the beginning of the URL address ensures
that the site is running in a non-secure mode.
8. We need to ensure that our browser and operating system are always up-to-date.
9. The default configuration of most wireless home networks is secure.
10. Be suspicious of email attachments from unknown sources, if you do not know
or recognize the sender of the email, do not open the attachment.

15
V. Reflection: Write your answers on your journal/ notebook.

Every moment that we have in our life is valuable, were we can exchange
ideas and thoughts for single transactions of data and information in a
technology era. Therefore, it is vital to have a safe computer network operation
that needs to be done just to preserve the data integrity, availability and
confidentiality of the information we shared.

a. What insights have you gained from this topic?

b. What significant values have you established while doing your


Computer Network Operations Maintenance Checklist?

c. What difficulties did you encounter and how did you overcome
them?

16
17
Assessment
1. True
2. True
3. False
4. True
5. True
6. False
7. False
8. True
9. False
10. True
Activity 1 & 2
Answers will vary according
to student’s output.
Answer Key VI.

You might also like