7 - CBLM

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 19

Computer System Servicing NC II

COMPETENCY-BASED LEARNING MATERIALS

Sector : Electronics
Qualification Title : Computer System Servicing NCII
Unit of Competency : Set-up Computer Servers
Module Title : Setting-Up Computer Servers

Technical Education & Skills Development Authority


Jacobo Z. Gonzales Memorial School of Arts and Trades
San Antonio, Binan Laguna

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 1 of 19
Server Noli L. Parol
Revision # 00
TABLE OF CONTENTS

Table of Content……………………………………………………………….. 2
How to use this Competency Based Learning Materials………………. 3
List of Competency…………………………………………………………… 4
Learning Outcome Summary……………………………………………….. 5
Learning Experiences………………………………………………………… 7
Information Sheet No. 2.3-1………………………………………………….. 8
Task Sheet 2.3-1……………………………………………….…..….. 9
Performance Criteria Checklist 2.3-1….…………………………… 10
Information Sheet No. 2.3-2………………………………………………….. 11
Self Check 2.3-2………………..……………………………………… 17
Answer Key 2.3-2……………………………………………………….18
Operation Sheet 2.3-2…………………………………………………. 19
Performance Criteria Checklist 2.3-2…….………………………… 22
Information Sheet 2.3-3……………………………………………………….. 23
Self Check 2.3-3………………………………………………………… 30
Answer Key 2.3-4……………………………………………………….32
Task Sheet 2.3-4………………………………………………………... 33
Performance Criteria Checklist 2.3-4………………………………34
Bibliography…………………………………………………………………… 35

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 2 of 19
Server Noli L. Parol
Revision # 00
HOW TO USE THIS COMPETENCY BASED LEARNING
MATERIAL

Welcome to the module in Setting-up Computer Servers. This


module contains training materials and activities for you to complete.
The unit of competency “Set-up Computer Servers " contains
knowledge, skills and attitudes required for Computer System Servicing
NC II.
You are required to go through a series of learning activities in order
to complete each learning outcome of the module. In each learning outcome
are Information Sheets, Self-Checks, Task Sheets, Operation Sheets
and Job Sheets. Follow these activities on your own. If you have questions,
don’t hesitate to ask your facilitator for assistance.
The goal of this course is the development of practical skills. To gain
these skills, you must learn basic concepts and terminologies.
This module is prepared to help you achieve the required competency,
in “Setting-up Computer Servers ".
This will be the source of information for you to acquire knowledge
and skills in this particular competency independently and at your own
pace, with minimum supervision or help from your instructor.

Remember to:
 Work through all the information and complete the activities in each
section.
 Read information sheets and complete the self-check. Suggested
references are included to supplement the materials provided in this
module.
 Most probably your trainer will also be your supervisor or manager.
He/she is there to support you and show you the correct way to do
things.
 You will be given plenty of opportunity to ask questions and practice on
the job. Make sure you practice your new skills during regular work
shifts. This way you will improve both your speed and memory and also
your confidence.
 Use the Self-checks, Operation Sheets or Job Sheets at the end of each
section to test your own progress.
 When you feel confident that you have had sufficient practice, ask your
Trainer to evaluate you. The results of your assessment will be recorded
in your Progress Chart and Accomplishment Chart.

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 3 of 19
Server Noli L. Parol
Revision # 00
COMPUTER SYSTEM SERVICING NC-II

LIST OF CORE COMPETENCIES

No. Unit of Competency Module Title Code

Install and configure Installing and Configuring ELC724331


1.
computer systems Computer Systems

Set-up Computer Setting-up Computer ELC724332


2.
Networks Networks

Set-up Computer Setting-up Computer ELC724333


3.
Servers Servers

Maintain and Repair Maintaining and Repairing


ELC724334
4. Computer Systems and Computer Systems and
Networks Networks

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 4 of 19
Server Noli L. Parol
Revision # 00
MODULE CONTENT

QUALIFICATION TITLE : Computer System Servicing NCII


UNIT OF COMPETENCY: Set-up Computer Servers

MODULE TITLE : Setting-up Computer Servers


INTRODUCTION
This unit covers the knowledge, skills and attitudes needed to set-up
computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform
testing, documentation and pre-deployment procedures..
LEARNING OUTCOMES
Upon completion of this module, the trainees/students must be able to:
LO 1. Set-up user access
LO 2. Configure network services
LO 3. Perform testing, documentation and pre-deployment procedures

ASSESSMENT CRITERIA:

1. Creates user folder in accordance with network operating system


(NOS) features
2. Configures user access level based on NOS features and established
network access policies/end-user requirements
3. Performs security check in accordance with established network
access policies/end-user requirements
4. Checks normal functions of server in accordance with manufacturer’s
instructions
5. Install and updates required modules /add-ons on NOS installation
procedures
6. Confirms network services to be configured based on user/system
requirements
7. Checks operation of network services based on user/system
requirements
8. Response to unplanned events or conditions tin accordance with
established procedures
9. Undertake pre-deployment procedures based on enterprise policies
and procedures
10. Undertake operation and security check based on end-user
requirements
11. Prepare/completes according to enterprise policies and
procedures

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 5 of 19
Server Noli L. Parol
Revision # 00
LEARNING OUTCOME NO. 1 Set-up user access
Contents:

1. User Folder Creation


2. User Access Configuration
3. Network access security check

Assessment Criteria

1. Creates user folder in accordance with network operating system


(NOS) features
2. Configures user access level based on NOS features and established
network access policies/end-user requirements
3. Performs security check in accordance with established network
access policies/end-user requirements

Conditions
The trainees/students must be provided with the following:
1. Computer units
2. UTP cables

Assessment Method:

1. Written examination
2. Oral questioning
3. Demonstration/ direct observation of practical skills

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 6 of 19
Server Noli L. Parol
Revision # 00
LEARNING EXPERIENCES

Learning Outcome 1 Set-up user access

Learning Activities Special Instructions


Read Information sheet Answer Self Check 3.1-1
3.1-1 Compare Self Check to Answer Key 3.1-1
Perform Task sheet 3.1-1.
Performance Checklist 3.1-1)

Read Information sheet Answer Self Check 3.1-2


3.1-2 Compare Self Check to Answer Key 3.1-2
Perform Task sheet no.3.1-2.
Performance Check list 3.1-2

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 7 of 19
Server Noli L. Parol
Revision # 00
INFORMATION SHEET 3.1-1

User folder creation

Learning Objectives:
After doing this INFORMATION SHEET, YOU MUST be able to create user
folder with Network Operating System (NOS) features
User folder is the storage of files stored by the user to the computer
server.To be able to create a user folder, administrator of the server should
first install the Active Directory Domain Services and create a user account.
To install the ADDS, administrator should open command prompt and type
dcpromo to install ADDS, DNS and create a forest and domain. To create a
user account see Information Sheet 3.1-2 and Task Sheet 3.1-2.

Windows Server 2008 domain controllers don’t have to run the DNS service
locally. The only requirement is that the DNS servers support the service
record types required so that those domain controllers can be located as
needed.
The following list recounts some of the main features and advantages of
Active Directory:
Security: Information is stored in a secure form. Each object in Active
Directory has an access control list (ACL) that contains a list of
resources that may access it along with which access privileges are
granted to each such resource.
Query capabilities: Active Directory generates a global catalog to pro-
vide a flexible mechanism for handling queries. Any client that supports
Active Directory can query this catalog to request directory data.
Replication: Replication of the directory to all domain controllers in
a domain means easier access, higher availability, and improved fault
tolerance.
Extensibility: Active Directory is extensible, which means that new object
types can be added to a directory or existing objects can be extended. For
example, you could easily add a salary attribute or an employee ID to the
user object. (An attribute is extra information about an object.)

Once a user is created, user folder I automatically created upon the first log-
in of the user to a client computer.

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 8 of 19
Server Noli L. Parol
Revision # 00
Self-Check 3.1-1

1. What are the main features and advantages to the Active


Directory ?
2. What is ADDS?

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 9 of 19
Server Noli L. Parol
Revision # 00
Answer key 3.1-1
1. Security
Query Capabilities
Replication
Extensibility
2. Active Directory Domain Services

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 10 of 19
Server Noli L. Parol
Revision # 00
TASK SHEET 3.1-1
Title: Creating user folder with network operating system (NOS) features

Performance Objective: Creates user folder with network operating


system (NOS) features

Supplies/Materials : UTP cable, RJ 45

Equipment : Two Computer unit, with windows server OS


and Windows 7

Steps/Procedure:
1. On the server computer create a shared folder on drive C: or drive D:
2. On server manager, select Features, Group Policy Management,
Forest, Domains, (Domain name), Right click on Policy, Edit
3. Chooser User Configuration, Choose Policies
4. Choose Windows Setting
5. Choose Folder Redirection
6. Choose your directory to be redirect, press right click on your mouse
and select properties
7. Target Setting: Choose Basic
8. Under Root Path, type the share name of your folder
9. Click OK
10. Log-in to the client computer to automatically create User folder

Assessment Method:
Actual Demonstration / direct observation of practical skills

Performance Criteria Checklist 3.1-1


Computer Date Developed: Document No.
September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 11 of 19
Server Noli L. Parol
Revision # 00
CRITERIA
YES NO
Did you follow the directions correctly in….?
1. Creating shared folder
2. Creating a folder redirection
3. Log-in as user to automatically create user folder

INFORMATIN SHEET 3.1-2


Computer Date Developed: Document No.
September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 12 of 19
Server Noli L. Parol
Revision # 00
User Access Configuration and Network access Security
check

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure user access level based on (NOS) features and established
network access policies/end-user requirements
2. Security check is performed in accordance with established network
access policies/end-user requirements

Computers are typically used by more than one person. Even systems that
workers use exclusively on their desks allow system administrators to log on
locally. If these systems have computer accounts in the domain, it’s possible
for other users with domain accounts to log on to those systems as well. The
computer distinguishes between one person and another by employing a
security device called the user account object. Each user on a computer or
a network has a unique user account that contains details about the user,
such as his or her rights and restrictions to access resources and more. A
Windows Server 2008 domain-based user account contains, is linked to, or
is associated with the following items:
Password security: User accounts are protected by passwords so that only
authorized persons can gain access to the systems.
Permissions: Permissions are the access privileges granted to a user
account. These include group memberships and user-specific settings to
access resources.
Identification: A user account identifies a person to the computer system
and the network.
User rights: A user right is a high-level privilege that can be granted to
users or groups to define or limit their actions on a computer system.
Roaming: You can define user accounts so that a user can log on to any
system that is a member of a domain by using a domain user account
(certain users may be able to log on to local accounts in certain situations),
a Remote Access Service (RAS), or a gateway.
Environment layout: Profiles are user-specific and store information about
the layout, desktop, and user environment in general, unless they are
specifically restricted through the use of mandatory profiles. You can define
profiles so that they follow the user account no matter where the user gains
access on the network.

Auditing: Windows Server 2008 can track access and usage by domain user
accounts if that level of auditing has been enabled in the domain.

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 13 of 19
Server Noli L. Parol
Revision # 00
Access to Windows Server 2008 requires that users successfully
authenticate themselves with a domain user account. This means that when
a user with the proper permission level (not everyone has permission to log
on locally to all systems in a domain) sits down at a Windows Server 2008
system, he or she can log on at the local machine with a local account
(called an interactive logon) by pressing Ctrl+Alt+Delete to start the logon
process. Then the user must provide a valid username and password. He or
she may also log on to a domain user account in the same manner if the
server is a member of the domain. After the system verifies this information,
the user is granted access. When the user is finished, he or she can log out
and leave the system available for the next user to log on.

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 14 of 19
Server Noli L. Parol
Revision # 00
Self Check 3.1-2

Identify the following.

1. _________________________ are protected by passwords so that only


authorized persons can gain access to the systems.
2. _______________________ are the access privileges granted to a user
account. These include group memberships and user-specific settings
to access resources.
3. _______________________A user account identifies a person to the
computer system and the network.
4. _______________________has the right to add, delete and configures
user account.
5. ______________________ is a high-level privilege that can be granted to
users or groups to define or limit their actions on a computer system.

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 15 of 19
Server Noli L. Parol
Revision # 00
Answer Key 3.1-2
1. User Account
2. Permissions
3. Identification
4. Administrator
5. User Right

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 16 of 19
Server Noli L. Parol
Revision # 00
TASK SHEET 3.1-2
Title: User access configuration

Performance Objective: Configuring user access level based on (NOS)


features and established network access policies/end-
user requirements

Supplies/Materials : UTP cable, RJ 45

Equipment : Two Computer Unit, One with Windows Server 2008


R2 OS, One with Windows 7 OS

Steps/Procedure:
1. To get to Active Directory Users and Computers, choose Start> All
Programs? Administrative Tools> Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or
organization unit to which you want to assign this new account.
3. In the details pane, right click the group and then choose Properties.
4. On the Members tab, Click Add.
5. Fill in the following information.
6. Click the Next button to continue setting up this new user account
object.
7. Type the password for this account and confirm that password to the
system by retyping it.
8. Configure the password setting using the options described.
9. Click the Next button when you’re finished marking your selections.
10.Click the Finish button if everything is correct.

Assessment Method:
Actual Demonstration / direct observation of practical skills

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 17 of 19
Server Noli L. Parol
Revision # 00
Performance Criteria Checklist 3.1-2

CRITERIA
YES NO
Did you follow the directions correctly in….?
1. Logging in and switching user
2. Entering user name
3. Entering the password
4. Performing security check

Bibliography
Computer Date Developed: Document No.
September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 18 of 19
Server Noli L. Parol
Revision # 00
Training Regulation developed by TESDA.

Competency Base Curriculum developed by TESDA.

Cereal Systems Initiative for South Asia Phase II (CSISA). 2015. Operational
Manual for Mechanical Transplanting of Rice. International Rice Research
Institute.
PAES 143:2005 – Rice Drum Seeder - Specifications
PNS/PAES 151:2010 – Mechanical Rice Transplanter - Specifications
http://extension.psu.edu/business/ag-safety/health/e39
http://www.hse.gov.uk/toolbox/ppe.html
http://en.wikipedia.org/wiki/Personal_protective
http://en.wikipedia.org/wiki/Hearing
www.tesda.gov.ph

Computer Date Developed: Document No.


September, 2015
System Date Revised:
Issued by:
Servicing NC II September 2015 JZGMSAT Page
Set-up Computer Developed by: 19 of 19
Server Noli L. Parol
Revision # 00

You might also like