Sie sind auf Seite 1von 115

ICT - Grade 10

Course description
This course contains basic concepts in ICT for grade 10.
Modules in this course

 Personal Entrepreneurial
 Environment and Market
 Configuring Computer Systems and Networks
 Maintaining Computer and Network Systems

Personal Entrepreneurial
6 topics60 questions
Topics under this module

 Relevance of the Course


 The Opportunities in Computer Hardware Servicing as a Career
 Basic Concepts in Computer Hardware Servicing
 Areas for Improvement, Development and Growth
 Aligning One’s PECs According to His/Her Business/Career Choice
 A Plan of Action That Ensures Success of His/Her Business/Career Choice

Objective
At the end of this lesson, you should be able to discuss the relevance of the course.

In a world where almost every activity is assisted by technology, it’s no wonder that most business
ventures are somewhat related to information technology. One of the businesses that was able to
make its mark is computer hardware servicing. This is an industry whose main line of business is to
sell computer hardware systems and components, as well as servicing in the installation of computer
systems and networks.

Learn about it!


This course is designed to enlighten the readers on the importance of understanding the basic
concepts of establishing a computer hardware servicing business in order to achieve success in it.
Being able to understand these concepts will help in guiding an individual if he intends in engaging
into a business venture that is concerned with computer hardware servicing in the future.

The important topics that will be discussed in this course are as follows:

1. Basic concepts of CHS business – this will tackle all the necessary information and facts
about a computer hardware servicing business.
2. Opportunities in a CHS business– this will discuss the different prospects that are available
for a CHS business.
3. Assess your own CHS competencies – being able to assess one’s competencies will help
determine whether an aspiring entrepreneur in the CHS business will be able to manage it
correctly.
4. Assess the practitioner’s CHS competencies – this refers to the CHS knowledge and skills of
those people who are already engaged into a similar line of business that an aspiring
individual would want to venture.
5. Compare the practitioner’s CHS Competencies – this topic discusses the careful comparison
of the CHS competencies an individual possess with those of an actual practitioner in the
same line of business.
6. Aligning of your CHS competencies – this topic is intended to streamline whatever CHS
competencies an individual possesses to fully utilize them in establishing a computer
hardware servicing business.

The above mentioned topics explains how relevant this course is in the establishment of a computer
hardware servicing business. An individual who is determined to come up with a CHS business that
will surely be successful must be able to grasp the ideologies and principles that will be discussed in
this course.

Which of the following statements is true about a computer hardware servicing business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Aside from servicing a computer system, what else can a startup CHS business install and maintain?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following topics will discuss the most rudimentary principles of a CHS business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Which of the following is considered an opportunity in a CHS business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Why is it important to assess one’s CHS competencies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Why is it important to assess a practitioner’s CHS competencies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What step must be taken after assessing both of the aspirant’s and practitioner’s CHS competencies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What is the importance of aligning one’s CHS competencies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What term is used to pertain to a person who is engaged in the same line of business that one is trying to establish?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which of the following can be considered as a CHS competency?


The Opportunities in Computer Hardware Servicing as a Career

 Lesson5 chapters
 Questions

 Objectives
 In this lesson, you will be able to explore opportunities in computer hardware servicing as a
career.

 The Computer Hardware Servicing National Certificate Level II (NC II) Qualification


consists of competencies that must have to allow making a diagnosis and troubleshooting
problems in PC systems, software, restoring parts, and making the system back to normal
function. A person who has achieved this qualification is competent to be a computer service
and repair technician.

Learn about it!


The demand for computer service and repair technician is growing in every organization and
industry. For many, this is the entry point for a career in the computer/information field. The
responsibilities of a computer service and repair technician include a variety of duties. Most
companies that employ someone with this title expect the technician to have basic across-the-board
knowledge of concepts in the computer electronics field. Some of the tasks are hardware repair and
installation; software installation, upgrade and configuration; and troubleshooting client and/or server
problems. Today’s technicians are capable of viewing desktop and sharing control of mouse and
keyboard through remote assistance. Because the computer field is changing rapidly, technicians
must work to remain abreast of current technology and become aware of future developments.
Computer service and repair technicians generally work with a variety of users, which require expert
people skills, especially the ability to work with groups of nontechnical users.

Work Activities

You would refurbish, maintain, and install computer systems and equipment as a computer service
and repair technician.
Your everyday job would consist of the following:

 Setting up new IT systems


 Improving existing hardware and software
 Going to see home users to fix their PCs and other defective equipment
 Testing systems to ensure that they are working in good condition
 Servicing peripherals like printers, scanners, and other office equipment
 Preparing cost estimates
 Performing routine administration, like managing staff rotas.

Conditions

Your job would require travelling to go to see clients on site as a field technician. You would be
assigned at an office but would expend time with staff at their workplaces in an IT support
department.
Skills, Interests, and Qualities

You should possess the following skills, interests, and qualities to become a computer service and
repair technician:

 Profound knowledge of hardware, commonly used software, and operating systems


 Excellent skills in communication and customer service
 Superb problem-solving skills
 Patient and systematic approach
 Capable to meet deadlines
 Motivation to keep abreast with IT developments
 Deep understanding of electrical safety issues

Keypoints
 A person who has achieved the Computer Hardware Servicing National Certificate Level II
(NC II) Qualification is competent to be a computer service and repair technician.
 The demand computer service and repair technician is growing in every organization and
industry. For many, this is the entry point for a career in the computer/information field.
 You would refurbish, maintain, and install computer systems and equipment as a computer
service and repair technician.
 Question
 Identify if the following statement is true or false.
 A person who has achieved Computer Hardware Servicing National Certificate Level II Qualification is
competent to be a computer service technician or a computer repairman.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 Identify if the following statement is true or false.
 Computer Hardware Servicing is the entry point for a career in the computer/information field.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 Identify if the following statement is true or false.
 Because the computer field is changing rapidly, computer service and repair technicians must work to
remain updated in current technology and become oblivious of future developments.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 Identify the following statement is true or false.
 Today, computer service and repair technicians are capable of viewing desktop and sharing control of
mouse and keyboard through remote assistance.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 Identify the following statement is true or false.
 Most companies that employ computer service and repair technicians expect the technician to have a basic
knowledge in computer electronics.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 Identify the following statement is true or false.
 A computer service and repair technician should have an awareness of electrical safety issues.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Single Answer
 Question
 Identify the following statement is true or false.
 In an IT support department, your job would involve travelling to visit clients on site.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 Identify the following statement is true or false.
 Computer service and repair technicians generally work with a variety of users.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 Identify the following statement is true or false.
 A computer service and repair technician should be timid.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 Identify the following statement is true or false.
 A computer service and repair technician should have the ability to meet deadlines.
Basic Concepts in Computer Hardware Servicing

Objectives
In this lesson, you will learn how to explain basic concepts in computer hardware servicing.

The primary purpose of Computer Hardware Servicing is to provide you with the knowledge and
skills that will help you become computer hardware technicians.

Learn about it!


Computer System

A computer system consists of set of electronic and electromechanical components able to accept
some form of input, process this input in a way that can be specified by means of a set of
instructions, and produce some type of output. All computers follow the same fundamental
sequence:

1. They accept instructions and data. This represents the input.


2. They process the data according to a set of instructions.
3. They produce results in the form of information or actions. This represents the output.

A computer system comprises both “hardware” and “software” systems.

Hardware represents the electronic circuits and/or electromechanical components from which the
computer is constructed.

The basic computer consists of:

 Devices such as a keyboard, mouse, and display through which we interact with the
computer.
 In this respect we provide input to the machine via the keyboard and mouse and observe the
results of the computational process by means of the display screen.
 A central processing unit (CPU), which is able to follow (‘execute’) a series of instructions
and controls most of the activities that take place within the machine.
 A collection of memory devices able to store instructions and data during the operation of the
computer.
 Various storage devices able to store instructions and data even when the computer is
turned off.

The most common form of computer in use today is the PC (Personal Computer). This was the
name given to a computer configuration that evolved during the 1970s and which is a desktop
machine.

Computer hardware is in itself unable to perform any useful tasks – it must be provided with detailed
and unambiguous instructions indicating exactly what actions are to be taken. Software is a term that
is used when referring to programs in a general way, and encompasses instructions that are to be
acted upon by a computer and the data that may be needed by these instructions.
Computers can perform calculations at a very high speed and have the ability to support the storage
and rapid retrievals of enormous volumes of data. Furthermore, a computer is able to make
‘decisions’ during the execution of instructions. In fact, a computer can handle instructions in three
general ways:

 It can execute a sequence of instructions. A computer has the ability to execute a list of
instructions.
 It can execute instructions by iteration. A computer can execute a series of instructions
repeatedly.
 It can execute instructions by selection. A computer is also able to select the next instruction
that it should execute according to some condition. For example: If the value stored in a
certain memory location is less than 10 do this…or else do this…

Networks

Computer network refers to two or more computers communicating with each other. Networks can
be classified by several methods, which include the technology used and the network size. The
following are the criteria used when networks are classified by size or physical area they cover:

 PAN (Personal Area Network) – it includes personal devices communicating at nearby


range, like cell phone and laptop. This type of network can use wired connections (e.g., USB,
FireWire) or wireless connections (e.g., Bluetooth, infrared).
 LAN (Local Area Network) – it encompasses a small local area (for example office, home,
small group of buildings, or other building). Wired (probably Ethernet) or wireless
technologies (probably Wi-Fi, also called 802.11) can be used in LANs. Printers, servers,
workstations, and other devices communicating and sharing resources use LAN.
 WLAN (Wireless LAN) – it covers a limited geographical area, and is popular in places where
networking cables are difficult to install, such as outdoors, in public places, and in homes that
are not wired for networks. They are also useful in hotel rooms.
 MAN (Metropolitan Area Network) – it encompasses a large campus or city. CAN or Campus
Area Network refers to a small MAN. Wireless (probably LTE or WiMAX) or wired
technologies (e.g., Ethernet with fiber-optic cabling) can be used in MANs.
 WAN (Wide Area Network) – it covers a large geographical area and is made up of many
smaller networks. The best-known WAN is the Internet. Some technologies used to connect
a single computer or LAN to the Internet include DSL, cable Internet, cellular WAN, and fiber
optic.

Keypoints
 A computer system consists of set of electronic and electromechanical components able to
accept some form of input, process this input in a way that can be specified by means of a
set of instructions, and produce some type of output.
 A computer system comprises both “hardware” and “software” systems.
 A computer network is created when two or more computers can communicate with each
other.
 Networks can be categorized by several methods, including the technology used and the
size of the network: PAN (Personal Area Network), LAN (Local Area Network), WLAN
(Wireless LAN), MAN (Metropolitan Area Network), WAN (Wide Area Network).
  geographical area.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 Identify if the following statements is true or false.
 LANs (Local Area Networks) can only use wired technologies.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 Identify if the following statements is true or false.
 A small MAN (Metropolitan Area Network) is also called a CAN or Campus Area Network.
 We hide question answers, hints and explanations, to prevent students from cheating.
Areas for Improvement, Development and Growth

Objectives
At the end of this lesson, you should be able to identify areas for improvement, development and
growth.

There is no such thing as a perfect status or state in establishing and running a business. There will
always be an aspect or area that requires some sort of improvement, development, and growth.
Sometimes, it is difficult for an entrepreneur to identify and address these areas because of the lack
of experience and knowledge on how to do so. Failure to discover these matters may result in the
unwanted downfall of the entire business undertaking.

Learn about it!


Before any improvements or changes can be made, it is important to assess the current state of the
business. The internal and external factors that directly affect the business must be taken into
account and must be addressed accordingly. Internal factors are those concerned with the personnel
and practices of the business, while external factors include market trends and consumer behaviors.

Listed below are the tools that can be used by an entrepreneur to assess the current business state:

1. SWOT Analysis – this is a model that illustrates the business’ strengths, weaknesses,
opportunities, and threats. This is normally used to address multiple aspects that could
directly affect the business. Being able to address the issues brought about by this model will
contribute in the development of the business.
2. Benchmarking – this is a process of comparing the current business state to the different
businesses of the same nature. This is usually used to equate the business’ performance
with the nearby competitors. The current state of the business must be improved if it seemed
that they are not at par with the competitors.
3. Market Research – this is conducted to identify the current market and consumer trends that
directly affects how the business operates. New trends must be addressed to ensure that the
business can keep up with the changes.

Aside from the tools used above, the aspects of improvement, development, and growth must be
clearly identified:

1. Explicit – the area of improvement must be clearly defined.


2. Quantifiable – improvement must be measurable to easily assess if there are any changes.
3. Attainable – growth must be achievable. Setting something that is impossible to achieve will
not be healthy for the business.
4. Significant – the area of growth must be relevant enough to greatly contribute to the current
state of the business.
5. Well-timed – any attempt of refining the current state of the business must be done with a
definite time table.

After using the tools and evaluating the areas for improvement, applying the appropriate actions to
enhance them now lies in the hands of the entrepreneur. Since improvement was described to be
measurable, it is possible to rate the current state of the business with the state it has become after
all improvements and developments have already been applied.

Question

Which of the following statements is true about establishing and running a business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following greatly affects the current state or status of a business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following tool is used to identify the strength, weaknesses, opportunities, and threats of a business
undertaking?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What tool is used to compare a business to another business in the same industry?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer

Question

Which tool is used to identify the current consumer trends

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Which of the following states that the area for improvement must be clearly defined?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

To assess if there are really improvements, all enhancement procedures must be _____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Which of the following must be taken into consideration when trying to enhance a business aspect?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Which of the following is true about the duration of a development procedure?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

All identified areas for improvement must be greatly _________________.


Aligning One’s PECs According to His/Her Business/Career Choice

Objectives
In this lesson, you should learn how to align one’s PECs according to his/her business/career
choice.

In venturing into entrepreneurship, one must consider the challenges of what launching a business
will bring. Some of the challenges experienced by first-time business owners are the lack of
experience in launching and running a business and the insufficient skills in managing the people
and resources. Anyone who wants to succeed in running a business must have a set of
characteristics fit to become a successful entrepreneur. This is called the Personal Entrepreneurial
Competencies or PECs. These are abilities that help an entrepreneur in meeting the challenges of
the business.

Learn about it!


What are types of PECs? These abilities are clustered into three groups: achievement, power and
planning.

 Achievement cluster focuses mainly on results and methodology. The qualities included in
this group are opportunity seeking and initiative, risk taking, demand for efficiency and
quality, persistence, and commitment to the work contract.

o Opportunity seeking and initiative is to act immediately when the opportunity arises
and pays attention to the needs of the customers.
o Risk taking is being proactive yet able to calculate the risks and minimize losses.
o Demand for efficiency and quality means accomplishing tasks. It also means
performing businesses better, faster and cheaper.
o Persistence is to face a challenge with a good plan. It comes up with a good
alternative to meet a challenge or business demand.
o Commitment to the work contract is to accomplish goals on time.

The planning cluster concentrates on the workflow processes and the goal-setting part of the
business. The skills belonging to this group includes information seeking, goal setting, and
systematic planning and monitoring.

 Information seeking is studying the market for a new product or service.


 Goal setting is coming up with specific, calculated objectives and goals.
 Systematic planning and monitoring is to be logically flexible and making an organized plan
with defined and proven methodologies.
 The last group, the power cluster, is inclined to the soft skills of the entrepreneur and it
includes persuasion and networking, and independence and self-confidence.
o Persuasion and networking is to give facts to customers and convince them to buy
the product.
o Independence and self confidence is to develop self-esteem and trust that you will
achieve your goals.
Aligning these characteristics to the business you intend to pursue enables you to become a better
leader and negotiator. You also need to note the areas that need improvement as well as apply your
strengths to areas that matter the most. For example, if your business offers customer support, the
PEC that you should develop should be focused on the planning cluster. To be precise, you need to
have the right information about your customers, list down goals, have a systematic approach in
answering the customer's needs and monitoring if these approaches are successful.

What are the three clusters of Personal Entrepreneurial Competencies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What are Personal Entrepreneurial Competencies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following ability belongs to the Power Cluster?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What is the ability to study the market for a new product?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which cluster includes persuasion and networking?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

What is the characteristic that calculates risks and being proactive?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

For a business that relies heavily on selling products, which cluster should be strengthened?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Why is it important to align the PEC to one's preferred business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Multiple Choice

Question

What are the two main reasons why entrepreneurs fail in running a business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

If you would like to run a small grocery store in your town, what is the competency group that you will need to achieve
this?
A Plan of Action That Ensures Success of His/Her Business/Career Choice

Objective
Learn how to create a plan of action that ensures success of his/her business/career choice with the
help of this lesson.

Choosing to venture into entrepreneurship is a big challenge. It requires a person to hone his or her
skills to meet the challenges and demands of the business. Before going into full pledged
entrepreneurship, one must create a plan of action to ensure success. This also applies to fresh
graduates or those who are thinking of moving into another career path.

Learn about it!


What is a plan of action?
It is a blueprint for decisive action. It outlines the actions that are needed to meet the goals. It
supports the framework of the business and guides the owner or decision makers on the important
steps that needs to be undertaken. Having a plan of action gives you an overview of the areas that
will need support and the most resources, as well as the dependencies of each action.

A plan of action should have goals that use the SMART principle - specific, measurable, achievable,
realistic and time-bound. Avoid putting too many goals and instead focus on those that are
achievable in a given period.

For example, if you are interested in putting up a computer services or repair shop, you need to get
information about the market.

First, you must also determine the required skills and experience in order to run the business
smoothly. Taking up basic crash courses on how to repair computers, where to get replacement
parts or locating the nearest supplies are needed to have a better understanding of the business and
the consumer needs. Get to know the peak and off peak season to know the profitability of the
business.

The second important step is to look at the resources that you have and you will need. List
down the needed resources and figure out how you will get these.

Third, know when is the rightful time to launch the business. If computer repairs peaks on
summer season, be prepared to have plenty of replacement parts and repairman on hand.
Determine the months that are considered profitable for the business. You can also look at
supplementary ways to increase cash flow.

Fourth, have a handful of people who can work well with you. Having the right team will make
work easier and more efficient. You can invite your network to be a business partner or refer their
friends who are looking for work.

Fifth, set a realistic timeline. Make sure that the timeline that you foresee for the business is
attainable and workable. This applies from the planning phases, the launching and the sustenance
of the business.
These are just some of the steps that one can include in his or her plan of action for any chosen
business or profession. Keep in mind that every plan has to be coupled with the right course of
action for it to become a success.

What is a plan of action?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Multiple Choice

Question

Why should the plan of action adhere to the SMART principles?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What does R stand for in the SMART principle?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Why do new entrepreneurs need a plan of action?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Having a plan of action gives you ____.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

The fourth step mentioned in the lesson is to network with other people. Why is this important?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Multiple Choice
Question

Why is entrepreneurship a big challenge for new business owners?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What does A stand for in the SMART principle?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What is the second step in creating a plan of action?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Why is it necessary to avoid listing down too many goals?

We hide question answers, hints and explanations, to prevent students from cheating.
Environment and Market
12 topics120 questions
Topics under this module

 Identifying What is of “Value” to Customers


 Customers to Sell To
 What Makes a Product Unique and Competitive?
 Applying Creativity and Innovative Techniques to Develop Marketable Product
 A Unique Selling Proposition (USP) to the Product/Service
 Criteria and Steps in Selecting a Business Idea
 Applying the Criteria/Steps in Selecting a Viable Business Idea
 Determining a Business Idea Based on the Criteria/Techniques Set
 The Benefits of Having a Good Brand
 Recognizable Brands in the Town/Province
 Criteria for Developing a Brand
 Generate a Clear Appealing Product Brand

Identifying What is of “Value” to Customers

Objectives
At the end of this lesson, you should be able to identify what is of “value” to the customer.

The general definition of customer value is the difference between what a customer would attain
from purchasing a product against what he or she has to give. This means the more they get for the
least amount means higher value. As simple as it may sound, not all sellers know the value their
customers are looking for.

Learn about it!


For example, you are a restaurant owner looking for replacement ceiling to floor windows and two
suppliers approach you. The first one says “Trust me, our glass is high grade, high quality which will
save you money it helps regulate temperature inside your establishment.” Then the second one tells
you “Our glass can lower your electricity bill by at least 6%, so it will pay for itself in a few years. We
also have 5 year warranty for our glass.” Naturally, the second proposition sounds more interesting
since they offered numerical facts.

So how would you know what is important to your customers?

1) Gather the relevant data to gain a better understanding of what is valuable to them. Market
research is the discipline that allows companies to get insights from their customers, which helps
them to gain competitive edge for their business. In gathering data, you will have to identify the
particular product and the market segment to gather data from. Since this is the initial phase, it
would be a good idea to choose a segment of the market that already has a good amount of
knowledge about the product or service you are providing.
But before approaching the customer, you should already have an incentive to give out, in order to
make their time providing you with data worthwhile. For example, you might want to offer a free
sample of the product or a discount of the service.

2) After collecting the data, you must analyze the information. This will help you determine what the
customers think of the product and if it answers their needs or wants. This information will help in
either improving or replacing certain features of the product itself or other aspects of promoting and
selling it. Price, place and positioning can be also improved depending on the analysis.

3) Once the enhancements are done, you must monitor the performance of the product. This will
help gauge if the research is successful and to check if the customers are happier with the
improvements. It would be necessary to do another customer feedback survey in another period to
determine if the needs and wants of the target market are still being met.

Tips
Knowing the value of your product to its target clients gives it a competitive advantage over other
brands. The key is to get the customers’ insights and feedback to help improve the product and
make it competitive and relevant to the target market.

Question

Why is it important to know the value of your product to its target clients?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Multiple Choice

Question

What are the steps mentioned in the article?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What is customer value?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Why should companies research on what is valuable to the customer?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Gathering data should start with ______.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Multiple Choice

Question

After analysis, the product goes through _____.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

How does market research equip companies?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Multiple Choice

Question

What can be improved after getting the analysis?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Multiple Choice

Question

Why is it important to conduct customer feedback survey?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

How do you monitor the performance of the product?


Customers to Sell To

Objectives
In this lesson, you will learn how to identify the customer to sell to.

After carefully choosing your preferred business, identifying your potential markets and competitors,
and launching the business, it is time to market and sell your products or services. Determining the
profile of your customers will help in creating the appropriate advertisements to attract buyers or
end-users to buy your product or availing your services.

Learn about it!


Who are the customers to sell your goods to? These are people who have the common need or
problem which can be addressed by the product. These can also be organizations or businesses
that have a demand for a particular product. For example, you created a mobile application that can
track heart rate or pulse, the customers who will most likely avail are those who are health-
conscious, those who suffered cardiac arrests, people with blood pressure problems, and even
doctors, clinics and hospitals.

To come up with a sound marketing and sales plan for these target markets, you must know how to
segment them according to their profile. You must know how to divide a broad set of customers into
subsets, with each group having the same set of interests, demographics, buying capabilities, etc.
Doing this enables you to make the right approaches to these target markets while addressing
common needs. This saves resources while achieving higher sales.

Assessing your product and the needs it can answer, can help you determine who will purchase it.
You can categorize these customers as your primary target market. The rest of the customers are
whom you can classify either as secondary or tertiary target markets. You can create as many
subsets as you want, but take note that the primary targets are those who will be most interested to
patronize your product. Below is a guideline to know more about your customers:

 Check their demographic profile.


 Learn about how they earn or their source of income.
 Know why, when and how are they buying your products or service.
 Get their feedback and expectations from the product or service.
 Another example is selling real estate developments. If houses are the main products, you
must keep in mind of the possible homeowners or end-users who will purchase the property.
Take note of the product's features and what needs of a potential customer it will address.
You must consider the buyer's lifestyle as well and their preferences. For example, if a
newly-wed couple who are in their late 20's are looking for their first home, they would likely
buy a smaller home that will fit the budget. Chances are, the couple would buy a bungalow
or a townhouse if this will fit their needs and purpose. A bungalow or townhouse will be big
enough for a growing family but will not compromise the couple's finances.
 Knowing who to sell to is a competitive advantage for any business. Getting to know who
your customers are helps you make the necessary changes in the product or service to
remain relevant to the market.
 Question
 Why is it important to determine who your customers are?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 Who are your customers?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Multiple Choice
 Question
 What should you do to come up with an effective sales and marketing plan for the target markets?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 How many subsets of the target market can you create?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Multiple Choice
 Question
 Who can be considered as the primary target markets for a company selling air conditioners?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Multiple Choice
 Question
 In the example mentioned in the lesson, who are the target markets for the mobile application that measures
heart rate?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Multiple Choice
 Question
 Why is it a competitive advantage to know your customers?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 Which of the following can help in getting to know your primary target market?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Multiple Choice
 Question
 In the example stated in the lesson, the newly-wed couple would most likely buy a bungalow or townhouse.
Which are the possible reasons why they will purchase either of the units?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Multiple Choice
 Question
 What are the advantages of creating an effective sales and marketing plan?
What Makes a Product Unique and Competitive?

Objectives
At the end of this lesson, you should be able to explain what makes a product unique and
competitive.

There are many different products and services that are selling the same idea to a particular group
of customers. This makes promoting and selling the product difficult unless it stands out from the
rest.

Learn about it!


A product is considered unique and competitive if it has a "unique selling proposition" (USP). It is
a marketing concept used to determine the difference of one product from the competition.
Generally, companies use USP in their advertising campaigns to promote their products and
highlight its features. This helps marketers and sellers to pitch their product to buyers, as well as
achieve brand recall and customer loyalty.

See it!
A good example is the smartphone industry.

What do you think?


Today, in order to be truly competitive and unique among other smartphone brands, the product's
features should rival or even surpass the latest models.

 The operating software should be the most updated version, the size and form factor should
be the preferred dimensions of the customers, the applications should be relevant to the
end-users, and battery life should have a backup storage.
 The manufacturer should also consider the price range, its competitors and the potential
market to make a unique product.
 Aside from these, the company should also know what motivates their customers to buy and
use their products. The buying habits and preference of the consumers dictate the possible
features of a new service or product. Otherwise, the product will simply be an enhancement
of a previous model and customers will least likely spend on it.

See it!
Another good example are coffee houses.
What do you think?
All cafes serve the same cup of hot cappuccino, but the service, environment, pastries and customer
experience makes it different from other coffee houses or restaurants.

Tips
It is important to remember that customers choose a particular product because of their personal
experience in using it. Having a unique and competitive product means it should maintain its quality
and deliver its promise to the market.

Question

What is Unique Selling Proposition/USP?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Why is it important to know the USP?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What is necessary if you have a unique and competitive product?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Multiple Choice

Question

In the given example, smartphones are able to stay competitive if it can surpass the latest model. What are the
features that make a smart phone stand out?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Multiple Choice

Question

Why is it difficult to make products differ from others?


We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Multiple Choice

Question

What are the reasons why customers become loyal to a particular product?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Multiple Choice

Question

How does a product stand out from the competition?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Ace has created a new type of software for mobile devices. What is the first step that he needs to do to market and
sell his product effectively?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Multiple Choice

Question

You own a laundry shop in the local neighborhood. What are ways to keep your customers loyal to your business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Multiple Choice

Question

Which of the following can possibly happen if a product does not compete well with other brands?
Applying Creativity and Innovative Techniques to Develop Marketable Product

Objectives
You should be able to learn how to apply creativity and innovative techniques to develop marketable
product at the end of this lesson.

Having a creative, and innovative product or service usually attracts potential customers into trying
them. Most businesses, especially those who are just starting up, would have to think of ways on
how to apply creativity and innovation to their products and services in order for them to stand out
against the competitors. The product in mind may be similar in nature with those that are already in
the market, but twists and ingenuity must be incorporated into it.

Learn about it!


What makes a product creative and innovative?

1. It is something new. Nothing of its kind exists in the current market.


2. Production is done differently. It can be the same as other products, but the way it is built
and the materials used are significantly diverse.
3. Adoptability is a breeze. Although it’s a new product, the customers must be able to use it
smoothly in just a short period of adjustment.
4. It has a promising future. Further improvements and enhancements are clearly defined in
order to improve the customer’s experience in using it.

Listed are the creativity and innovative techniques to develop marketable products:

1. Create – this step requires creative thinking of a new product, or finding ways on how to
recreate an existing one.
2. Deliberate – after having multiple ideas on what product or service to sell, proper deliberation
with the stakeholders must be accomplished to choose the best option among all the
creative ideas.
3. Market Research – once deliberation is done, a thorough market research must be
accomplished to know the potential customers of the product or service. Market
segmentation can also be done in this step.
4. Evaluate – this requires the assessment if the business will be able to sustain the production
of the service given a certain demand.
5. Market – after determining the potential customers and the ability of the business to produce,
the next big step is to think of ideas on how to sell the product. A business plan or a
marketing plan is required to do so.
6. Build – this is usually started by creating a prototype, a mockup or a test product.
7. Trial and Adjust – prototypes that were recently built must be tested if it passed the quality
control standards and complies with regulatory and safety requirements. If any unwanted
results occur, proper adjustments must be made.
8. Produce – after creating a prototype and testing it, production stage must now be carried out.
This is where mass production of the final product is accomplished.
Tips
After performing all the procedures above, a business will now be ready to produce and sell creative
and innovative products to the market. Having these creative and innovative products will be an
edge against competitors, whether direct or indirect.

Question

Which of the following conditions makes a product creative and innovative?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following makes a product sustainable for the future?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What makes a product innovative based on user experience?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What technique involves the formation of a concept for a new product?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

What technique includes the choosing of the best idea among all the concepts?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

A mock-up or a test product is also known as ______________________.


We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

In what stage does determining the potential customers comes into mind?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What technique is used to check and alter the prototype of the product?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Which of the following statements is true about creative and innovative products?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which of the following activities makes a creative and innovative product?

We hide question answers, hints and explanations, to prevent students from cheating.
A Unique Selling Proposition (USP) to the Product/Service

Objectives
In this lesson, you should learn how to employ a Unique Selling Proposition (USP) to the
product/service.

“Unique selling proposition” or “unique selling point” is a marketing term which is used to identify a
specific product or service benefit that is only available through that product or service. The term
was created by Rosser Reeves, author of “Reality in Advertising.” It is not a characteristic which can
be associated with any of the competitors’ products or services. In effect, this unique feature allows
the business to create a unique selling proposition. In other words, this single feature becomes the
focus of the advertising message and of any other associated marketing or selling activities.

Learn about it!


At its very core, the unique selling proposition, assuming it has a meaningful significance to the
target market, is the basis for brand differentiation.

Characteristics of a USP:

1. One sentence or phrase.


2. Clearly written, so anyone can understand it.
3. Believable.
4. Composed of one benefit that is unique solely to your company or product

Here are some examples of USP:

1. Durability: “Outlasts all other brands.”


2. Performance/Efficiency: “Speeds PC startup.”
3. Generates feelings of self worth: “You deserve it” or “You’re worth it.”
4. Guarantee/Warranty: “Your Satisfaction is our Pride.”
5. Price: “We’ll match any price in town,” or “It costs more because it’s the highest quality.”
6. Money-Back Guarantee: “If you’re not happy within 30 days, we’ll refund your money back.”
7. Choice: “Comes in ten specialized and finest products.”
8. Saves money: “We are the low-fee computer service center.”
9. Bonuses or extras: This one is often used as a last minute incentive to buy a product.
However, if you’re the only company out there offering a bonus, it may be developed into a
USP.
10. Customer service: “We’re on call 24 hours a day” or “We aim to serve.”
11. The only one: “The only computer service center that gives warranty.”
12. Expert’s choice: “4 out of 5 software engineers recommend it.”
13. Solves a problem: “Permanently eliminates malwares.”
14. Dependability: “You can lean on us in times of trouble.”
15. Targeting service: You provide only one service, but you do it better than any other company
because you focus on one service only. “We specialize in data recovery.”
Keypoints
 Your USP distinguishes your product or service from everyone else’s.
 You cannot build a consistent and successful marketing campaign without your USP.
 The term, “Unique Selling Proposition” or “USP” was created by __________.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 Which of the following does not describe a USP?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 This one is often used as a last minute incentive to buy a product.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “4 out of 5 software engineers recommend it.”
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “If you’re not satisfied in the first 30 days, we’ll refund your money.”
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “Cleans up, tunes up, and speeds up your PC to help it run like new.”
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “We’re on call 24 hours a day.”
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “We are a low-fee computer service center.”
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “We specialize in password removal and recovery.”
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 Identify the type of USP used in the statement below.
 “Permanently eliminates malwares.
Criteria and Steps in Selecting a Business Idea

Objectives
At the end of this lesson, you should be able to enumerate various criteria and steps in selecting a
business idea.

Venturing into entrepreneurship takes a lot of thinking and time. It is also one of the most difficult
decisions that you will make. There are a lot of factors to consider when starting a business and
choosing an idea is the first step. You have to think about the finances, customers, time, and
potential of the business.

When selecting an idea, it is important to keep in mind of the following:

1. What type of business are you interested in pursuing? You may start a creative agency
if you are inclined to art or a retail store if you love interacting with clients. Others start as
insurance agents or freelancers who have the freedom to expand their networks and earn
unlimited income.
2. Is it something you personally love doing? Businesses are often started from a hobby or
a skill that you have. You may be fond of fashion, food or photography which can be pursued
as a businesses. Find out if the business is something you are genuinely passionate about
and make sure to nurture it well.
3. Will the business idea answer a need or an existing problem? The potential of a
business depends on the perceived need of a customer or an existing problem that has no
solution. You can think of your community and see what areas or services that can be
improved. For example, you can start a tutorial class within the neighborhood for children
who have difficulty in keeping up in subjects such as Math or Science.
4. Is there a market for your business idea? Think of the target customers that your product
or service will cater to. Before launching the business, you need to do market research to
know more about the customer preferences as well as the competitors. This will affect the
profitability of the business and its growth.
5. Will the business need capital? Some ventures are dependent on capital while others can
start with virtually zero funds. Assess the financial requirements of the start-up and
determine if it will need minimal or large capital.

Tips
There are a lot of opportunities in entrepreneurship and it will be more rewarding if it is something
that you are truly engaged in. Always remember that every successful business came from a simple
idea that was coupled with hard work and determination.

What is the first step in starting a business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Multiple Choice
Question

What are the factors to consider when starting a business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Multiple Choice

Question

A business idea serves two types of conditions. What are those?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What do you need to do to know more about the customers and competition?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Multiple Choice

Question

Why is it important to know the potential customers?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

John is thinking of starting a new business. He is passionate about gourmet food and cooking. What type of business
will he most likely pursue?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Multiple Choice

Question

Why is it important to be truly engaged in the business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer
Question

What factors will affect the selection of a business idea?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Why is it important to gauge the financial requirements of a business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

To be a successful entrepreneur, one must _______.

We hide question answers, hints and explanations, to prevent students from cheating.
Applying the Criteria/Steps in Selecting a Viable Business Idea

Objectives
You should be able to apply the criteria/steps in selecting a viable business idea at the end of this
lesson.

A business idea is a concept that is usually used as the starting point of a business venture. It is
usually materialized in a form of a product or a service that is offered to consumers to gain profit. In
order for business idea to be recognized as viable, it must possess certain criteria and conditions
that will be beneficial to the growth and development of a business venture.

Learn about it!


After careful examination of the criteria of viable business ideas, several other factors must be taken
into consideration to select the best idea that will greatly contribute to the business’ success. The
following steps must be followed in selecting a viable business idea:

1. Perform Market Research – this step must never be taken for granted. A well-accomplished
market research can spell success or failure for the business venture. There are two types of
market research, primary and secondary. The only difference is that primary market research
is done by the entrepreneur himself while secondary market research are obtained from
other sources.
2. Identify the Potential Customers – after careful market research, the target market must be
identified. This will be the main source of profit for the business since these customers are
the ones who will be willing to pay for the product or services that you will offer. If potential
customers are not well-defined, it will be hard to assess the viability of the business idea.
3. Know the Competitors – competition is always present in running a business. In order to gain
a competitive advantage over the competitors, an entrepreneur must be able to devise a
plan or idea to edge them. Failure to do so will not put the business idea on top of whatever
product is already offered by the competitor.
4. Recognize the Industry Trends – short-term and long-term trends must be recognized. Both
of these will greatly affect the business venture. This is normally influenced by the economy,
demand, and technological advancements. Failure to recognize the current trends will make
the business idea a disaster.

After the criteria are identified and steps are properly followed, the viable business idea can now be
materialized into a product or a service. The only thing left to do is find ways to commercialize the
product or service to turn the viable business idea into profit.

Question

A business idea that is evaluated to be profitable is considered _____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer
Question

Aside from turning it into a product, a viable business idea can also be materialized as __________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What step is described by careful investigation of the business environment?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Which type of market research is derived from external sources?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which step is described by knowing the people who are willing to spend money on the product?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

What step is defined by identifying the potential rivals of the business idea?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What type of advantage must be achieved in order to edge the competitors?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question
What step is described by realizing the current business situation?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What is the next step to be taken after finalizing that the business idea is indeed viable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What is the next step after producing and marketing a viable business plan?
Determining a Business Idea Based on the Criteria/Techniques Set

Objectives
Learn how to determine a business idea based on the criteria/techniques set with the help of this
lesson.

In order to thrive in establishing a business venture, an aspiring entrepreneur must have a viable
business idea that will anchor his undertakings to success. A business idea is a concept that is
materialized and then commercialized once certain criteria are met and there is a significant market
for it. Being able to meet the conditions needed in thinking of a business idea to the actual selling of
it to the customer must be well studied and calculated.

Learn about it!


Listed below are the most common criteria a business idea must possess in order to be considered
viable:

1. Demanded – in this criterion, a thorough market research must be conducted. No matter how
good or innovative a business idea is, it will not be successful if there really is no real market
for it. Continuing to put efforts in an idea that will not sell will only waste the business’
resources.
2. Profitable – the business idea must be lucrative. Investing in a business idea that will take
years to return the investment of the entrepreneur may not be viable at all, especially for
business that are just starting up. The possible profit from the business idea must be well-off
from the amount of resources spent on it.
3. Competitive – a business idea must have an edge over the competitors, this is called
competitive advantage. When thinking of a business idea, the current products and the
competitors that are in the same industry must be taken into account in order to come up
with a concept that will bring some sort of lead over them. This will make the product or
service attractive to the consumers.
4. Aside from the mentioned criteria above, a viable business idea must also meet the
objectives and goals of the entrepreneur. These objectives are often the center of all the
business activities that an entrepreneur engages in. Being able to meet the objectives set by
the entrepreneur will make it easier to materialize and commercialize the concept.
5. The business idea must also be attainable. This can be based on the resources that are
readily available to be used in marketing, producing, and selling the concept. If too much
resources are needed to the point that the business will not be capable of providing, the
business idea may not be viable at all. The skill, expertise, and capabilities of the
entrepreneur and his team must also be considered. If they are not capable of materializing
the business idea, it is not viable.
6. Business ideas must always undergo strict scrutiny. Failure to do so may spell failure for the
business especially if all resources and attention have been put to it only to realize in the end
that it was not even viable to start with.

Question
Which of the following is considered as the starting point of a start-up venture?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

If consumers are willing to spend money on a product or service, it means that it is ____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following business activity can determine of a business idea is demanded or not?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Which of the following must be done if little or no market demand was determined for the business idea?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following indicates that a business idea will be lucrative?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Which of the following statements is true about return of investment for a start-up business?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What term is used to describe an edge over the competitors and their products?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Which of the following statements about having a competitive advantage is true?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

If all resources are already available, a business idea can be considered as ______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which of the following people determines if there is a real demand for a product?
The Benefits of Having a Good Brand

Objectives
After completing the lesson, you should be able to identify the benefits of having a good brand.

The brand name is the single most important element for a product and plays an influential role in
determining whether new brands succeed. It works with advertising and other product features to
communicate and position the brand’s image.

The brand name identifies the product and differentiates it from others on the market. A good brand
name can evoke feelings of trust, confidence, security, strength, durability, speed, status, and many
other desirable associations.

A brand name should satisfy several fundamental requirements: it should describe the product’s
benefits, be compatible with the product’s image, and be memorable and easy to pronounce.

According Chiaravelle and Schenck (2014), great brands create consumer trust and emotional
attachments. As a result, they foster relationships between consumers and products that lead to the
following valuable benefits:

 Premium pricing: Consumers pay more for branded items that they believe have higher
value and lower risk than lesser-known alternatives.
 Lower cost of sales: Consumers of valued brands make repeat and frequent purchases. As
a result, customer-acquisition costs are amortized over a long-term client relationship.

Amortize – to pay money that is owed for something by making regular payments over a long period
of time.
- Lower cost of promotion: Consumers of valued brands become ambassadors who spread
positive word-of-mouth at no cost to the brand.
- Higher market share: Valued brands acquire loyal customers who recruit more customers to the
brand, increasing the brand’s share of market while reducing customer-development costs and
building immunity to competitive attacks.

Customer Development – it is a process for discovering and validating market demand for an idea
and determining the right product features to meet customer needs through interviews and
structured experiments. Customer development is used to help build products that customers want
and avoid spending time and money on products customers don’t want. It can be used to identify
problems and new startup ideas, to test ideas, and to optimize ideas and existing products.
Customer development helps us learn about our potential customers so we can build products they
will actually use.

 Lower employee turnover: Great brands attract passionate employees who pass their
enthusiasm to satisfied consumers, who in turn make employees’ jobs more enjoyable,
reducing employee turnover as a result.
 Higher stature: Valued brands enjoy a high level of awareness and esteem in the minds of
consumers, industry leaders, community leaders, news editors, and financial analysts and
investors, which leads to yet higher brand preference and marketplace prominence.
Keypoints
 The brand name is the single most important element for a product and plays an influential
role in determining whether new brands succeed.
 Great brands foster relationships between consumers and products that lead to the following
valuable benefits: premium pricing, lower cost of sales, lower cost of promotion, higher
market share, lower employee turnover, and higher stature.
 Identify if the following statement is true or false.
 Great brands create consumer trust and emotional attachments.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 Identify if the following statement is true or false.
 Consumers of valued brands make irregular purchases.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 Identify if the following statement is true or false.
 A brand name should be memorable and easy to pronounce.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 Identify if the following statement is true or false.
 Consumers of valued brands spread positive word-of-mouth at no cost to the brand.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 Identify if the following statement is true or false.
 Great brands promote employee turnover.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 Identify if the following statement is true or false.
 Customer development is used to help build products that customers want.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Single Answer
 Question
 Identify if the following statement is true or false.
 Valued brands enjoy a high level of awareness and respect.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 Identify if the following statement is true or false.
 Consumers pay more for branded items that they believe have lower value and higher risk.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 Identify if the following statement is true or false.
 Valued brands acquire loyal customers who recruit more customers to the brand, increasing the brand’s
share of market and customer-development costs.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 Identify if the following statement is true or false.
 Customer-acquisition costs are amortized over a short-term client relationship.
 We hide question answers, hints and explanations, to prevent students from cheating.
Recognizable Brands in the Town/Province

Objective
In this lesson, you should be able to learn how to enumerate recognizable brands in the
town/province.

One of the basic but most important aspects of establishing a business is forming a brand. Branding
is a scheme that will give a business a certain competitive advantage against the existing players in
the market. A brand can be considered as the name of a business including the products and
service that they provide, or it can be considered as a statement that tells the consumers what to
expect from your business.

Learn about it!


In order to create a brand of your own, an aspiring entrepreneur must be able to identify and
recognize the brands of the competitors in nearby areas. Competitors are those business
establishments in the same area that deals the same products or services that your business offers.
In order to edge those competitors, their branding must be well identified, recognized, and studied.

The following are the criteria that must be observed when checking out the brands of the
competitors:

1. Uniqueness – means that it has nothing equal or equivalent. An aspiring entrepreneur must
determine how the brands of the competitors employ distinctiveness among others. Based
on this, a unique brand must be thought of in order to stand out from what the competitors
are employing into their brand.
2. Target Consumers – this pertains to the possible customers of the product or service. One
must know how the brands of the competitors aim at specific customers. Knowing this will
provide an insight on how to create a brand that will be a sure hit among the target
consumers.
3. Message Delivery – this relates to the meaning of the brand. Most brands have a certain
slogan that pertains to the quality of the products or service that they offer. Studying how the
competitors use such slogans will help in creating your own. In most cases, slogans are
created to counteract whatever statement the competitors says.
4. Steadiness – refers to the unfailing capacity of the brand to deliver. The competitors may be
highly recognizable because their brand continues to stand out. Knowing how to consistently
uphold the promised principles of a product or a service will make your brand recognizable
as well.

The business environment where a potential business venture belongs must be well observed and
studied. One of the most basic things to know is the recognizable brands of the competitors. Failure
to do this may result to bankruptcy because improper or inadequate research on the existing brands
will not result in deriving your own brand that has competitive advantage against them.

Aside from telling what the business promises to the customers, what does a brand refer to?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What term is used to describe an edge over the rival business in the nearby area?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What term is used to describe the businesses that offer the same products and services as yours?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What characteristic sets a brand apart from others?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following pertains to the potential patrons of a brand?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

The message delivery of a brand can be expressed through _______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What must an aspiring entrepreneur do to make his message delivery stand out against the competitors?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer

Question

Which of the following refers to the unfailing capacity of the brand to deliver?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Which of the following can result from incomplete research of the current brands in the nearby area?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which of the following can be considered as a recognizable brand?


Criteria for Developing a Brand

Objectives
In this lesson, you should be able to enumerate the criteria for developing a brand.

According to Shimp and Andrews (2013), choosing a proper brand name is an important decision,
primarily because that choice can affect early trial of a new brand and have an effect on future sales
volume. A product’s brand name plays an important part in shaping its immediate achievement upon
introduction and its persistent success as it matures.

Learn about it!


When considering criteria for developing a brand name, some of the guidelines include:

1. Distinctiveness – A brand name should have a quality or characteristic that differs from
others.
2. Brevity – A brand name should be short enough to be used and remembered easily.
Consumers have limited mental capacity and find it easier to remember short words in
memory.
3. Appropriateness – A brand name should be appropriate with the business purpose of the
product or service.
4. Easy spelling and pronunciation – A brand name should be easy to spell and pronounce.
Avoid unique spellings or pronunciations that consumers won’t remember.
5. Likability – A brand name should be aesthetically appealing or likeable. Names that are
intellectually interesting or give a good “mouth feel” have more advantage than others.
6. Extendability – A brand name suggests a visual interpretation and lends itself to graphic
displays and other creative executions.
7. Protectability – A brand name should be available to trademark. A trademark is something
that identifies a specific brand and cannot be used by another business without permission.
Strongly defend trademarks from infringement by competitors.
8. Meaningfulness – A brand name should be reflective of product benefits. Names that convey
consumer benefits help consumers’ interpretation of brands.
9. Flexibility – Develop brand names that allow flexibility. The brand name should allow the
brand to adapt to changing market needs. For example, Apple™ was able to expand from
computers into MP3 devices and mobile phone handsets, while retaining the image of the
brand.
10. Positivity – A brand name should elicit positive associations in the market served.

Keypoints
There are ten (10) criteria in developing a good brand name: distinctiveness, brevity,
appropriateness, easy spelling and pronunciation, likability, extendability, protectability,
meaningfulness, flexibility, and positivity.

Question
True or False

A brand name should be easy to read and understand.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

True or False

A brand name should be compatible with the product or service.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

True or False

A distinctive brand name has a quality or characteristic that is distinguishable from others.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

True or False

A trademark can be used by another business.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

True or False

A meaningful brand name is reflective of product benefits.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question
True or False

A brand name should be repugnant.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

True or False

A brand name shouldn’t turn into a spelling test or make people ignorant.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

True or False

Consumers have infinite mental capacities and find it easier to remember short words in memory.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

True or False

A flexible brand name lends itself to graphic displays and other creative executions.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

True or False

A brand should elicit good associations in the market served.

We hide question answers, hints and explanations, to prevent students from cheating.
Generate a Clear Appealing Product Brand

Objectives
You should learn how to generate a clear appealing product brand at the end of this lesson.

If you are prepared to brand yourself or your business, you should have a clear insight of what
developing a brand essentially entails. In this lesson, you will be guided on how you can generate a
clear appealing product brand.

Learn about it!


How to Develop a Brand

 Make a decision of what you are intending to brand.What do you want to brand: an
individual, a product, a company, or a service?
 Undertake research. First, know your market. Second, know about your product or service.
 Emplace your product or service. Discover and gain a place for your contribution in the
market and in consumers’ minds by giving only one of its kind solutions to the problems or
necessities that aren’t being concentrated on by competing products.
 Compose your brand definition. A brand definition explains what to proffer, why you
proffer it, how your proffering is distinctive and better, the advantages and guarantees that
your customers can be assured of.
 Create your name, logo, and tagline. A name is the key that opens the lock on the image
of your brand in the mind of your customers. A logo is the brand symbol that appears on your
product. A tagline is a remarkable phrase that gives customers a brief indication of your
manufactured goods, brand, and market position.
 Introduce your brand to the public. Your brand becomes known to the public when you
reveal the name, logo, and slogan, and when you start to inform your market the story of how
your brand suggests what you stand for.
 Administer, leverage, and secure your brand. This is the “care and feeding” part in the
process of branding; it’s the stage that results to a strong, healthy, and resilient brand. Akin
to smart parenting, proper management of brand can be summarized in one word –
CONSISTENCY.
 Organize your brand in a different way or realign it to keep it up-to-date. From time to
time, you can (and should) modify how your brand is offered. You also need to keep your
brand presentation up-to-date to keep it appropriate to the marketplace.

3 Rules of Branding

As you introduce and administer your branding program, keep in mind these three branding rules:

 Your brand is a guarantee that must be strengthened every time people come to get in touch
with any feature of your organization.
 Your brand must exactly manifest the core values of your organization, your management or
leadership, and all who bring your brand experience to customers.
 Consistency develops brands, so every time you come across with your brand – whether
with your employees, manufactured goods, websites, advertising communications, news
reporting, social media, or any other type of brand experience – must reliably express the
promise of your brand and contribute to your preferred brand identity.
 Question
 Arrange the following steps in brand development process.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 It is a memorable phrase or sentence that is closely associated with a particular product.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 It is a symbol that is used to identify a company and that appears on its products.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 It is the key that unlocks your brand image in your consumer’s brand.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 It describes what you offer, why you offer it, how your offering is different and better.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 Identify the following statements as true or false.
 It is important to update your brand presentation.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Single Answer
 Question
 Identify the following statements as true or false.
 Good branding management can be summed up in a single word – consistency.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 Identify the following statements as true or false.
 Provide solutions to problems or needs that are already addressed by competing products.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 If Sheila finds out everything there is to know about the market around her and finds out everything there is
to know about her product and service, she is __________.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 This is the “care and feeding” phase of the branding process
Configuring Computer Systems and Networks
15 topics141 questions

Topics under this module

 OHS in Planning and Preparing for Configuration of Computer Systems and Network
 Preparing Computer Systems, Tools, Devices, Equipment and Materials
 Checking Computer Systems and Networks Configuration Against Specified
Requirements
 Procedures in Using the Tools and Equipment
 OHS Procedures in Configuring Computer Systems and Networks
 Inspect Networking Devices, Media and Connectors
 Creating Cross-over and Straight-through Cables
 Assigning IP Address to Clients and Servers
 Configuring the Assigned IP Address to Clients and Servers
 Enabling Network Security to the Computer Systems
 Configuring File and Printer Sharing
 OHS Procedures in Testing Systems and Networks
 Testing Computer Systems and Networks in Accordance with the Job Requirements
 Accomplishing Technical Reports on the Tests Conducted
 This topic is under development.

OHS in Planning and Preparing for Configuration of Computer Systems and Network

Objectives
At the end of this lesson, you should be able to follow OHS in planning and preparing for
configuration of computer systems and network.

Occupational health and safety policies and procedures must always be observed in fulfilling any job
requirements. One of the requirements that requires strict implementation and practice of OHS
procedures is configuring computer systems and networks. Various workplaces have diverse sets of
OHS procedures that they find it necessary to carry out the tasks safely and efficiently.

Learn about it!


OHS policies and procedures must be well established and all technicians are thoroughly aware of
its contents. Some of the common OHS policies and procedures that must be followed in the
planning and preparing for configuration of computer systems and networks are as follows:

1. OHS policies and procedures must be discussed prior to any planning. This can be done by
the IT manager or if the workplace has one, a safety officer.
2. If OHS policies and procedures has not yet been established, it may be developed
concurrently with the planning.
3. All technicians and other personnel involved must be well aware of the contents of the OHS
policies and procedures. This will serve as the guide in performing tasks correctly and safely.
4. During the preparations, technicians may be assigned to a specific task depending on his
expertise to ensure competence and safety. This will increase efficiency and effectivity.
5. The job requirements must be made clear so that proper tools, equipment, and materials can
be requested beforehand. Proper handling of tools and equipment must also be included in
the contents of the OHS policies and procedures.
6. Personal protective equipment must also be readily available before starting any actual
configuration. This will minimize if not prevent the risk of having an injury or illness.
7. The list of computer systems and the networking devices must be prepared. Their technical
and physical specifications must also be indicated so that adequate preparations in handling
them can be done.
8. The location where the system and network configuration will take place must be studied to
define any hazards that are present. This is known as hazard identification. Some of these
hazards can be electricity, high working area and difficult to reach places.
9. The effects that a hazard must also be taken into consideration. This is known as risk
assessment.
10. A set of contingency plans must be arranged in case any hazard translated into a risk. These
plans are referred to as risk management plans. This will ensure that proper procedures will
be done in the event of an unwanted accident.

In the end, having a concrete plan and preparation for any activity is needed so that a job
requirement can be carried out timely and efficiently. Personnel must also maintain diligence in
performing their tasks so that risks can be greatly minimized.

Question

What set of policies and procedures can help minimize the hazards and risks present in a workplace?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

How soon must OHS procedures be discussed?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer

Question

What must be done if OHS procedures are not yet existent?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Who is responsible for discussing the OHS policies and procedures to the technician?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

What is the best way to ensure that technicians can perform efficiently and safely at the same time?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

What type of equipment must be prepared in order to reduce the risk of inflicting injuries to the personnel who is
completing a job requirement?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What is the importance of knowing the location of the installation or configuration?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What set of procedures is carried out in case an unwanted accident happened?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What is used to discuss the gravity of the effect a hazard may inflict on anyone?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What information is needed from the computer systems and networking devices that will allow the technicians to
know how to properly handle them?
Objectives
You should be able to prepare computer systems, tools, devices, equipment and materials at the
end of the lesson.

In configuring computer systems and networks, it is important that the technician would know the
specific tools, devices, equipment and materials needed before starting any activity. Being able to
prepare all the needed things before commencing will not only make the configuration faster, but
more efficiently as well.

Learn about it!


In order to ensure that all that are needed in configuration of computer systems and networks are
properly prepared, having a checklist is recommended. Listed below are some of these checklists:

1) Computer System

 All integrated and external peripherals must be installed. These peripherals are essential to
the entire operation of the computer system.
 Ensure that an operating system is properly running. The OS will manage the overall
processes of the computer system.
 Application software needed for the different activities should be installed. It must be run and
tested to ensure smooth compatibility.
 The system drivers for all the peripherals must also be installed. System drivers will enable
the full use of a peripheral’s functionalities.

2) Tools and Equipment

 Tools must already be requested from the property custodian ahead of the scheduled
configuration.
 Tools must be well inspected to ensure that they are in good operating condition.
 Tools that requires repair or maintenance must be brought back to the property custodian.

3) (Networking) Devices

 Servers must be installed if central data processing is needed. A special operating system is
needed to be installed in order for this to function.
 Network switches must be checked so that the appropriate LAN speed can be met. The
number of ports must also be confirmed to make sure that it will be enough to connect all the
computer systems into a network.
 If wireless routers will be used, the range and frequency of the signal must be checked
against the specifications of the computer systems that will connect to it.

4) Materials

 A list of needed materials must be specified. Materials are commonly those which are
consumed.
 The specifications of materials must be specified to ensure that they are compatible with the
components.
 Correct quantity must be determined to avoid running out in the duration of the configuration.
In case the exact quantity cannot be determined, analogous estimation can be used which
derives the number from a previously completed task with the same requirement.

Completing the checklist indicated above may help a technician in determining if all the components
needed in the configuration are already prepared. Having all of these prepared will result in a hassle
free completion of the job requirement at hand. This may also increase the efficiency rating of all the
personnel involved in the said activity.

Question

What type of software must be installed to manage the overall processes of a computer system?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What software must be installed to use the full functionalities of a peripheral?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

When is the correct time to create a checklist for the configuration of computer systems and networks?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Before using any tools, they must be ___________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

What must be done in case a requested tool appears to be broken?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer

Question

What type of equipment is needed if central data processing is one of the job requirements?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What must be checked to ensure that all computer systems can connect to a network switch?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What must be checked in a wireless router aside from its signal strength to ensure that wireless clients can connect
to it?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

In case the specific quantity of materials could not be determined, what is the best thing to do?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which person is mainly responsible in providing all the needed materials requested by a technician?
Checking Computer Systems and Networks Configuration Against Specified Requirements

Objectives
In this lesson, you should learn how to check computer systems and networks configuration against
specified requirements.

Before starting the installation and configuration of computer systems and networks, the specific
requirements must be considered first in order to come up with a setup that will be sufficient to
support all the tasks that will be faced in the future. Having a checklist on what equipment must be
installed, how these must be configured, and in what way will they be maintained must all be
checked thoroughly.

Learn about it!


Listed below is a checklist of the most common criteria that must be taken into consideration when
installing and configuring computer systems and networks:

1) What type of connection is needed?

The type of connection is determined by the location, the type and number of devices that will
connect to the network, and budget constraints. For a small area with a small number of computer
systems and devices, wired connectivity is recommended. The advantage of having this type is
reliability and security. If the devices on the other hand are in a large area, wireless connectivity can
be used. Setting up a wireless access point is very easy and this will eliminate the use of cluttered
wires and cables.

2) What type of configuration is needed?

Network configuration basically dictates how the computer systems and devices will behave.
Considering the job requirements that need to be accomplished by the computer systems will
determine the type of configuration.

For a small business where a central database is not needed, a peer-to-peer connection can be
established. This means that all computer systems will act equally among each other. This is a
simple setup that only needs a central access point, which can be a switch or a router.
For larger scaled needs, a client-server configuration must be established. This will have a powerful
computer system that will be assigned as a server that will provide resources to the clients
connected to the network.

3) What equipment do I need?

In configuring a computer network, certain equipment are used to make sure that transmission of
data will be possible. Common networking equipment include hubs, switches and routers.

 Hub – it connects all the computer systems together. Once data is sent, it is forwarded to all
the computer systems.
 Switch – this is considered as an intelligent hub. Once data is sent, it is forwarded only to the
dedicated recipient.
 Router – this transmits data from one network to another. Commonly used to connect
different local area networks together.
 4) How to secure the network?

 One of the most important thing to consider is network security. In a small network, enabling
the firewall (software) in each device can be sufficient enough. For larger scaled network,
installing a firewall hardware is recommended.
A wired network can be protected by securing all the ports that might be used for
unauthorized access. Wireless access points must be protected by a strong password,
preferably with a WiFi Protected Access (WPA) rating.

 Once all of the above mentioned checklist have been accomplished, network configuration
may now commence. If all are taken into consideration, the configured network will have no
problem in meeting all the specified requirements at hand.

 Q1

 Single Answer
 Question
 What type of connection can be used for a very small area?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 What type of network must be used when a very large number of connection is needed?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 What type of network configuration makes all computer systems equal?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 What type of configuration is established when a central database is needed?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 Which of the following equipment is needed to establish a peer-to-peer configuration?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 What type of network equipment sends a transmission to all the computer systems attached to it?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Single Answer
 Question
 Which of the following network equipment sends transmission only to the dedicated recipient?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 What network equipment has the ability to transmit data from one network to another?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 What type of password is recommended when using wireless connectivity?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 Which of the following statements is true about wireless networks?
Procedures in Using the Tools and Equipment

Objectives
In this lesson, you should be able to identify the procedures in using the tools and equipment.

There are multiple tools and equipment needed to install and configure a computer network. In order
to accomplish the installation and configuration correctly, having the knowledge and skills in using
the said tools and equipment is needed. Improper use and handling may result in injuries and
damage the components of the system. In order to avoid this, proper procedures must always be
observed.

Learn about it!


Here are some of the procedures that must be considered in using the different tools and equipment
in networking:

1) Use a tool for its intended function only. Listed below are some of the hand tools and where they
must be used.

 Crimping Tool – used to attach a connector to a cable


 Pliers – used to hold parts and materials
 Screwdrivers – can be used to loosen or tighten screws
 Wire Cutters/Stripper – as the name implies, used to cut or strip wires
 Wrenches – used to tighten or loosen nuts and bolts

The procedures in using these tools are quite easy and just require practical approach. No special
skills are even needed, just knowing when and how to use them is enough.

2) Network equipment are used to connect all the computer systems together. In order to know
which equipment to use, their usage must be well understood first:

 Hub – this is the simplest of all the networking equipment. The downside of using this device
is that it broadcasts the transmission to all the computer systems attached to it, regardless if
they are the recipient or not. This is only recommended to be used in a very small network.
To use this, a twisted pair cable and RJ45 jack is required to be connected from the
computer systems to the hub’s ports.

 Switch – this is considered as an intelligent hub. This equipment receives data from one
computer system and sends it only to the intended recipient. This is one of the most
commonly used network equipment today. To use this, connect the computer systems to its
ports via patch cables.

 Router – used to connect a network to another. If connecting to the Internet is required, a


router must be installed. Using this equipment enables a network to send data to a computer
system that is located in a different network. For Internet usage, connect the patch cable
from the Internet modem to wide area network (WAN) port and connect the computer system
or another network equipment to its local area network (LAN) ports.

Being able to know the functionalities of tools and equipment used in networking will enable a
technician to properly use them. Performing the correct procedures will also ensure that the
configuration will be successful and will perform in accordance to the job requirements.

Q1

Single Answer

Question

Before using a tool, a technician must always know its _____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following hand tools is used to attach a connector to a twisted-pair cable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following is the simplest among the network equipment?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Which of the following is the disadvantage of using a hub?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following is considered as an intelligent hub?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer
Question

What type of cable is usually used to connect computer systems into a switch?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What network equipment must be used if Internet connection is required?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

In order to connect to the Internet, what device must be connected to a router?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

To what port of a router must an Internet modem be connected in order to broadcast its signal to the computer
systems?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

To what port must the clients be connected in order to connect to the Internet via a router?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Add this topic to assignment
Create an assignment with selected topics
ENGLISH
TermsPrivacyContact Us
© 2020 Quipper Limited
OHS Procedures in Configuring Computer Systems and Networks

Objective
Learn how to follow OHS procedures in planning and preparing diagnosis of computer systems
errors at the end of this lesson

The diagnosis of computer systems errors is part of the responsibilities of the personnel from the IT
department. This is normally conducted after the configuration of computer systems in order to
detect any faults or errors that may be present. In planning and preparing the diagnosis, the safety of
the personnel as well as preserving the state of the devices and equipment is vital.

Learn about it!


Occupational health and safety policies and procedures are normally referred to when dealing with
the well-being of personnel in any activity. These are predefined procedures that are designed to
prevent any harm or injury from being inflicted to the personnel while performing the tasks assigned.
It is the responsibility of the safety officer or the IT manager to establish an OHS policies and
procedures when conducting diagnosis of computer systems.

Listed below are the most common OHS policies and procedures that must be followed during the
diagnosis of computer systems:

1. All technicians must read and understand the contents of the OHS policies and procedures
on conducting diagnosis.
2. Every diagnosis must be conducted in a conducive environment, one that is well-lighted and
well-ventilated.
3. Use only the appropriate tools for diagnosis. Read the instructions to avoid damaging the
tools and equipment, and to prevent inflicting harm to the user.
4. Run the recommended diagnosis software for each particular component. Using a different
software may not only result to incorrect findings, but may also harm the components
causing it to overheat and even explode.
5. When dealing with unfamiliar procedures, the technician must seek help from the IT
manager.
6. All findings must be recorded so that it can be acted upon correctly by the IT personnel.

Aside from following the recommended OHS policies and procedures, the hazards in the workplace
must be identified so that the risks will be minimized, if not eliminated. In the end, it is the
responsibility of all concerned personnel to keep everyone safe and maintain the proper operating
conditions of all the computer systems.

Q1

Single Answer

Question

What process is normally conducted to determine errors in computer systems?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

In order to prevent any injuries, the technician must follow the ___________________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following best describes OHS procedures?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Aside from the safety officer, who is in-charge of ensuring that OHS policies and procedures are followed?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following tools must be used in the diagnosis of computer systems?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Running an incorrect diagnosis software may cause ______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

To whom must a technician seek advice when dealing with unfamiliar situations?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer

Question

After completing the diagnosis, all findings must be ___________________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What procedures must be taken after getting the results from the diagnosis?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which of the following must be identified so that risks may be minimized?


Inspect Networking Devices, Media and Connectors

Objectives
At the end of this lesson, you should learn how inspect networking devices, media and connectors.

Conducting an inspection or assessment after the installation and configuration of computer systems
and networks must always be done to ensure that all will work and function according to the job
specifications and requirements.

Learn about it!


In order to conduct a proper inspection, a technician must always know the things to check.
Commonly included in the checklist are networking devices, media and connectors. Listed below are
the description of each and the procedures in inspecting them.

1) Networking Devices – these devices include those that are designed to act as a common
connection point for all the computer systems and other devices. Examples of networking devices
are hubs, switches and routers.

 Always read the labels of all these devices to ensure that they have correct specifications.
 Physically scan the devices for any dents, or external damages. These damages may lead to
malfunctions.
 Check the power cables for any breaks. Damaged power cables may lead to short circuiting
and electrocution.
 Ensure that all ports are free from any clogs and foreign objects to allow a connector to
properly be inserted to it.
 Test the connectivity by sending a “ping” to the networking device using a connected
computer system.

2) Media – this is technically called transmission media. This refers to the means of transmission in
any computer network. A common transmission media is the twisted-pair cable. Another
transmission media uses wireless technology or most commonly known as WiFi.

 Always check if the cable installed are correct. Twisted-pair cables have categories that
determine its transfer rate or transmission speed, so make sure that the right one is laid
down.
 Check the twisted-pair cables for any breaks.
 Ensure that no other devices can cause interference or noise. Common interference are
cross-talk; this happens when a cable intersects with another.
 For wireless media, make sure that the wireless access point can broadcast a signal that the
computer systems can scan or detect. Enable all the channels and frequencies available to
ensure that all types of devices can access it.

3) Connectors – these are small materials that are attached to both ends of a cable. It serves as a
means of connection between the cables and the ports.
 Ensure that the correct connectors are used for a particular cable.
 Always check if the connectors are firmly attached to the end of the cable. Usually, an RJ45
connector that is properly attached to a twisted-pair cable will not fall out even if a strong
force is applied.
 Ensure that the contact points of a connector are free from any dirt or lint to guarantee that
proper connection with the contact points of the port.
 In inserting a connector to a port, ensure that it is locked. A clicking sound can be heard
when proper insertion is accomplished.

Doing the procedures above will not absolutely ensure that the computer network will run perfectly.
Other factors may also affect the performance of the networking devices, media and connectors.
Regular inspections and testing must be made in order to ensure that the above mentioned will
continue to work and perform their functions effectively.

Q1

Single Answer

Question

Which of the following equipment is designed to act as a central access point in a computer network?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What part of a network device must always be free from clogs or any obstruction?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Connectivity between the networking device and a computer system can be tested by sending a __________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What must be taken into consideration to ensure that a twisted-pair cable will be applicable to the job requirement?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question
What must be avoided or minimized when laying down cables?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

What type of interference is caused by cables that intersects each other?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

Aside from allowing all channels to be broadcasted, what must be enabled in wireless devices to ensure that all
computer systems will be able to receive its transmission signals?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What materials are connected at both ends of a cable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What part of a connector must always be free from dirt or lint?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What type of connector is used for a twisted-pair cable?


Creating Cross-over and Straight-through Cables

Objectives
This lesson aims to help you learn to create cross-over and straight-through cables.

In configuring networks, it is needed that a transmission medium be established to allow data to flow
along the different computer systems and components connected to it. It acts as the main pathway
for data and signals that runs through a network. The most common transmission medium used in
networking is a cable. Twisted-pair cables are normally the first option to use in establishing
connections within the network because it is both cheap and efficient. It is composed of four pairs of
wire with different colors, four solid and four with white stripe. The colors are orange, green, blue,
and brown.

Learn about it!


Listed below are the steps in creating twisted-pair cables:

1) Prepare all the tools and materials needed.

 Crimping tool – this is a special tool used to cut, hold, and attach and RJ45 jack to the end of
the cable.
 Cutters or Scissors – can be used to cut the cable
 Twisted-pair Cables – these are cables that are specifically used in networking.
 RJ45 Jacks – these are the connectors attached to the end of a twisted-pair cable.

2) Cut the twisted-pair cable based on the needed length.

3) Remove the outer jacket of the cable to expose the four pairs of wires inside.

4) Untwist the wires. Make sure that they are free from any damage. A small cut may result in failure
to transmit.

5) Arrange the wires based on the type of cable you want to create:

 Straight-through Cable – this type of cable is usually used to connect a client to a host, to a
switch, or to a server. This could also be referred to as a patch cable. Shown in the table is
the arrangement of wires for both ends of a straight-through

cable: 
 Cross-over Cable – this type is used to directly connect a host to another host. This type of
connection is referred to as peer-to-peer. Shown in the table is the arrangement of wires for
both ends of a crossover cable:

6) After determining the type of cable that will be created, cut the wires so that they will be of exact
length. Make sure that the end of the wires are perfectly aligned.

7) Firmly hold the cable and insert the wires into the RJ45 jack. The part with the lock must be
placed at the bottom.

8)Check if the end of the wires touches the end of the RJ45 jack. If not, push it a little more.

9) Once alignment is ensured, plug the cable into the crimping tool, firmly squeeze it while securely
holding the cable. Once a locking sound is heard, release the grip. Do the same with the other end
of the cable.
10) Use a LAN tester or a cable tester to ensure that the connection of all the wires in both ends of
the cable is transmitting.

Having the correct knowledge and skills in cabling is needed in order for a technician to properly
connect the computer systems and peripherals in a network. Following the steps indicated above
and knowing the job requirements before creating a cable is necessary to ensure that connections
will be established, materials will not be wasted, and devices will not be damaged.

Q1

Single Answer

Question

What must be established to ensure that data will be communicated in a network?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What type of cable is the most commonly used transmission medium?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What type of connector is usually attached to both ends of a twisted-pair cable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer

Question

How many pairs of wires does a twisted-pair cable has?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following is used to attach the RJ45 jack to the end of a twisted-pair cable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer

Question

What type of cable is used to connect a client to a host?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What type of cable is used to connect a host to another host?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What other name is used for a straight-through cable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

The arrangement of the wires in both ends of a straight-through cable is ___________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

In inserting the wires to the RJ45 jack, the lock must be located at the _______________.
Assigning IP Address to Clients and Servers

Objectives
In this lesson, you will learn how to assign IP address to clients and servers.

In configuring a network, computer systems are assigned with specific roles. These roles will
determine how they will work and behave in a network. A computer system can either be a client or
a server.

Learn about it!


A client, also known as host, is a computer system that may work as it is but would normally acquire
most of its resources from a server. It can be in a form of desktop computers, laptops, and handheld
devices.

A server on the other hand is a powerful computer, normally with high end technical specifications
and running on a server operating system, which supplies the needed resources to all the clients
which are connected to it. All networks have one or more computers that can be designated as a
server.

In order for all the clients and servers to be identified in a network, they are given their own
addresses. An Internet Protocol (IP) address is used to give each one a unique network identifier.
An IP address is a distinctive sequence of numbers that is divided by periods or dots. An internet
protocol on the other hand is a set of specific rules that governs how data and information are
transferred over the Internet or in a local area network.

An IP address has four numbers that is separated by dots. Each number ranges from 0 to 255. As
an example, 192.168.0.1 and 192.168.0.254 are both IP addresses that may be assigned to a
computer system, server, or network device. It is divided into two major parts, the first two numbers
is the network identifier (192.168) while the rest is referred to as the client/host address (0.254). IP
address can be assigned dynamically or statically.

A dynamic IP address is temporary and is assigned every time a computer system or device
connects to the server. This means that a client will get a different IP address every time. A Dynamic
Host Configuration Protocol (DHCP) is a client/server protocol that does this assignment. The range
of the IP address that the DHCP server can be predetermined by an administrator. The advantage of
using this scheme is being able to send automatic IP addresses to all the clients every time the
server changes its network preferences.

Static IP addresses on the other hand, as the name implies, never change. This means that this
address is manually embedded to the client/host and will never change even if it disconnects and
reconnects to the server anytime. Each client must be configured one by one in order to assign a
static IP address to all of them. One disadvantage of this arrangement is the long time consumed in
assigning IP addresses to all the clients and must be re-assigned if the server changes
configuration.
Keypoints
 Knowing how IP addresses are and what their main functions is vital in the installation and
maintenance of a computer network.
 These addresses can be used to maximize the capabilities of all the clients, network devices
and servers that are connected to a computer network.
 Q1

 Single Answer
 Question
 What term is used to describe a computer system that normally gets resources from a more powerful
computer in the network?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 What term is used to describe the most powerful computer in a network?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 Which of the following addresses uniquely identifies all the devices connected to a network?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 Which of the following sets the rules that governs the transmission of data in a local area network?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 How many sets of numbers does an IP address has?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 The network identifier refers to the __________.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7

 Single Answer
 Question
 The host address refers to the IP address’ ________________.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 What type of IP address changes every time a client connects to a server?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 What type of IP address is manually assigned to the clients in a computer network?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 What protocol automatically assigns IP addresses to the clients in a computer network?
Configuring the Assigned IP Address to Clients and Servers

Objectives
In this lesson, you should learn how to configure the assigned IP address to clients and servers.

Internet protocol (IP) addresses are used to uniquely identify the clients/host, servers and the
different devices in a network. This address is used to whenever transmission and reception of data
or information is being sent through the Internet or in a local area network. Configuring the IP
addresses of devices is one of the basic competencies a technician must have in order to
successfully install, configure, and maintain a computer network.

Learn about it!


Normally, IP addresses are assigned dynamically using the dynamic host configuration protocol
(DHCP). This means that the IP address of a client will always be different every time it connects to
the server. This method is usually done if the IP addresses that must be assigned to the clients is
not really specifically needed to be determined. This will also lessen the workload of a technician in
configuring a network.

If static IP addresses need to be assigned, the following must be taken into consideration:

1. Subnet Mask – this is used to determine which subnet an IP address belongs to. This is
normally defined by the network address, which is the first two numbers of an IP address
(192.168.0.1).
2. Default Gateway’s IP Address – this is the device that receives and transmits data and
information to the other subnets in a network. The IP address of the default gateway must
always be known by the technician in order to transfer data to the different subnets.
3. DNS (Domain Name System) Server Address – this is the IP address of a special server that
stores computer names and their corresponding IP addresses. Having this eases the way
devices communicate with each other.

After knowing the above knowledge, configuring the static IP address of a client may now
commence. Listed below are some of the general procedures to do so:

1. Open the Network and Sharing Center or the interface where network configuration can be
accessed.
2. Open the Adapter Settings. Local Area Connection can be chosen if connected by cables,
and Wireless Network Connection can be chosen if wireless connectivity is established.
3. Right click to expand the options and choose Properties.
4. On the dialog box, choose Internet Protocol, and click Properties.
5. On the next dialog box, tick the Use the following IP address radio button.
6. Supply the needed values in the IP address, Subnet Mask, and Default Gateway. Be sure to
know what to put.
7. If a preferred DNS Server is available, tick the Use the following DNS server address radio
button and supply the needed values.
8. Tick the Validate settings check box upon exit to determine whether there are problems in
the configuration.
9. Click Okay to save the settings.

After following the steps above, the device will now have a static IP address that will not change until
it is reconfigured by the technician. Common problems that may occur are duplicated IP addresses,
invalid subnet masks, and incorrect default gateway. In order to avoid these problems, proper care in
supplying the values is needed. A system with incorrect values will not be able to gain access or
connect with the other devices in a network. Testing is always a must after configuration.

Q1

Single Answer

Question

What type of IP address changes every time a client connects to a router?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following protocols automatically assigned dynamic IP addresses to clients?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What type of IP address remains the same until reconfigured in a device?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer

Question

Which of the following is true in configuring static IP addresses?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following property is normally defined by the network address?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer

Question

Which of the following receives and transmits data from one subnet to another?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What type of special server stores the computer name to its IP address?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

What settings must be opened to view the type of connections available to a computer system?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What settings must be chosen if a client is connected to a network via a cable?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What must be immediately done after supplying all the needed values in the series of dialog boxes?
Enabling Network Security to the Computer Systems

Objectives
At the end of this lesson, you should learn how to enable network security to the computer systems.

Establishing a network has a lot of advantages to offer. Some of these advantages are sharing
resources, easier transmission of data and information, and access to shared data stored in central
database. In order to ensure that these advantages will not lead to unauthorized access, security
measures must be established both on the computer systems and devices, and the network
infrastructure itself.

Learn about it!


Most of the settings in enabling network security can be found in the Network and Sharing Center or
in the Network and Security Settings of a computer system. Here are some of the measures that can
be done in order to secure the computer systems in a network:

1. Use a Firewall. A firewall is designed to prevent unsanctioned access into a computer


system while keeping the outward communication permitted. Having this enabled will allow a
computer system to gain access with the resources available in the network but will restrict
any other computer system or person from accessing its own resources.
2. Install an Anti-malware. Although a firewall can prevent unauthorized connection towards a
computer system, there are cases in which it may not do so. A firewall cannot protect a
computer system from malware, therefore, having an anti-malware that offers network
protection must be taken into consideration.
3. Disable Network Discovery. Disabling this will make a computer concealed, thus
preventing it from being shown in the list of devices connected to a network.
4. Disable Resource Sharing. Having this disabled will prevent other devices from accessing
the files and other physical resources of a computer system.
5. Never share credentials. These credentials include usernames and passwords. Since
computer systems are all interconnected in a network, sharing these will allow others to gain
entree into a computer using remote access.
6. Aside from securing the computer systems, the network infrastructure must also be
protected. Here are some guidelines to secure it:

7. 1) Secure all the network ports

8. This is to ensure that unauthorized access through the ports will be prevented. All ports must
be placed on secured areas that is not accessible by guests or unsanctioned personnel.

9. 2) Secure the wireless access points

10. Wireless access points allow devices to connect to the network using WiFi connection.
Because of this, it is susceptible to breach. In order to protect it, the default Service Set
Identifier (SSID), the network name that can be scanned by wireless clients, must be
changed or better be hidden. Setting up a more complicated password such as Wi-Fi
Protected Access (WPA) is also recommended.
11. 3) Install a hardware firewall

12. Although firewalls in a form of software is already available in computer systems, installing a
separate firewall in a form of a hardware will definitely boost the network’s protection. It has
special features that will help prevent unauthorized access, even from skilled hackers.

Tips
 Enabling these security measures will not only make the network safe and protected, they
will also ensure that confidential information and resources will not end up in the hands of
unauthorized people.
 Network security must be maintained and supervised at all times.
 Q1

 Single Answer
 Question
 What type of communication is prevented by a firewall?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q2

 Single Answer
 Question
 What software must be installed to secure the network from any viruses?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q3

 Single Answer
 Question
 What must be disabled to conceal a computer system from other devices?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q4

 Single Answer
 Question
 What feature must be turned off to prevent unauthorized access to files?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q5

 Single Answer
 Question
 Usernames and passwords are examples of _________________.
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q6

 Single Answer
 Question
 What technical term is used for the name that wireless devices can scan and connect to?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q7
 Single Answer
 Question
 What type of password is recommended for wireless access points?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q8

 Single Answer
 Question
 Which statement is true about firewalls?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q9

 Single Answer
 Question
 Which of the following people should have logged on to the access point’s configuration interface?
 We hide question answers, hints and explanations, to prevent students from cheating.
 Report errors
 Q10

 Single Answer
 Question
 Which of the following statement is true?
Configuring File and Printer Sharing

Objectives
In this lesson, you will learn how to configure file and printer sharing.

One of the main goals of configuring a computer network is to allow all the connected devices to
share resources. These resources are often in the form of files, peripherals, and Internet
connectivity. Once a computer system or peripheral has been connected to the network, resource
sharing is not enabled by default. It is the task of the computer technician to ensure that file and
printer (example of a peripheral) has been enabled.

Learn about it!


Before files and printer sharing can be enabled, the following steps must be accomplished to give a
“shared” property to files and printers.

For file sharing:

1) Right click on the file and find the “Share with” option.
2) Choose the appropriate users that are allowed to gain access to your file. The access levels are:

 Read – an allowed user will be able to view the file but not edit it.
 Change – an allowed user will be able to read and edit the file.
 Full control – an allowed user will be able to read, change, and delete the file.

3) Click the “Share” button to close the dialog box and finish the process.
4) If multiple files are needed to be shared, transferring it to the Public Folder or enabling sharing on
the folder where the files belong can also be done.

For printer sharing:

1. Open the “Devices and Printers” settings.


2. Right click on the printer icon and choose “Properties”.
3. Click the Sharing tab, and select the Share this printer check box.

Listed below are the procedures in configuring file and printer sharing:

1. Ensure that the computer system and the peripherals are connected to the network, either
via cable or wireless connection.
2. Open the “Network and Sharing Center” (or just network settings in some systems) to access
the configuration window.
3. On the network and sharing center, click the “Turn on Network Discovery” radio button. This
will allow other computer systems and devices that are connected in the same network to
find the computer that is being configured.
4. Once network discovery has been turned on, click the “Turn on file and printer sharing” radio
button to enable file and printer sharing.
5. Click the Save Changes button to finish the configuration.

Once all the procedures have been accomplished, files and printers that were given the shared
property will now be accessed remotely by any device that is connected in the same network. The
shared resources can be accessed by typing the IP address or the computer name of the host
computer system into the run command. Keep in mind that before accessing any file or peripheral for
the first time, appropriate credentials (username and password) are needed for authentication.
Proper security protocols must be laid down to restrict unauthorized personnel and guests from
accessing the shared files and printers.

Q1

Single Answer

Question

Aside from establishing communications, what is the other main goal of a computer network?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What property must be enabled to a file or printer before they can be accessed remotely by another computer
system?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following access levels allows a shared file to be viewed only?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What access level allows a shared file to be viewed and edited, but cannot be deleted?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which access level allows a remote device to completely access a file?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

If multiple files are to be shared, they can be transferred to the _______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What option must be enabled to allow devices in a network to see or find each other?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Aside from the computer name, what can be typed in the run command to access a shared file or printer?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What is needed when accessing a file or printer for the first time?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What is needed to restrict unauthorized access to the shared files and peripherals?
OHS Procedures in Testing Systems and Networks

Objective
Learn how to follow OHS procedures in testing systems and networks with the help of this lesson.

Testing systems and networks are part of the maintenance that we need to do to our computer
system for it to perform well.

Learn about it!


Whenever we test the computer systems and networks, one must follow the Occupational Health
and Safety or OHS procedures to help keep ourselves safe in our workplace. Look at the list below
for some of the guidelines or procedures that we should follow/observe:

1. Always work with someone or have somebody near the place where you are working, so that
in case of problems or an emergency, there will be someone to assist you.
2. The computer should be turned off and unplugged before you work on it.
3. To avoid getting electrocuted, getting wet, or damaging any part of the computer, remove
any liquid around or near your work area. Make sure that all parts, as well as your hands are
dry.
4. Always be careful in using tools that may cause short circuit.
5. Before touching any part of the computer, always ground or discharge yourself first. You can
also use an anti-static wrist strap.
6. In handling the computer parts, never use excessive force.
7. Always keep work area clean.
8. Do not touch the Integrated Circuit or IC parts. Hold computer components at the edges.
9. Always follow the organization’s OHS procedures and practices. Always wear Personal
Protective Equipment (PPE).
10. Always wear clothes that are appropriate for the specific job and it must allow you freedom of
movement.
11. When connecting cable connectors, pins should be checked if they are properly aligned.
12. In case of any accident or other emergencies, contingency measures should be recognized.
13. Blower, compressed air, or brush should be used whenever the computer system is cleaned.
14. Never connect or use a telephone or modem during a lightning storm to avoid any electric
shock that can be caused by lightning.
15. Use an Uninterruptible Power Supply (UPS), surge suppressor, or line conditioner to help
protect the components of the computer system from sudden increase and decrease in
electrical power.

Q1

Single Answer

Question

True or False
Always follow the organization’s OHS procedures and practices. Never wear Personal Protective Equipment (PPE).

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

True or False

Do not touch the Integrated Circuit or IC parts. Hold computer components at the middle.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

True or False

Before touching any part of the computer, always ground or discharge yourself first. You can also use a static wrist
strap.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

True or False

To avoid getting electrocuted, getting wet, or damaging any part of the computer, remove any liquid around or near
your work area. Make sure that all parts, as well as your hands are dry.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

True or False

Never connect or use a telephone or modem during a lightning storm to avoid any electric shock that can be caused
by lightning.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question
True or False

Use an Interruptible Power Supply (IPS), surge suppressor, or line conditioner to help protect the components of the
computer system from sudden increase and decrease in electrical power.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

True or False

When connecting cable connectors, pins should be checked if they are properly aligned.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

True or False

In handling the computer parts, use excessive force.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

True or False

Blower, compressed air, or brush should be used whenever the computer system is cleaned.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

True or False

In case of any accident or other emergencies, contingency measures should be avoided.


Testing Computer Systems and Networks in Accordance with the Job Requirements

Objective
At the end of this lesson, you should be able to test computer systems and networks in accordance
with the job requirements.

After the installation and configuration of computer systems and networks, they must always
undergo a series of tests to ensure that they will function according to the job requirements. Several
procedures must be conducted so that accurate results regarding their performance will be correctly
gathered and compared. Job requirements pertain to specific conditions and results that must be
obtained while using a computer system or establishing connections to the network.

Learn about it!


Listed below are some of the job requirements that computer systems and network must accomplish
and how to test them:

1. Perform basic computing – a computer system is installed and configured to aid a user in
completing basic tasks. A system may be tested by simply booting it up and running the
appropriate burn-in tests to ensure that it is in proper operating condition. Testing the results
can be done by comparing the outcomes from the computer system and a manually derived
solution.
2. Accomplish specialized tasks – this job requirement needs exceptional hardware and
software component to complete. Testing the component’s compatibility with the computer
system, as well as the smoothness of the software must be checked to ensure that any tasks
will be accomplished while using them.
3. Provide communication – this network function is needed for the connected devices in a
network to communicate with each other. This can easily be tested by sending a ping to the
desired device in which a reply must be sent back.
4. Facilitate resource sharing – this job requirement is accomplished by the network by
ensuring that files and devices can be shared. This can be tested by attempting to connect to
a shared device and conducting an operation remotely; just like printing on a printer installed
on another device.
5. Supply Internet connection – this task allows all computer systems that are connected to the
network to access the Internet. This can be tested by running web browser application and
accessing a website or sending a ping to the web address in which a reply must be returned.

In reality, workplaces and end-users vary in the needs to accomplish specific job requirements. The
above mentioned are just the common job requirements that are native to all computer systems and
networks. Specific job requirements must be tested using the appropriate testing procedures to
ensure that will work accordingly.

Q1

Single Answer

Question
What is the main responsibility of a computer technician after the installation and configuration of computer systems
and networks?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following pertains to specific conditions and results that must be obtained while using a computer
system?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Testing the results of basic computing tasks can be accomplished by comparing the outcomes that was done
_____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Which of the following can be considered as a basic computing job requirement?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which of the following statements about testing is true?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

What must be tested if a special hardware or software is to be installed to complete a specialized task?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer
Question

What must be sent to a remote device to test whether communication has been established?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Before testing whether a device can connect to a remote file or device, it must be ___________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Internet connection can be tested by running the ______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Aside from running a web browser, Internet connection can also be tested by sending a ping to the
_________________.
Accomplishing Technical Reports on the Tests Conducted

Objectives
At the end of this lesson, you should be able to accomplish technical reports on the tests conducted.

Technical reports contain detailed accounts on the different tests that were conducted in the
configuration of computer systems and networks. These reports are normally accomplished as soon
as the tests are completed to ensure that the computer technician will have a fresh memory of the
procedures that were conducted. Usually, the computer technician who conducted the test is also
responsible in accomplishing the technical reports.

Learn about it!


Listed below are the vital contents of technical report based on the tests conducted:

1) Inclusive dates – includes the starting date or time until the date or time that the tests are
concluded.

2) Assigned technician – contains the name and signature of the technician/s who conducted the
tests and accomplished the technical reports.

3) Tests conducted – details all the procedures that were conducted. Some of the tests includes:

 CPU testing
 Memory testing
 Hard disk drive testing
 Network testing
 System testing

4) Procedures – this contains a detailed narrative on how the tests listed above were conducted.
This houses the main content of the technical report.

5) Actions taken – this contains the activities conducted by the technician after completing the tests.

6) Outcomes – this contains the results of the actions taken by the technician based on the tests
conducted.

7) Recommendations – this comprises the endorsement of the computer technicians on what actions
can be done next based on the results that were derived.

8) Approval – this is proof that the technical report was checked by the immediate head, usually the
IT manager, before being distributed to all concerned personnel.

Technical reports must be written with full honesty and integrity. Making up the contents of these
reports may lead to unwanted incidents that may cause work stoppage or inflict injuries to personnel.
These reports can serve as references in case the same tests will be conducted after the
configuration of computer systems and networks.

Q1

Single Answer

Question

What type of document must be prepared right after conducting tests on configured computer systems and networks?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which personnel is responsible in accomplishing a technical report?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

When is the right time to accomplish a technical report?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Who is the person responsible for approving a technical report?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Why is there a need to approve technical reports?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Which part of a technical report contains a detailed narrative on how the tests listed above were conducted?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

Which part of a technical report contains the activities performed by the technician after completing the tests?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Which of the following contains the results of the actions taken by the technician?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Which part of a technical report contains the technician’s endorsements?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What can happen if a technical report was accomplished with false contents?
Maintaining Computer and Network Systems
27 topics261 questions
Topics under this module

 OHS Procedures in Maintaining Computer Systems and Networks


 Maintaining Computer and Networks Systems
 Faulty Computer and Networks Systems
 Tools in Maintaining Computer and Network Systems
 Inspection of Testing Equipment/Devices
 Checking PC Specifications
 Verify Network Functions and Specifications
 OHS Procedures in Maintaining Computer Systems
 Faulty Computer Systems
 Testing Normal Functions of Computer Systems
 Performing Repair and Replacement of Faulty Computer Systems
 Schedules and Techniques in Maintaining and Cleaning Computer Systems
 Responding to Sudden Breakdowns of Computer Systems in Accordance with
Established Procedures
 OHS Procedures in Maintaining Network Systems
 Procedures in Maintaining Network Systems
 Checking or Running the Diagnostic Software
 Schedules and Techniques in Maintaining and Cleaning Network Systems
 Responding to Sudden Breakdowns of Network Systems in Accordance with
Established Procedures
 Running the Burn-in Test on Computer Systems ( Burn-in test computer system)
 Maintaining the Computer Systems and Networks to Ensure Safe Operations
 Running or Conducting Computer to Computer Communications
 Connecting Computer Systems to the Internet
 Check Computer Systems and Network to Ensure Safe Operation
 Running the Burn-in Test on Computer Systems ( Burn-in test repaired computer
systems and networks )
 Conducting Final Inspection on the Tests Undertaken
 Preparing Technical Reports That Comply with Job Requirements
 This topic is under development.

OHS Procedures in Maintaining Computer Systems and Networks

Objective
You should learn how to follow OHS procedures in maintaining computer systems and networks at
the end of this lesson.

Maintenance procedures are conducted to ensure that computer systems and networks are in
proper operating conditions at all times. While performing these maintenance measures,
occupational health and safety policies and procedures must always be followed to ensure the well-
being of all personnel that are involved in the said activities. OHS policies and procedures are
composed of predefined actions that must be observed in order to prevent any harm to be inflicted to
anyone.
Learn about it!
The following are some of the most common OHS procedures that must be followed before
conducting any maintenance measure on computer systems and networks:

1. Always read the established OHS policies and procedures before conducting any
maintenance measures.
2. When dealing with electronic components, always wear an anti-static strap to prevent the
transfer or electro-static discharge. Taking off any jewelries is also advisable.
3. Always perform maintenance procedures in the best suitable work area with adequate space
and lighting.
4. Use only the appropriate tools in performing maintenance procedures to avoid any damage
to the equipment and cause injuries to the user.
5. Turn off and unplug all components and peripherals before touching them to avoid
electrocution. Waiting for a few minutes after unplugging is also recommended to assure that
no electric charge is left in the equipment.
6. Always hold components on their sides and prevent touching the terminals to avoid
wounding yourself. Also, avoid touching any sharp parts of a component to avert any cuts.
7. Be very careful in connecting and disconnecting cables and connectors. Faulty connections
may cause an explosion when they are plugged into a power source.
8. When maintaining network devices in hard to reach areas, make sure to use the appropriate
equipment. Use a stepladder when working with hanged devices. Maintain proper posture
when lower yourself down to reach lowly place components.
9. Always ensure that all peripherals and devices are properly closed cases before plugging
them back to the power source.

Maintaining the integrity of computer systems and networks is a vital part of ensuring that the
workplace will continue its operation; it is equally important that the well-being of all personnel
concerned in maintaining the computer systems and networks in proper operating conditions be
prioritized by establishing relevant occupational health and safety policies and procedures.

Q1

Single Answer

Question

Which of the following procedures is concerned in keeping the computer systems and networks in proper operating
conditions?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What set of policies and procedures are designed to keep all personnel safe from any harm or injuries?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer
Question

Which of the following is true when describing OHS policies and procedures?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What must an IT personnel do first before conducting any maintenance procedures?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

What type of electric charge is prevented by using an anti-static strap?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Which tools must be used in maintaining the computer systems and networks?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

Before touching any equipment, it must be _______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Explosions may be caused by _____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question
In reaching highly placed components, the best tool to use is a ________________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What must be ensured before plugging any equipment back to the power source?
Maintaining Computer and Networks Systems

Objective
You should learn to plan on how to maintain computer and networks systems at the end of this
lesson.

The maintenance of computer and network systems play a vital part in keeping the activities of a
workplace smooth and operational. Having systems that are not well-maintained may result to
incorrect outputs or even stoppage of the entire work. The IT department must always be on top in
maintaining the operational integrity of the installed computer and network systems.

Learn about it!


There are two types of maintenance that can be applied to computers and networks. The first one is
called reactive maintenance, where in maintenance procedures are only conducted when a certain
fault or system error has been encountered, this results to conducting troubleshooting procedures.
This type is not highly recommended since damages can already be inflicted on the systems.

The second and more recommended method is called preventive (proactive) maintenance. This is
normally done even if faults or errors were not experienced. It has the principles of applying
maintenance procedures the computer and network systems to prevent any damages from
happening. Preventive maintenance also follows a strict schedule when all procedures must be
accomplished on the designated systems.

Listed below are the common guidelines in conducting preventive maintenance procedures on
computer and network systems.

1) Hardware maintenance

 Remove the dust from the components using a brush or compressed air
 Clean the peripherals that are connected to the computer
 Check and secure loose cables and connectors
 Run hardware diagnostic tests

2) Software maintenance

 Check security updates


 Review the software and systems driver updates
 Update and run the anti-malware software
 Remove unused and unwanted programs

3) Network maintenance

 Check the networking devices


 Scan for the cable breakage
 Clear all causes of interference
Performing regular preventive maintenance has a lot of benefits, such as the reduction of potential
hardware and software problems. This will not only save money for the owner of the workplace, but
will also contribute to better productivity. It can also strengthen system stability and reduce
equipment or system failures. Conducting preventive maintenance must be scheduled to minimize
the stoppage of work as much as possible. It must be conducted in times where minimal personnel
and systems will be affected.

Q1

Single Answer

Question

Which of the following procedures pertains to keeping the computer and network systems in proper operating
conditions?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following activities can be considered as a maintenance procedure?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What type of maintenance procedure is conducted when a fault has already been encountered?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

What procedure is commonly conducted during a reactive maintenance?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

What type of maintenance is conducted even if no faults or errors have been encountered?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer
Question

What other term is used for preventive maintenance?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

Cleaning the peripherals is an example of _____________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Updating and running an anti-malware is an example of ______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Checking the causes of interference is an example of ________________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

When is the most proper time to conduct preventive maintenance?


Faulty Computer and Networks Systems

Objectives
You should be able to identify faulty computer and networks systems at the end of this lesson.

The use of computer and network systems in the workplace helps in completing a job or a task in a
faster and more efficient way. Although computer systems are thoroughly checked and inspected
before being deployed and the network systems are checked regularly, faults and errors can still be
experienced. The personnel from the IT department, especially the computer technicians must be
able to identify these faults so that proper actions can be conducted.

Learn about it!


Listed below are some of the most common computer systems fault and their probable causes:

Learn about it!


Here are some of the most common network system faults and their possible causes:
There are different ways of determining if a computer or network system is faulty. One is called
reactive, in which a fault can only be identified once it was already experienced by the end-user or
by anyone who is using the computer or network system. The other method is known as proactive
wherein a series of tests is conducted on both the computer and network systems to determine
whether a fault or error is present but has not shown any symptoms yet.

Faults in computer and network systems must be determined as soon as possible. Failure to know
these faults would result in failure to perform the specific actions needed. Maintenance and repair
procedures must be done immediately to address the faulty computer systems and network.

Q1

Single Answer

Question

Which of the following statements is true?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What is the usual cause of a computer system the persistently reboots?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question
What fault can be caused by an inadequate main memory?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Software crashes are caused by installation files that are ______________.

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

What is the probable cause of an unresponsive peripheral?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

What type of IP addressing can cause duplication?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

Aside from broken data cables or loose connectors, what can cause failure of connection among wired computer
systems?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Aside from incompatible channels and frequencies, what could prevent a wireless client to connect to the network?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What could prevent a computer system from accessing the Internet aside from a faulty Internet modem?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

A fault that is identified after it was already experienced is referred to as _______________.


Tools in Maintaining Computer and Network Systems

Objectives
In this lesson, you should learn to identify tools in maintaining computer and network systems.

In order to achieve the optimum performance of the installed computer systems and networks,
proper maintenance must be included in the list of priorities by the personnel from the IT department.
The computer technicians, as well as the IT manager are responsible in conducting maintenance
tests to ensure that all computer systems and the network itself is in proper operating conditions. In
order to do this, technicians must be well aware of the different tools to use for specific maintenance
checks.

Learn about it!


Listed below are some of the most common tools in maintaining computer and network systems:

1) Cleaning tools – one of the most basic maintenance that must be practiced is keeping all
computer systems, devices, and peripherals clean. Unclean components may lead into malfunctions
when too much dirt is already accumulated. Examples of cleaning tools are brushes, lint-free cloths,
cotton swabs, cleaning agents, vacuum cleaner, and compressed air.

2) Hand tools – this includes all the equipment that is used in the installation and maintenance of the
computer systems. Examples are screwdrivers, wrenches, cutters, and tools used for cabling like a
crimping tool and a wire stripper.

3) Back-up Utility – this tool is composed of an external storage device that automatically backs-up
important data. This maintenance tool will enable the retrieval of files and data in case something
bad happened to the computer system.

4) Diagnostic Software – these are software tools designed to check the different components of a
computer system. Examples are:

 CPU Diagnostics – checks the central processing unit’s specifications and performance.
 HDD Diagnostics – checks the hard disk drive’s integrity to store permanent data.
 Memory Diagnostics – checks how the RAM stores and retrieves temporary data used by a
running application
 Power-on Self-test – checks all the components every time the computer is booted up.

5) System Diagnostics Tool – if running each of the diagnostic software is not enough, a system
diagnostic tool may be used to maintain the system with respect to all the components, hardware
and software, that compose the computer system. This may check for hardware compatibility,
software updates, and scans for irrelevant and unused files that may be deleted.
6) Anti-malware – this is a software tool that is designed to protect the system from unwanted
viruses or infections. Having an anti-malware installed across the network will minimize the risk of
having malfunctions that are caused by unwanted software.
Network Monitor or Network Diagnostic Tool – this tool is used to scan the entire network for any
faults and will try to fix them. This can also be used to send ping across the network to ensure that
all connected devices are able to communicate. Some of the network activities scanned are the
following:

 Bandwidth – this pertains to the amount of data that can be transmitted thru a network within
a specific period. This is normally measured in bits per second.
 Connected devices – this will show all the computer systems and devices that are currently
connected to the network. It will also show their activities that will determine whether they are
behaving differently.
 Logs – this lists all the activities that were performed by all connected devices.

These are just the common tools used in maintaining computer and network. Other tools with greater
capabilities can also be used if the situation calls for it.

Q1

Single Answer

Question

Brushes and lint-free cloths are examples of what tools used in maintenance?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

Which of the following tools is best used for removing loose dust particles?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

Which of the following hand tools is used for cabling?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question

Which tool is used to copy data from a computer system to an external storage?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question
What type of software is used to check the integrity of the computer components?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Which of the following diagnostic software checks all the components every time the computer boots up?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

What type of tool is used to check the entirety of the computer at once?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Which of the following determines the amount of data transferred at a given period?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

What feature of a network monitor shows all the activities of computers and devices that are connected to the
network?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

What is sent to the connected devices in a network to ensure that they are able to communicate?
Inspection of Testing Equipment/Devices

Objectives
At the end of this lesson, you should be able to inspect testing equipment/devices.

Testing devices and equipment are used to check and maintain the proper operating condition of a
computer system or network. These tools enable a computer technician to perform physical
inspection as well as to check the internal functionalities of a computer system, its components, and
its peripherals. In order to perform a successful maintenance check, testing devices and equipment
must be inspected to ensure that they will produce correct results.

Learn about it!


Listed below are the most common testing equipment and devices and how to properly inspect
them:

1) Digital Multi-meter – this device is used to check the various characteristics of electronic
components and circuits such as resistance, voltage, and current.

Inspection procedures:

 Always check if the batteries still have juice left in them.


 Make sure that the endpoints of the probes are clear from any dirt or lint.
 Ensure that the probes are connected to their proper terminal.
 All settings must be checked and selected prior to using the device.
 The LCD must be clear and properly visible.

2) Multifunction Cable Tester – this device is used to test if the connectors are properly connected to
both ends of the cable. This could also check the different ports like the USB, HDMI, and RJ45 ports.

Inspection procedures:

 Check if the battery are installed or it is connected to a power supply.


 Inspect the ports for any dusts, dirt and lint that may prevent the contact points of a
connector from establishing proper connection.
 All plugged connectors must be removed before testing another cable.
 Check the light indicators so that proper readings can be made.

3) Toner Probe – this device is used to locate or trace cables and wires. One part is connected on
one end of the cable while the other part produces a sound or a tone if it gets near the other end of a
cable.

Inspection procedures:

 Check if batteries are properly installed.


 Check the endpoint of the probes and make sure that it is free from any form of dirt.
 Ports or slots must also be free from dust and lint to ensure that connectors will have a
proper contact point.
 Light indicators must be clear and free from any obstruction.

4) Power Supply Tester – this device is used to determine whether the power supply generates the
correct voltages for the different computer components. This is used by testing the different power
connectors.

 Check if batteries are installed.


 No other connectors must be plugged in before conducting any tests.
 Check the wires for any breaks or damages.
 Ports must be free from dusts and dirt.
 LCD and indicator lights must be clear.

Tips
In the end, using a testing equipment or device that is not in good shape will not help in maintaining
a computer system or network. It might also add up to the faults and errors experienced by the user.
Inspecting these will assure that they are in proper operating conditions which in turn will produce
reliable and correct results.

Q1

Single Answer

Question

Which of the following statements is true?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2

Single Answer

Question

What inspection procedure is common in almost all testing devices?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3

Single Answer

Question

What type of testing device is used to check the characteristics of electronic components?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4

Single Answer

Question
Which part of a digital multi-tester must be connected to the proper terminal?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5

Single Answer

Question

Which type of testing device is used to check if a connector is properly attached?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6

Single Answer

Question

Which part of a multifunction cable tester must be inspected for the presence of any dusts, dirt, and lint?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7

Single Answer

Question

Which of the following testing devices is used to trace cables?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8

Single Answer

Question

Which of the following inspection is unique to a toner probe?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9

Single Answer

Question

Which testing device is used to determine the amount of voltages supplied to the computer’s components?

We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10

Single Answer

Question

Which of the following statements is true about using a defective testing device?
Checking PC Specifications

Objective
Learn how to check PC specifications with the help of this lesson.

A computer system is composed of multiple components that are chosen for a particular purpose. In
order to determine whether a computer system will be able to adhere to the job requirements
specified, it must have the correct PC specifications. PC (System) specifications pertains to the
specific capabilities and measurements of a computer system together with its installed components
and peripherals. Often times, the job requirements must be assessed first in order to determine the
PC specifications needed.

Learn about it!


There are multiple ways to check the PC specifications:

1. Check the box – normally, the box that contains the computer system indicates all the
necessary specifications that is needed to be known by the technician or the user. This can
only be used if the PC is bought brand new.
2. Check the system properties – most operating systems has an option to view its
specifications. These can be compared with the box if there is any. Most of the times, the
information listed in this is more reliable than those on the box since this displays the actual
specifications. This is often used for customized computer systems.
3. Check the support website – all you have to do is to know the model of the computer system
and log on into its support website to view the needed specifications. This is used if the
computer system is not new and does not boot up.
4. Listed in the table below are the most common PC specifications to look out for:

5.

Das könnte Ihnen auch gefallen