CSS 12 2ndqtr
CSS 12 2ndqtr
CSS 12 2ndqtr
SELF-LEARNING MODULE
Dear Learner,
Welcome to a brand-new year of learning!
This is our gift to you: The Division initiated Self Learning Module (SLM) that will
help you acquire the most essential learning competencies you needed as 21 st Century
Learner through the Pivot
4 A IDEA Model which compose of 10 parts.
The teacher presents activities, tasks, contents of value and interest to the
learners. This shall expose the learners on what he/she knew, what he /she
What is in does not know and what she/he wanted to know and learn. Most of the
activities and tasks must simply and directly revolved around the
What is it concepts to develop and master the skills or the MELC.
The teacher allows the learners to be engaged in various tasks and
What is more opportunities in b u i l d i n g their KSA’s to meaningfully connect their
Engagement
learnings after doing the tasks in the D. This part exposes the learner
to real life situations /tasks that shall ignite his/ her interests t o meet
What I can do
the expectation, make their performance satisfactory or produce a
What else I can do product or performance which lead him/ her to understand fully the
skills and concepts .
The teacher brings the learners to a process where they shall
What I have learned
Assimilation
Please take time to read and do the activities in these SLM as if you are reporting
in school. Set a regular study schedule for you as much as possible, but keep in mind that
these SLM will enable you to learn at your own pace. If you do not understand a lesson, the
SLM would not mind you flipping back the pages repeatedly for review. Also, remember to
keep in touch with your teachers. Send them a message through your online sessions or write
them a note as you do your modular activities.
We wish you good luck in your studies, and we hope that you will remain happy and
enthusiastic in learning!
CONFIGURE NETWORK SERVICES
WEEK
1-2 LESSON 2.3
Learning Task 1:
Direction: Read each item carefully and use yellow paper to write your answers.
Write TRUE if the statement is correct and FALSE if otherwise.
___________ 1. In every personal computer, it is necessary to install a network
driver.
___________ 2. The default subnet mask is, 255.255.0.0.
___________ 3. Assigning an IP Address must be unique.
___________ 4. In setting up Time, you can set time automatically.
___________ 5. DHCP is a Command Prompt command used to test the ability
of the source computer to reach a specified destination computer.
___________ 6. The key to a well-tuned computer system is the proper
configuration.
___________ 7. In installing a network driver, compatibility on PC must be
considered.
___________ 8. IP addressing is a number that is used to identify a device on the
network.
___________ 9. The shortcut of Microsoft Configuration is Ipconfig.
___________10. Configuration is the way a system is set up.
Learning Task 2 :
Direction: Identify what is being asked. Write your answers in yellow paper.
_________1. It is a number that is used to identify a device on the network.
_________2. It is the way a system is set up.
_________3. The IP address class which indicates that the first octet of the IP
address is the network portion.
_________4. The IP address class which indicates that the first two octets of the
IP address are the network portion.
_________5. This indicates the network portion of an IP address.
_________6. It is the 32 binary bits which are grouped into four 8-bit bytes.
_________7. An IP address class which is reserved for research use only.
_________8. The address 255.255.255.0 belongs to what class of IP address?
_________9. An IP address class used for multicast groups.
_________10. A notation or a method of writing IP addresses with where value
of each byte is given as a decimal number, and each byte separated
by a dot.
System Configuration
Is the way a system is set up. It is the collection of components that make
up the system. Configuration can refer to either hardware or software, or the
combination of both. For instance, a typical configuration for a PC consists of
32MB (megabytes) main memory, a hard disk, a modem, a CD-ROM drive, a VGA
monitor, and the Windows Operating System.
Many software products require that the computer has a certain minimum
configuration. For example, the software might require a graphics display monitor
and a video adapter, a particular microprocessor, and a minimum amount of main
memory capacity.
When you install a new device or program, you sometimes need to
configure it, which means that you need to set various switches and jumpers (for
hardware) and to define values of parameters (for software). For example, the
device or program may need to know what type of video adapter you have and
what type of printer is connected to the computer.
IP Addressing
An IP address is a number that is used to identify a device on the network. Each
device on a network must have a unique IP address to communicate with other
network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address
within the same network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a
label or address for the person’s physical aspect—the body. A person’s mailing
address, on the other hand, relates to where the person lives or picks up mail.
This address can change. On a host, the Media Access Control (MAC) address
is assigned to the host Network Interface Card (NIC) and is known as the physical
address. The physical address remains the same regardless of where the host is
placed on the network in the same way that fingerprints remain with someone
regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very
difficult for humans to read a binary IP address. For this reason, the 32 bits are
grouped into four 8-bit bytes called octets. An IP address, even in this grouped
format, is hard for humans to read, write, and remember. Therefore, each octet is
presented as its decimal value, separated by a decimal point or period. This
format is called dotted-decimal notation. When a host is configured with an IP
address, it is entered as a dotted-decimal number, such as 192.168.1.5. The
logical 32-bit IP address is hierarchical and is composed of two parts. The first
part identifies the network, and the second part identifies a host on that network.
Both parts are required in an IP address. For example, if a host has an IP address
of 192.168.18.57, the first three octets, 192.168.18, identify the network portion
of the address, and the last octet, 57, identifies the host. This is called hierarchical
addressing, because the network portion indicates the network on which each
unique host address is located. Routers only need to know how to reach each
network, not the location of each individual host.
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a
LAN use the same subnet mask. Table 1 shows default subnet masks for usable
IP addresses that are mapped to the first three classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is
the network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion
Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are
reserved for research use only.
Learning Task 3 :
Direction: Read each item carefully and use yellow paper to write your answers.
Write TRUE if the statement is correct and FALSE if otherwise.
_______ 1. A server can run on a workstation computer.
_______ 2. Network services do not include messaging.
_______ 3. UTP is the cheapest cabling choice.
_______ 4. Wireless networking is insecure.
_______ 5. A hub connects two different LANs.
Learning Task 4 :
I have learned
that_____________________________________________________________
________________________________________________________________
I have realized
that_____________________________________________________________
________________________________________________________________
I will apply
________________________________________________________________
________________________________________________________________
Learning Task 5 :
Direction: Identify what is being asked. Write your answers in yellow paper.
_________1. It remains the same regardless of where the host is placed on the
network in the same way that fingerprints remain with someone
regardless of where he or she goes.
_________2. An IP address class which is reserved for research use only.
_________3. A notation or a method of writing IP addresses with where value of
each byte is given as a decimal number, and each byte separated
by a dot.
_________4. The IP address class which indicates that the first two octets of the
IP address are the network portion.
_________5. This indicates the network portion of an IP address.
_________6. It is the 32 binary bits which are grouped into four 8-bit bytes.
_________7. It is the way a system is set up.
_________8. The IP address of class B in subnet mask which indicates that the
first octet of the IP address is the network portion.
_________9. An IP address class used for multicast groups.
_________10. The IP address of class A in subnet mask which indicates that the
first octet of the IP address is the network portion.
Learning Task 1: Learning Task 2 : Learning Task 3 :
1. True 1. IP Address 1.True
2. True 2. System 2.False
3. True Configuration 3.True
4. True 3. Class A 4.True
5. False 4. Class B 5.False
6. True 5. Subnet Mask
7. True 6. Octets
8. True 7. Class E
9. False 8. Class C Learning Task 4 :
10. True 9. Class D 1. Answers may vary
10.Dotted-decimal 2. Answers may vary
Notation 3. Answers may vary
Learning Task 5 :
1. Physical Address
2. Class E
3. Dotted-decimal Notation
4. Class B
5. Subnet Mask
6. Octets
7. System Configuration
8. 255.255.0.0
9. Class D
10.255.0.0.0
Answer Key
WEEK CONFIGURE NETWORK SERVICES
3-4
LESSON 2.4
Learning Task 1:
Learning Task 2 :
Direction: Give the expanded form of the following acronyms. Write your answer
in yellow paper.
1. TCP/IP 6. ISP
2. APIPA 7. NIC
3. DNS 8. ICMP
4. DHCP 9. LAN
5. MAC 10. IP
IpConfig
Ipconfig is a command used to find out the IP address of a certain network you
are connected to.
How to use the ipconfig command?
1. Click on Start Button, then type cmd (command prompt) on the search box.
2. A black screen will appear as shown in the figure below.
3. Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of a
network you are connected to.
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.
6. Type the IP address for your computer. Enter the appropriate IP Address in the
IP address section.
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your computer find
web pages and other addresses on the internet.
10. Type the address for the alternate DNS server. The alternate Domain Name
System (DNS) server’s IP address is something that your ISP provides.
Learning Task 3 :
Direction: Answer the following questions briefly and write your answer in yellow
paper.
1. What is an IP address? Explain.
2. Discuss the 4 classes of IP address.
3. Why is it necessary to assign IP address?
4. Compare static IP address from a dynamic IP address.
Learning Task 4 :
I have learned
that_____________________________________________________________
________________________________________________________________
I have realized
that_____________________________________________________________
________________________________________________________________
I will apply
________________________________________________________________
________________________________________________________________
Learning Task 5 :
Directions: Choose the best letter of your answer and write it on you notebook.
1. Which two components are configured via software in order for a PC to
participate in a network environment?
a. MAC address and IP address c. IP address and kernel
b. shell and subnet mask d. IP address and subnet mask
2. Which of the following IP addresses is public?
a. 10.1.1.1 c. 172.16.4.4
b. 128.107.0.7 d. 192.168.5.5
3. Which of the following class of IP provides a maximum of only 254 host
addresses per network ID?
a. Class A c. Class C
b. Class B d. Class D
4. There is _____ Classes of IP address version 4.
a. 5 b. 4 c. 3 d. 2
5. What range of addresses can be used in the first octet of a Class C address?
a. 129-192 c. 1-127
b. 192-223 d. 204-223
6. Which of the following is the INCORRECT IP address?
a. 213.231.56.4 c. 253.251.256.0
b. 176.9.59.4 d. 188.40.139.40
7. The IP 123.213.321.1 belongs to what class?
a. Class A b. Class B c. Class C d. None of these
8. To which IP Class does 236.128.192.142 belong?
a. Class A b. Class B c. Class C d. Class D
9. Which option shows the proper notation for an IPv6 address?
a. 2001,0db8,3c55,0015,abcd,ff13 c. 2001.0db8.3c55.0015.abcd.ff13
b. 2001-0db8-3c55-0015-abcd-ff13 d. 2001:0db8:3c55:0015::abcd:ff13
10. Which device should be used for enabling a host to communicate with another
host on a different network?
a. switch b. hub c. router d. host
Learning Task 1: Learning Task 2 : Learning Task 3 :
1. Transmission Control
1. A Protocol/Internet Protocol 1. Answers may vary
2. Automatic Private IP 2. Answers may vary
2. C Addressing 3. Answers may vary
3. Domain Name System 4. Answers may vary
3. C
4. Dynamic Host
4. D Configuration Protocol
5. Media Access Control
5. A 6. Internet Service Protocol Learning Task 4 :
7. Network Interface Card 1. Answers may vary
8. Internet Control Message 2. Answers may vary
Protocol 3. Answers may vary
9. Local Area Network
10.Internet Protocol
Learning Task 5 :
1. D
2. B
3. C
4. A
5. B
6. C
7. D
8. D
9. D
10. C
Answer Key
PERFORM TESTING, DOCUMENTATION,
WEEK AND PREDEPLOYMENT PROCEDURES
5-8
LESSON 3
The previous lesson discussed about the network operating system and the
procedures on setting up peer to peer network. Can you still remember them? If
so, please take time to mentally recall some of the previous topics by answering
the following questions:
Learning Task 1:
Multiple Choice. Select the letter of the correct answer and write in yellow paper.
1. Servers handle requests for other domains.
a. directly b. by contacting remote DNS server
c. it is not possible d. none of the above
2. Strong passwords are strings of at least eight characters of upper and lower
case letters and numbers.
a. True b. False
3. DNS database contains
a. name server records b. hostname-to-address records
c. hostname aliases d. all of the above
4. A domain controller (DC) is a server that handles all the security request from
other computers and servers within the Windows Server domain.
a. True b. False
5. After obtaining the IP address, to prevent the IP conflict the client may use
a. Internet Relay Chat b. Broader Gateway Protocol
c. Address Resolution Protocol d. None of the above
6. A DNS client is called?
a. DNS updater b. DNS resolver
c. DNS handler d. None of the mentioned
Learning Task 2 :
Functions of Server
In the 1980s, the term client/server was invented to describe a distributed
computing paradigm in which server processes query for resources from client
applications. In essence, client/server is a partnership between processes
operating on different machines interconnected by a network of computers. The
server process is the service provider and the user process is a client, because
in terms of hardware and applications, there is a simple distinction of roles.
Server Hardware
A server computer on a client/server network can be considered both
hardware and software. In terms of hardware, a dedicated server computer is
typically a personal computer or workstation. However, a server may be required
to service dozens or even hundreds of clients at the same time, so it typically has
a faster processor, more memory, and more storage space than a client
computer.
Server Software
A server computer runs a special operating system, such as Microsoft
Windows Server, Linux, or Unix, that is designed specifically to facilitate the
sharing of its resources. Depending on the exact operational function, a server
can allow users to share files and printers over a network and provide access to
the Internet. If resources are on more than one server, individual servers can
specialize in one task -- or provide redundancy or duplication of function – in the
event of server failure.
Client
A client computer is typically a regular personal computer running an
operating system such as Windows XP, Windows Vista, or Windows 7. The
operating system includes the client software, such as electronic mail and Internet
browsing software, which allows the client computer to access and interact with
the resources shared by the server. A client computer only communicates directly
with servers, not other clients. It is, however, capable of information processing,
a fact that distinguishes it from the dumb terminal used in centralized, mainframe
computing systems.
Network Services
Network Services/Managed Network Services are the services of
management of networks by IT service providers for their clients. The scope of
network services extends from LAN/ WLAN management, unified
communications to Network Consulting Services and Network implementation
services. The term network services are used to describe a wide range of software
and connectivity tools that are managed by a central group and distributed to the
networked computers. A networked computer environment occurs when multiple
computers are connected to each other or a central server. The computers can
access shared files and utilities from a central location. There are several
advantages to this type of environment, ranging from increased quality control to
performance and issue management. There are four types of network services:
user management, email, printing, and system administration. In a networked
environment, the desktops are known as client computers or workstations. The
servers are typically stored in a special temperature-controlled room that is often
physically located in a different building or space than the workstation users.
Access is provided through network cables that are used to transmit data
packages within the network. These cables also provide access to the Internet,
typically after being routed through a central server or network switch.
Remote Access
A remote access server is the computer and associated software that is
set up to handle users seeking access to network remotely. Sometimes called a
communication server, a remote access server usually includes or is associated
with a firewall server to ensure security and a router that can forward the remote
access request to another part of the corporate network. A remote access server
may include or work with a modem pool manager so that a small group of modems
can be shared among many intermittently present remote access users. A remote
access server may as part also be used of a virtual private network (VPN).
Domain Controller
A domain controller (DC) is a server that handles all the security requests
from other computers and servers within the Windows Server domain. Security
requests include requests to log in to another server and checking permissions
for various functions that need to be performed (e.g., accessing a file folder on a
server or modifying a file within a folder). The domain controller originated in
Windows NT and managed the access to various resources granted to users and
other servers with a username and password.
Web Services
The term Web services describes a standardized way of integrating Web-
based applications using the XML, SOAP, WSDL and UDDI open standards over
an Internet protocol backbone. XML is used to tag the data, SOAP is used to
transfer the data, WSDL is used for describing the services available and UDDI is
used for listing what services are available. Used primarily as a means for
businesses to communicate with each other and with clients, Web services allow
organizations to communicate data without intimate knowledge of each other’s IT
systems behind the firewall.
Database Services
Database Services are cloud computing service model that provides users
with some form of access to a database without the need for setting up physical
hardware, installing software or configuring for performance. All the administrative
tasks and maintenance are taken care of by the service provider so that all the
user or application owner needs to do is use the database. Of course, if the
customer opts for more control over the database, this option is available and may
vary depending on the provider.
Proxy Server
A proxy server is a computer that offers a computer network service to allow
clients to make indirect network connections to other network services. A client
connects to the proxy server, then requests a connection, file, or other resource
available on a different server. The proxy provides the resource either by
connecting to the specified server or by serving it from a cache. In some cases,
the proxy may alter the client’s request or the server’s response for various
purposes.
(You may practice or do the guided activity below only if you have the complete
equipment and tools for the job. If you have limited resources or none at all, please
familiarize the steps and wait for the appropriate time to practice them in school
with your teacher.)
2. Navigate to the Server Roles tab and press on the “Add Roles” button.
4. The Wizard will display a list of Roles. Choose the Active Directory Domain
Services Role.
5. The Active Directory Domain Services Role requires adding features to the
server. Click on “Add required features” on the appearing screen and then click
on next.
6. On the following screen click on Install and wait for the installation to finish.
When the installation finishes click on Close.
7. At this point the Active Directory Domain Services are not configured yet.
8. If we click on Active Directory Domain Services button we get to the following
screen. Our next step will be configuring Active Directory Domain Services using
dcpromo.exe.
10. Navigate to the following screen. Choose the “Create a new domain in a
new forest option” and click on next button.
11. Type in your Domain name.
12. Choose the oldest operating system in your network. This option exists for
backwards compatibility of different features.
13. If your Domain Controller is a stand-alone server you don’t have to choose
the DNS server option. If otherwise, it’s recommended to leave it checked.
14. Specify the folders that will contain the Active Directory controller database,
log files. And SYSVOL and click on Next.
15. Choose a password for Restore mode Administrator account. (This is not the
Domain Administrator account, this is an additional account used for recovery)
16. When the wizard finishes configuring the settings reboot your server.
17. After rebooting when you first log on the server is not going to accept your
machine Administrator account.
18. In order to solve this issue you need to choose the “Switch User” button and
login with your Domain Administrator account which is basically the same user
account and password but now it belongs to a domain the domain name is
needed. For example: PPSP2010\Administrator.
Learning Task 3 :
I have learned
that_____________________________________________________________
________________________________________________________________
I have realized
that_____________________________________________________________
________________________________________________________________
I will apply
________________________________________________________________
________________________________________________________________
Direction: Identify what is being asked in the following statements. Write your
answers in your notebook.
_________1. A server computer on a client/server network that can be considered
both hardware and software.
_________2. A server computer that runs a special operating system, such as
Microsoft Windows Server, Linux, or Unix, that is designed
specifically to facilitate the sharing of its resources.
_________3. It is typically a regular personal computer running an operating
system such as Windows XP, Windows Vista, or Windows 7.
_________4. These are the services of management of networks by IT service
providers for their clients.
_________5. It is the computer and associated software that is set up to handle
users seeking access to network remotely.
_________6. It is a server that handles all the security requests from other
computers and servers within the Windows Server domain.
_________7. The standardized way of integrating Web-based applications using
the XML, SOAP, WSDL and UDDI open standards over an Internet
protocol backbone.
_________8. These are cloud computing service model that provides users with
some form of access to a database without the need for setting up
physical hardware, installing software or configuring for
performance.
_________9. It is a computer that offers a computer network service to allow
clients to make indirect network connections to other network
services.
_________10. It provides the resource either by connecting to the specified
server or by serving it from a cache.
Learning Task 1: Learning Task 2 :
ACROSS
1. B 2. PROXY
3. REMOTEACCESS
2. A
DOWN
3. D 1. DCPROMO
4. CLIENT
4. A 5. DOMAINCONTROLLER
5. C
6. B
Learning Task 4 :
1. Server Hardware
Learning Task 3 : 2. Server Software
1. Answers may vary 3. Client
4. Network Services
2. Answers may vary
5. Remote Access
3. Answers may vary 6. Domain Controller
7. Web Services
8. Data Services
9. Proxy server
10.Proxy
Answer Key
References
Lesson 1:
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTE
R_SYSTEMS_AND_NETWORKS_Content_Standard_Performance_Standard
Lesson 2:
https://www.premiumexam.net/ccna-2-v6-0-rse/ccna-2-rse-6-0-pretest-exam-
answers-2018-2019-100/
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTE
R_SYSTEMS_AND_NETWORKS_Content_Standard_Performance_Standard
http://www.certiology.com/quizzes/ip-address-classes-quiz.html
Lesson 3:
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTE
R_SYSTEMS_AND_NETWORKS_Content_Standard_Performance_Standard
How P2P (Peer to Peer) File Sharing Works. (Accessed 12 November 2020)
https://www.makeuseof.com/tag/p2p-peer-peer-file-sharing-works/
Server 2008 R2: Configuring your server OS to client OS (look and feel) user
experience. (Accessed 12 November 2020)
https://support.ncomputing.com/portal/en/kb/articles/server-2008-r2-configuring-
your-server-os-to-client-os-look-and-feel-user-experience
Address: DepEd Bldg., Osmeña Street, Poblacion II, City of Cabuyao, Laguna