TECHNOLOGY LIVELIHOOD EDUCATION (ICT) Computer System Servicing (CSS) Quarter 1- Module 2

Total Page:16

File Type:pdf, Size:1020Kb

TECHNOLOGY LIVELIHOOD EDUCATION (ICT) Computer System Servicing (CSS) Quarter 1- Module 2 TECHNOLOGY LIVELIHOOD EDUCATION (ICT) Computer System Servicing (CSS) Quarter 1- Module 2 CONFIGURE COMPUTER SYSTEM AND NETWORKS Prepare Computer Systems, tools, devices, equipment and materials for configuration. TLE –ICT -CSS Grade 10 Alternative Delivery Mode Quarter 1 – Module 1: Configure Computer System and Networks First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this module are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Leonor Magtolis Briones Undersecretary: Diosdado M. San Antonio Development Team of the Module Writers: MYRAH S. ROSALES Editors: Teresita P. Mansueto, Ph. D Reviewers: Mary Jane Y. Cardente Illustrator: MYRAH S. ROSALES Layout Artist: MYRAH S.ROSALES Management Team: Chairperson: Arturo B. Bayocot, PhD, CESO III, Regional Director Assistant Chairperson: Randolph B. Tortola PhD, CESO IV, Schools Division Superintendent Shambaeh A. Usman, PhD, Assistant Schools Division Superintendent Mala Epra B. Magnaong, PhD, CLMD Chief Neil A. Improgo ,PhD Regional EPS LRMS Bienvenido V. Tagolimot,Jr. Regional ADM Coordinator Members: Elbert R. Francisco, PhD CID Chief Mary Jane Y. Cardente , EPS in TLE Rejynne Mary L. Ruiz of Division LRMS Manager Jeny B. Timbal PDO II Shella O. Bolasco, Division Librarian II Daryl T. Macario, Division ICT Coordinator Printed in the Philippines by Department of Education – Region X- Division of Bukidnon Office Address: Fortich St. Sumpong Malaybalay City Telefax: (088) 813-3634 E-mail Address: [email protected] 10 TECHNOLOGY LIVELIHOOD EDUCATION (ICT) Computer System Servicing (CSS) Quarter 1- Module 2 CONFIGURE COMPUTER SYSTEM AND NETWORKS Prepare Computer Systems, tools, devices, equipment and materials for configuration. This module was collaboratively developed and reviewed by educators from public schools. We encourage teachers and other educator stakeholders to email their feedback, comments and recommendation to the Department of Education at Bukidnon @deped.gov.ph We value your feedback and recommendations. iii Table of Contents Page COVER PAGE COPYRIGHT PAGE TITLE PAGE TABLE OF CONTENTS LO 1. Plan and Prepare for Configuration of Computer Systems and Networks What I Need to Know 1 What I Know 2-3 What’s in 4-5 What’s New 6-10 What is It 11-37 What’s More 38 What I Have Learned 39 What I Can Do 40 Assessment 42 Additional Activities 44 Key to Answers 46 References 48 Introductory Message For the facilitator: Welcome to the TLE -ICT -Computer System Servicing Alternative Delivery Mode (ADM) Module on Configure Computer Systems and Networks. This module was collaboratively designed, developed and reviewed by educators both from public and private institutions to assist you, the teacher or facilitator in helping the learners meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and economic constraints in schooling. This learning resource hopes to engage the learners into guided and independent learning activities at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st century skills while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: Notes to the Teacher and Parents This contains helpful tips or strategies that will help you in guiding the learners. As a facilitator you are expected to orient the learners on how to use this module. You also need to keep track of the learners' progress while allowing them to manage their own learning. Furthermore, you are expected to encourage and assist the learners as they do the tasks included in the module. To the Learners and Parents Welcome to the Technology Livelihood ICT- Computer System Servicing- Grade 10 Education Alternative Delivery Mode (ADM) Module on Configure Computer System and Networks. The hand is one of the most symbolized part of the human body. It is often used to depict skill, action and purpose. Through our hands we may learn, create and accomplish. Hence, the hand in this learning resource signifies that you as a learner is capable and empowered to successfully achieve the relevant competencies and skills at your own pace and time. Your academic success lies in your own hands! This module was designed to provide you with fun and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning resource while being an active learner. This module has the following parts and corresponding icons: Icons of the Module What I Need to This will give you an idea of the skills or Know competencies you are expected to learn in the module. This part includes an activity that aims to What I Know check what you already know about the lesson to take. If you get all the answers correct (100%), you may decide to skip this module. This is a brief drill or review to help you What’s In link the current lesson with the previous one. In this portion, the new lesson will be What’s New introduced to you in various ways such as a story, a song, a poem, a problem opener, an activity or a situation. This section provides a brief discussion What is It of the lesson. This aims to help you discover and understand new concepts and skills. This comprises activities for independent What’s More practice to solidify your understanding and skills of the topic. You may check the answers to the exercises using the Answer Key at the end of the module. What I Have Activities designed to process what you Learned have learned from the learner. This section provides an activity which What I Can Do will help you transfer your new knowledge or skill into real life situations or concerns. This is a task which aims to evaluate Assessment your level of mastery in achieving the learning competency. Additional In this portion, another activity will be Activities given to you to enrich your knowledge or skill of the lesson learned. This also tends retention of learned concepts. This contains answers to all activities in Answer Key the module. The following are some reminders in using this module: 1. Use the module with care. Do not put unnecessary mark/s on any part of the module. Use a separate sheet of paper in answering the exercises. 2. Don’t forget to answer What I Know before moving on to the other activities included in the module. 3. Read the instruction carefully before doing each task. 4. Observe honesty and integrity in doing the tasks and checking your answers. 5. Finish the task at hand before proceeding to the next. 6. Return this module to your teacher/facilitator once you are through with it. If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Always bear in mind that you are not alone. We hope that through this material, you will experience meaningful learning and gain deep understanding of the relevant competencies. You can do it! MODULE 2 Lesson 2 LO 2. Prepare Computer Systems, tools, devices, equipment and materials for configuration. What I Need to Know Welcome to the next level of your modular drill in Computer System Servicing (CSS) under the Information and Communications Technology (ICT) Course. In this module, you will have a boundless deal of understanding of Configuring Computer Systems and Networks. At the end of this module you will be able to apply the knowledge and skills on preparing Computer Systems, tools, devices, equipment and materials for configuration. The competency for this module is the following: LO 2. Prepare Computer Systems, tools, devices, equipment and materials for configuration. b.) Prepare procedures in planning and preparing for configuration of computer systems and networks; 1 What I Know Let’s check how familiar you are regarding Configuration in dealing computer. Enjoy and Learn new adventure. Pre Test A. General Directions: Read the items very carefully. Write your answer in your activity notebook. Test I. True or False Directions: State your agreement or disagreement with the statement below. Write True if you agree and False if you disagree. _______1. Configuration consist of both hardware and software components. _______2. The quality of performance and life of the computer or device depends on its configurations. _______3. Configuration is the way a system is set up. _______4. Most hardware and software applications have certain minimum configuration in order to provide the minimum performance. _______5. With the advent of plug and play technology most configurations can be performed automatically in the case of software configurations. _______6. The shortcut of Microsoft Configuration is Ipconfig. _______7. Boot log stores all information from the boot process. _______8. Registry is a collection of databases of configuration of database of configuration in Windows Operating System. _______9. Most important aspect of a configuration are the speed of the processor and size of storage graphical display and software drivers. _______10. Some of the built-in tools used in Microsoft system configuration involves Microsoft System Configuration, Register Edit, Direct X and Control Panel Applets. _______11.
Recommended publications
  • Windows Speed Secrets Unleashed
    Windows Speed Secrets Unleashed Free E -book Top 10 Ways to Speed Up Windows XP or Vista W W W . T U N E - Y O U R - P C . C O M Table of Contents Windows XP XP Speed Tip #1: Disable Startup Programs ..........................................................................2 XP Speed Tip #2: Increase Virtual Memory ............................................................................5 XP Speed Tip #3: Remove Spyware and Adware ...................................................................8 XP Speed Tip #4: Optimize Visual Effects ..............................................................................9 XP Speed Tip #5: Speed Up File Browsing ..........................................................................12 XP Speed Tip #6: Clean Your Windows Registry .................................................................13 XP Speed Tip #7: Enable Direct Memory Access (DMA) ......................................................14 XP Speed Tip #8: Cleanup Your Hard Disk ..........................................................................17 XP Speed Tip #9: Defrag Your Hard Disk .............................................................................19 XP Speed Tip #10: Disable File Indexing..............................................................................21 Windows Vista Vista Speed Tip #1: Disable Startup Programs .....................................................................22 Vista Speed Tip #2: Increase Virtual Memory .......................................................................25
    [Show full text]
  • Supporting Operating System Installation | 3
    cc01SupportingOperatingSystemInstallation.indd01SupportingOperatingSystemInstallation.indd PagePage 1 08/10/1408/10/14 4:334:33 PMPM martinmartin //208/WB01410/XXXXXXXXXXXXX/ch01/text_s208/WB01410/XXXXXXXXXXXXX/ch01/text_s Supporting Operating LESSON 1 System Installation 70-688 EXAM OBJECTIVE Objective 1.1 – Support operating system installation. This objective may include but is not limited to: Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multi-boot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE). LESSON HEADING EXAM OBJECTIVE Using a Troubleshooting Methodology Viewing System Information Using the Event Viewer Supporting Windows To Go Support Windows To Go Creating and Deploying a Windows To Go Workspace Drive Booting into a Windows To Go Workspace Managing Boot Settings Manage boot settings, including native virtual hard disk (VHD) and multi-boot Using BCDEdit and BCDBoot Configuring a Multi-Boot System Manage boot settings, including native virtual hard disk (VHD) and multi-boot Configuring a Native VHD Boot File Manage boot settings, including native virtual hard disk (VHD) and multi-boot Understanding VHD Formats Installing Windows 8.1 on a VHD with an Operating System Present Installing Windows 8.1 on a VHD Without an Operating SystemCOPYRIGHTED Present MATERIAL Managing Desktop Images Manage desktop images Capturing Images Modifying Images using DISM Customizing a Windows Installation by Using Windows PE Customize a Windows
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • PCI DSS Virtualization Guidelines
    Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011 Author: Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines Information Supplement • PCI DSS Virtualization Guidelines • June 2011 Table of Contents 1 Introduction ....................................................................................................................... 3 1.1 Audience ................................................................................................................ 3 1.2 Intended Use .......................................................................................................... 4 2 Virtualization Overview .................................................................................................... 5 2.1 Virtualization Concepts and Classes ..................................................................... 5 2.2 Virtual System Components and Scoping Guidance ............................................. 7 3 Risks for Virtualized Environments .............................................................................. 10 3.1 Vulnerabilities in the Physical Environment Apply in a Virtual Environment ....... 10 3.2 Hypervisor Creates New Attack Surface ............................................................. 10 3.3 Increased Complexity of Virtualized Systems and Networks .............................. 11 3.4 More Than One Function per Physical System ................................................... 11 3.5 Mixing VMs of
    [Show full text]
  • Guidelines for Designing Embedded Systems with Windows 10 Iot Enterprise
    Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise Version 2.0 Published July 15, 2016 Guidelines for designing embedded systems 1 CONFIDENTIAL Contents Overview .................................................................................................................................................................................................... 4 Building a task-specific experience ............................................................................................................................................ 4 General Group Policy settings ....................................................................................................................................................... 4 Application control ................................................................................................................................................................................ 5 Application boot options ................................................................................................................................................................. 5 Auto-boot Universal Windows apps ...................................................................................................................................... 5 Auto-boot Classic Windows apps ........................................................................................................................................... 5 Limit application access with AppLocker ...............................................................................................................................
    [Show full text]
  • Disk Cleanup
    LESSON 6 . 1 98-349 Windows Operating System Fundamentals Understand Backup and Recovery Methods LESSON 6 . 1 98-349 Windows Operating System Fundamentals Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: . Backup management . Backup options . Recovery methods LESSON 6 . 1 98-349 Windows Operating System Fundamentals Backup Management . Windows backup tools: Tool Description File Backup Windows Backup enables you to make copies of the data files for all the users on the computer. System Image Backup Windows Backup enables you to create a system image, which is an exact image of a drive. A system image includes Windows and your system settings, programs, and files. Previous Versions Previous Versions are copies of files and folders that Windows automatically saves as part of system protection. System Restore System Restore reestablishes the computer's system files to their state at an earlier point in time. LESSON 6 . 1 98-349 Windows Operating System Fundamentals Backup Management . Use Windows Backup and Restore to back up and recover files and folders. o Open Backup and Restore by clicking Start, Control Panel, System And Security, and then Backup And Restore. LESSON 6 . 1 98-349 Windows Operating System Fundamentals Backup Management (continued) . It is recommended to save backups to an external drive. You cannot save backups to the system drive. You can save backups to a network location. Windows will issue a warning if there is not enough drive space to store a system image. LESSON 6 . 1 98-349 Windows Operating System Fundamentals Backup Options . Let Windows Choose (Recommended)—Windows backs up data saved in libraries, desktop, and default Windows folders.
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]
  • The New York Society Library Presents
    The New York Society Library Presents: Intermediate Computers Ingrid Richter Computer Specialist & Webmaster COMPUTERS I INDEX INTRODUCTION Basic Windows Overview……………………………………………………………………… Page 03 Windows 98, ME, 2000, XP.........................................................….. Page 04 THE BASICS: My Computer........................................................................……… Page 05 Start Menu & Taskbar..........................................................……… Page 06 Control Panel.......................................................................……… Page 07 Windows Setup.....................................................................……… Page 08 FILE ORGANIZATION: Windows Explorer...................................................................... Page 09 SOFTWARE Backup..................................................................................... Page 10 DOS and file extensions………………………………………………………………………. Page 10 Calculator................................................................................. Page 11 HyperTerminal.......................................................................... Page 11 Notepad.................................................................................... Page 12 Wordpad................................................................................... Page 12 Paint......................................................................................... Page 13 TROUBLESHOOTING: Scanning Hard Drive.................................................................
    [Show full text]
  • MTA Windows Operating System Fundamentals Course
    MTA Windows Operating System Fundamentals Course Session 1 Section A: Introduction Windows Operating System Microsoft Certification Paths Knowledge Domains Exam Prerequisites Taking the Exam Exam Preparation Tips Section B: Windows OS DOS, the Precursor DOS Screens Windows 3.1 Windows 95 Windows NT Windows 7 Windows Evolution Basic OS Architecture Rings in Windows Section C: Windows Interfaces Identifying Windows Interfaces Desktop/Taskbar GUI Overview Command Prompt PowerShell Section D: Planning Installations Exploring OS Editions Edition Upgrades OS Requirements Determining Requirements PC Upgrade Advisor Upgrade Paths Section E: Advanced Installation Topics Application Compatibility Topics Planning for Upgrades Installation Types Product Identification Keys Virtualization Virtualization Types Section F: Desktop Features Configuring Start Menu Customizing Start Menu Adding Administrative Tools Configuring Taskbar Notification Area Section G: Configuring the Interface User Profiles Gadgets Changing Display Settings Aero Session 2 Section A: Using Native Applications Notepad WordPad Calculator Internet Explorer Gallery Snipping Media Center and Player Section B: Configuration Settings Msconfig General Settings Boot Config Services Tab Blue Screen of Death Tools Tab System Information App Section C: The Control Panel Applets Control Panel Categories Control Panel Views Super Control Panel Section D: Control Panel Applets Control Applets Ease of Access Center Default Programs
    [Show full text]
  • Windows SIG 011315 Links to Explore
    Windows SIG 011315 Links to Explore • From Jane Rankin a great article on “Ransomware”… http://www.usatoday.com/story/money/personalfinance/2015/01/11 /computer-hacker-ransomware-malware-sony/21397777/ • From Doug Steinke links to Computer Club “archive” regardsing “Malware Prevention & Removal”… https://www.sctxca.org/suncity/clubs- groups/sites/computer/archive/monday-pgms/2015Meetings.html • From Bill Andrews a new invention… https://www.youtube.com/embed/9J7GpVQCfms From Barb Resnick – Yet Another Phishing Email New Year… Time for Resolutions • At least annually you should vow to make your Windows installation the best that it can be • An essential Windows skill, is knowing how to access “safe mode” because many operations are best performed in Safe Mode • Accessing Safe Mode is exacerbated because it varies by operating system • At the first SIG of 2015 we will show: How to access Safe Mode in “all” Windows systems, and We will introduce a “Windows Tweaking” tool that has proven to be vary successful in the Help Center, for resolving a variety of problems and or improving the performance of Windows What is Windows “Safe Mode” Safe mode is a option for Windows that starts your computer in a “limited state”. Only the basic files and drivers necessary to run Windows are started and if you access Safe mode properly, The words Safe Mode will appear in the bottom corner of your monitor to identify which Windows mode you're using. Accessing Safe Mode permits a User to run applications that either will not run in “regular” mode or are best
    [Show full text]
  • INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8
    INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8 INFORMATION TECHNOLOGY CONCEPTS (391) —OPEN EVENT— REGIONAL – 2019 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS _________ (100 points) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. No more than sixty (60) minutes testing time Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program competition. INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 2 of 8 MULTIPLE CHOICE Identify the choice that best completes the statement or answers the question. Mark A if the statement is true. Mark B if the statement is false. 1. Which of the following appears on the right side of any Windows 8 screen when you move your pointer to a right corner? A. Live tile B. Memory Manager C. Charms bar D. System tray 2. Which element of the Windows 7 GUI gives windows a glassy appearance, but also consumes more hardware resources? A. Control panel B. Aero user interface C. Charms interface D. Logic interface 3. The top of a top-down hierarchical structure of subdirectories is called which of the following? A.
    [Show full text]
  • Security Program Blocking Driver Download a Driver Can't Load on This Device
    security program blocking driver download A driver can't load on this device. You are receiving this message because the Memory integrity setting in Windows Security is preventing a driver from loading on your device. Here are a few options you can try if you want to be able to use this driver: See if an updated and compatible driver is available through Windows Update or from the driver manufacturer. If that doesn’t work, try turning off the Memory integrity setting in Windows Security. Warning: If you choose to continue using your device without addressing the driver problem, you might discover that the functionality the driver supports does not work any longer, which could have consequences ranging from negligible to severe. To turn off the memory integrity setting. Go to the Core isolation page in Windows Security. Turn the Memory integrity setting Off if it isn’t already. You'll need to restart your computer for the changes to take effect. You can also open the Core isolation page by selecting Start > Settings > Update & Security > Windows Security > Device Security and then under Core isolation , selecting Core isolation details . Though the driver has a minor vulnerability that’s preventing it from loading, it’s most likely not malicious in any way. The driver name and company name that appear in the notification are the only reliable pieces of information that we have been able to gather about the driver. If an updated driver is unavailable from the driver manufacturer, it might be a good idea to contact them and inquire whether a fix is coming soon.
    [Show full text]