Beruflich Dokumente
Kultur Dokumente
Course description
This course contains basic concepts in ICT for grade 10.
Modules in this course
Personal Entrepreneurial
Environment and Market
Configuring Computer Systems and Networks
Maintaining Computer and Network Systems
Personal Entrepreneurial
6 topics60 questions
Topics under this module
Objective
At the end of this lesson, you should be able to discuss the relevance of the course.
In a world where almost every activity is assisted by technology, it’s no wonder that most business
ventures are somewhat related to information technology. One of the businesses that was able to
make its mark is computer hardware servicing. This is an industry whose main line of business is to
sell computer hardware systems and components, as well as servicing in the installation of computer
systems and networks.
The important topics that will be discussed in this course are as follows:
1. Basic concepts of CHS business – this will tackle all the necessary information and facts
about a computer hardware servicing business.
2. Opportunities in a CHS business– this will discuss the different prospects that are available
for a CHS business.
3. Assess your own CHS competencies – being able to assess one’s competencies will help
determine whether an aspiring entrepreneur in the CHS business will be able to manage it
correctly.
4. Assess the practitioner’s CHS competencies – this refers to the CHS knowledge and skills of
those people who are already engaged into a similar line of business that an aspiring
individual would want to venture.
5. Compare the practitioner’s CHS Competencies – this topic discusses the careful comparison
of the CHS competencies an individual possess with those of an actual practitioner in the
same line of business.
6. Aligning of your CHS competencies – this topic is intended to streamline whatever CHS
competencies an individual possesses to fully utilize them in establishing a computer
hardware servicing business.
The above mentioned topics explains how relevant this course is in the establishment of a computer
hardware servicing business. An individual who is determined to come up with a CHS business that
will surely be successful must be able to grasp the ideologies and principles that will be discussed in
this course.
Which of the following statements is true about a computer hardware servicing business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Aside from servicing a computer system, what else can a startup CHS business install and maintain?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Which of the following topics will discuss the most rudimentary principles of a CHS business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What step must be taken after assessing both of the aspirant’s and practitioner’s CHS competencies?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What term is used to pertain to a person who is engaged in the same line of business that one is trying to establish?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Lesson5 chapters
Questions
Objectives
In this lesson, you will be able to explore opportunities in computer hardware servicing as a
career.
Work Activities
You would refurbish, maintain, and install computer systems and equipment as a computer service
and repair technician.
Your everyday job would consist of the following:
Conditions
Your job would require travelling to go to see clients on site as a field technician. You would be
assigned at an office but would expend time with staff at their workplaces in an IT support
department.
Skills, Interests, and Qualities
You should possess the following skills, interests, and qualities to become a computer service and
repair technician:
Keypoints
A person who has achieved the Computer Hardware Servicing National Certificate Level II
(NC II) Qualification is competent to be a computer service and repair technician.
The demand computer service and repair technician is growing in every organization and
industry. For many, this is the entry point for a career in the computer/information field.
You would refurbish, maintain, and install computer systems and equipment as a computer
service and repair technician.
Question
Identify if the following statement is true or false.
A person who has achieved Computer Hardware Servicing National Certificate Level II Qualification is
competent to be a computer service technician or a computer repairman.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Identify if the following statement is true or false.
Computer Hardware Servicing is the entry point for a career in the computer/information field.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Identify if the following statement is true or false.
Because the computer field is changing rapidly, computer service and repair technicians must work to
remain updated in current technology and become oblivious of future developments.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Identify the following statement is true or false.
Today, computer service and repair technicians are capable of viewing desktop and sharing control of
mouse and keyboard through remote assistance.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Identify the following statement is true or false.
Most companies that employ computer service and repair technicians expect the technician to have a basic
knowledge in computer electronics.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Identify the following statement is true or false.
A computer service and repair technician should have an awareness of electrical safety issues.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Identify the following statement is true or false.
In an IT support department, your job would involve travelling to visit clients on site.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Identify the following statement is true or false.
Computer service and repair technicians generally work with a variety of users.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Identify the following statement is true or false.
A computer service and repair technician should be timid.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Identify the following statement is true or false.
A computer service and repair technician should have the ability to meet deadlines.
Basic Concepts in Computer Hardware Servicing
Objectives
In this lesson, you will learn how to explain basic concepts in computer hardware servicing.
The primary purpose of Computer Hardware Servicing is to provide you with the knowledge and
skills that will help you become computer hardware technicians.
A computer system consists of set of electronic and electromechanical components able to accept
some form of input, process this input in a way that can be specified by means of a set of
instructions, and produce some type of output. All computers follow the same fundamental
sequence:
Hardware represents the electronic circuits and/or electromechanical components from which the
computer is constructed.
Devices such as a keyboard, mouse, and display through which we interact with the
computer.
In this respect we provide input to the machine via the keyboard and mouse and observe the
results of the computational process by means of the display screen.
A central processing unit (CPU), which is able to follow (‘execute’) a series of instructions
and controls most of the activities that take place within the machine.
A collection of memory devices able to store instructions and data during the operation of the
computer.
Various storage devices able to store instructions and data even when the computer is
turned off.
The most common form of computer in use today is the PC (Personal Computer). This was the
name given to a computer configuration that evolved during the 1970s and which is a desktop
machine.
Computer hardware is in itself unable to perform any useful tasks – it must be provided with detailed
and unambiguous instructions indicating exactly what actions are to be taken. Software is a term that
is used when referring to programs in a general way, and encompasses instructions that are to be
acted upon by a computer and the data that may be needed by these instructions.
Computers can perform calculations at a very high speed and have the ability to support the storage
and rapid retrievals of enormous volumes of data. Furthermore, a computer is able to make
‘decisions’ during the execution of instructions. In fact, a computer can handle instructions in three
general ways:
It can execute a sequence of instructions. A computer has the ability to execute a list of
instructions.
It can execute instructions by iteration. A computer can execute a series of instructions
repeatedly.
It can execute instructions by selection. A computer is also able to select the next instruction
that it should execute according to some condition. For example: If the value stored in a
certain memory location is less than 10 do this…or else do this…
Networks
Computer network refers to two or more computers communicating with each other. Networks can
be classified by several methods, which include the technology used and the network size. The
following are the criteria used when networks are classified by size or physical area they cover:
Keypoints
A computer system consists of set of electronic and electromechanical components able to
accept some form of input, process this input in a way that can be specified by means of a
set of instructions, and produce some type of output.
A computer system comprises both “hardware” and “software” systems.
A computer network is created when two or more computers can communicate with each
other.
Networks can be categorized by several methods, including the technology used and the
size of the network: PAN (Personal Area Network), LAN (Local Area Network), WLAN
(Wireless LAN), MAN (Metropolitan Area Network), WAN (Wide Area Network).
geographical area.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Identify if the following statements is true or false.
LANs (Local Area Networks) can only use wired technologies.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Identify if the following statements is true or false.
A small MAN (Metropolitan Area Network) is also called a CAN or Campus Area Network.
We hide question answers, hints and explanations, to prevent students from cheating.
Areas for Improvement, Development and Growth
Objectives
At the end of this lesson, you should be able to identify areas for improvement, development and
growth.
There is no such thing as a perfect status or state in establishing and running a business. There will
always be an aspect or area that requires some sort of improvement, development, and growth.
Sometimes, it is difficult for an entrepreneur to identify and address these areas because of the lack
of experience and knowledge on how to do so. Failure to discover these matters may result in the
unwanted downfall of the entire business undertaking.
Listed below are the tools that can be used by an entrepreneur to assess the current business state:
1. SWOT Analysis – this is a model that illustrates the business’ strengths, weaknesses,
opportunities, and threats. This is normally used to address multiple aspects that could
directly affect the business. Being able to address the issues brought about by this model will
contribute in the development of the business.
2. Benchmarking – this is a process of comparing the current business state to the different
businesses of the same nature. This is usually used to equate the business’ performance
with the nearby competitors. The current state of the business must be improved if it seemed
that they are not at par with the competitors.
3. Market Research – this is conducted to identify the current market and consumer trends that
directly affects how the business operates. New trends must be addressed to ensure that the
business can keep up with the changes.
Aside from the tools used above, the aspects of improvement, development, and growth must be
clearly identified:
After using the tools and evaluating the areas for improvement, applying the appropriate actions to
enhance them now lies in the hands of the entrepreneur. Since improvement was described to be
measurable, it is possible to rate the current state of the business with the state it has become after
all improvements and developments have already been applied.
Question
Which of the following statements is true about establishing and running a business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Which of the following greatly affects the current state or status of a business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Which of the following tool is used to identify the strength, weaknesses, opportunities, and threats of a business
undertaking?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
What tool is used to compare a business to another business in the same industry?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which of the following states that the area for improvement must be clearly defined?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
To assess if there are really improvements, all enhancement procedures must be _____________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Which of the following must be taken into consideration when trying to enhance a business aspect?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
In this lesson, you should learn how to align one’s PECs according to his/her business/career
choice.
In venturing into entrepreneurship, one must consider the challenges of what launching a business
will bring. Some of the challenges experienced by first-time business owners are the lack of
experience in launching and running a business and the insufficient skills in managing the people
and resources. Anyone who wants to succeed in running a business must have a set of
characteristics fit to become a successful entrepreneur. This is called the Personal Entrepreneurial
Competencies or PECs. These are abilities that help an entrepreneur in meeting the challenges of
the business.
Achievement cluster focuses mainly on results and methodology. The qualities included in
this group are opportunity seeking and initiative, risk taking, demand for efficiency and
quality, persistence, and commitment to the work contract.
o Opportunity seeking and initiative is to act immediately when the opportunity arises
and pays attention to the needs of the customers.
o Risk taking is being proactive yet able to calculate the risks and minimize losses.
o Demand for efficiency and quality means accomplishing tasks. It also means
performing businesses better, faster and cheaper.
o Persistence is to face a challenge with a good plan. It comes up with a good
alternative to meet a challenge or business demand.
o Commitment to the work contract is to accomplish goals on time.
The planning cluster concentrates on the workflow processes and the goal-setting part of the
business. The skills belonging to this group includes information seeking, goal setting, and
systematic planning and monitoring.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
For a business that relies heavily on selling products, which cluster should be strengthened?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Multiple Choice
Question
What are the two main reasons why entrepreneurs fail in running a business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
If you would like to run a small grocery store in your town, what is the competency group that you will need to achieve
this?
A Plan of Action That Ensures Success of His/Her Business/Career Choice
Objective
Learn how to create a plan of action that ensures success of his/her business/career choice with the
help of this lesson.
Choosing to venture into entrepreneurship is a big challenge. It requires a person to hone his or her
skills to meet the challenges and demands of the business. Before going into full pledged
entrepreneurship, one must create a plan of action to ensure success. This also applies to fresh
graduates or those who are thinking of moving into another career path.
A plan of action should have goals that use the SMART principle - specific, measurable, achievable,
realistic and time-bound. Avoid putting too many goals and instead focus on those that are
achievable in a given period.
For example, if you are interested in putting up a computer services or repair shop, you need to get
information about the market.
First, you must also determine the required skills and experience in order to run the business
smoothly. Taking up basic crash courses on how to repair computers, where to get replacement
parts or locating the nearest supplies are needed to have a better understanding of the business and
the consumer needs. Get to know the peak and off peak season to know the profitability of the
business.
The second important step is to look at the resources that you have and you will need. List
down the needed resources and figure out how you will get these.
Third, know when is the rightful time to launch the business. If computer repairs peaks on
summer season, be prepared to have plenty of replacement parts and repairman on hand.
Determine the months that are considered profitable for the business. You can also look at
supplementary ways to increase cash flow.
Fourth, have a handful of people who can work well with you. Having the right team will make
work easier and more efficient. You can invite your network to be a business partner or refer their
friends who are looking for work.
Fifth, set a realistic timeline. Make sure that the timeline that you foresee for the business is
attainable and workable. This applies from the planning phases, the launching and the sustenance
of the business.
These are just some of the steps that one can include in his or her plan of action for any chosen
business or profession. Keep in mind that every plan has to be coupled with the right course of
action for it to become a success.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
The fourth step mentioned in the lesson is to network with other people. Why is this important?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Environment and Market
12 topics120 questions
Topics under this module
Objectives
At the end of this lesson, you should be able to identify what is of “value” to the customer.
The general definition of customer value is the difference between what a customer would attain
from purchasing a product against what he or she has to give. This means the more they get for the
least amount means higher value. As simple as it may sound, not all sellers know the value their
customers are looking for.
1) Gather the relevant data to gain a better understanding of what is valuable to them. Market
research is the discipline that allows companies to get insights from their customers, which helps
them to gain competitive edge for their business. In gathering data, you will have to identify the
particular product and the market segment to gather data from. Since this is the initial phase, it
would be a good idea to choose a segment of the market that already has a good amount of
knowledge about the product or service you are providing.
But before approaching the customer, you should already have an incentive to give out, in order to
make their time providing you with data worthwhile. For example, you might want to offer a free
sample of the product or a discount of the service.
2) After collecting the data, you must analyze the information. This will help you determine what the
customers think of the product and if it answers their needs or wants. This information will help in
either improving or replacing certain features of the product itself or other aspects of promoting and
selling it. Price, place and positioning can be also improved depending on the analysis.
3) Once the enhancements are done, you must monitor the performance of the product. This will
help gauge if the research is successful and to check if the customers are happier with the
improvements. It would be necessary to do another customer feedback survey in another period to
determine if the needs and wants of the target market are still being met.
Tips
Knowing the value of your product to its target clients gives it a competitive advantage over other
brands. The key is to get the customers’ insights and feedback to help improve the product and
make it competitive and relevant to the target market.
Question
Why is it important to know the value of your product to its target clients?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
In this lesson, you will learn how to identify the customer to sell to.
After carefully choosing your preferred business, identifying your potential markets and competitors,
and launching the business, it is time to market and sell your products or services. Determining the
profile of your customers will help in creating the appropriate advertisements to attract buyers or
end-users to buy your product or availing your services.
To come up with a sound marketing and sales plan for these target markets, you must know how to
segment them according to their profile. You must know how to divide a broad set of customers into
subsets, with each group having the same set of interests, demographics, buying capabilities, etc.
Doing this enables you to make the right approaches to these target markets while addressing
common needs. This saves resources while achieving higher sales.
Assessing your product and the needs it can answer, can help you determine who will purchase it.
You can categorize these customers as your primary target market. The rest of the customers are
whom you can classify either as secondary or tertiary target markets. You can create as many
subsets as you want, but take note that the primary targets are those who will be most interested to
patronize your product. Below is a guideline to know more about your customers:
Single Answer
Question
Who are your customers?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Multiple Choice
Question
What should you do to come up with an effective sales and marketing plan for the target markets?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
How many subsets of the target market can you create?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Multiple Choice
Question
Who can be considered as the primary target markets for a company selling air conditioners?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Multiple Choice
Question
In the example mentioned in the lesson, who are the target markets for the mobile application that measures
heart rate?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Multiple Choice
Question
Why is it a competitive advantage to know your customers?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Which of the following can help in getting to know your primary target market?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Multiple Choice
Question
In the example stated in the lesson, the newly-wed couple would most likely buy a bungalow or townhouse.
Which are the possible reasons why they will purchase either of the units?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Multiple Choice
Question
What are the advantages of creating an effective sales and marketing plan?
What Makes a Product Unique and Competitive?
Objectives
At the end of this lesson, you should be able to explain what makes a product unique and
competitive.
There are many different products and services that are selling the same idea to a particular group
of customers. This makes promoting and selling the product difficult unless it stands out from the
rest.
See it!
A good example is the smartphone industry.
The operating software should be the most updated version, the size and form factor should
be the preferred dimensions of the customers, the applications should be relevant to the
end-users, and battery life should have a backup storage.
The manufacturer should also consider the price range, its competitors and the potential
market to make a unique product.
Aside from these, the company should also know what motivates their customers to buy and
use their products. The buying habits and preference of the consumers dictate the possible
features of a new service or product. Otherwise, the product will simply be an enhancement
of a previous model and customers will least likely spend on it.
See it!
Another good example are coffee houses.
What do you think?
All cafes serve the same cup of hot cappuccino, but the service, environment, pastries and customer
experience makes it different from other coffee houses or restaurants.
Tips
It is important to remember that customers choose a particular product because of their personal
experience in using it. Having a unique and competitive product means it should maintain its quality
and deliver its promise to the market.
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Multiple Choice
Question
In the given example, smartphones are able to stay competitive if it can surpass the latest model. What are the
features that make a smart phone stand out?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Multiple Choice
Question
Multiple Choice
Question
What are the reasons why customers become loyal to a particular product?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Ace has created a new type of software for mobile devices. What is the first step that he needs to do to market and
sell his product effectively?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Multiple Choice
Question
You own a laundry shop in the local neighborhood. What are ways to keep your customers loyal to your business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Multiple Choice
Question
Which of the following can possibly happen if a product does not compete well with other brands?
Applying Creativity and Innovative Techniques to Develop Marketable Product
Objectives
You should be able to learn how to apply creativity and innovative techniques to develop marketable
product at the end of this lesson.
Having a creative, and innovative product or service usually attracts potential customers into trying
them. Most businesses, especially those who are just starting up, would have to think of ways on
how to apply creativity and innovation to their products and services in order for them to stand out
against the competitors. The product in mind may be similar in nature with those that are already in
the market, but twists and ingenuity must be incorporated into it.
Listed are the creativity and innovative techniques to develop marketable products:
1. Create – this step requires creative thinking of a new product, or finding ways on how to
recreate an existing one.
2. Deliberate – after having multiple ideas on what product or service to sell, proper deliberation
with the stakeholders must be accomplished to choose the best option among all the
creative ideas.
3. Market Research – once deliberation is done, a thorough market research must be
accomplished to know the potential customers of the product or service. Market
segmentation can also be done in this step.
4. Evaluate – this requires the assessment if the business will be able to sustain the production
of the service given a certain demand.
5. Market – after determining the potential customers and the ability of the business to produce,
the next big step is to think of ideas on how to sell the product. A business plan or a
marketing plan is required to do so.
6. Build – this is usually started by creating a prototype, a mockup or a test product.
7. Trial and Adjust – prototypes that were recently built must be tested if it passed the quality
control standards and complies with regulatory and safety requirements. If any unwanted
results occur, proper adjustments must be made.
8. Produce – after creating a prototype and testing it, production stage must now be carried out.
This is where mass production of the final product is accomplished.
Tips
After performing all the procedures above, a business will now be ready to produce and sell creative
and innovative products to the market. Having these creative and innovative products will be an
edge against competitors, whether direct or indirect.
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
What technique includes the choosing of the best idea among all the concepts?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Single Answer
Question
In what stage does determining the potential customers comes into mind?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
What technique is used to check and alter the prototype of the product?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Which of the following statements is true about creative and innovative products?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
A Unique Selling Proposition (USP) to the Product/Service
Objectives
In this lesson, you should learn how to employ a Unique Selling Proposition (USP) to the
product/service.
“Unique selling proposition” or “unique selling point” is a marketing term which is used to identify a
specific product or service benefit that is only available through that product or service. The term
was created by Rosser Reeves, author of “Reality in Advertising.” It is not a characteristic which can
be associated with any of the competitors’ products or services. In effect, this unique feature allows
the business to create a unique selling proposition. In other words, this single feature becomes the
focus of the advertising message and of any other associated marketing or selling activities.
Characteristics of a USP:
Single Answer
Question
Which of the following does not describe a USP?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
This one is often used as a last minute incentive to buy a product.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Identify the type of USP used in the statement below.
“4 out of 5 software engineers recommend it.”
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Identify the type of USP used in the statement below.
“If you’re not satisfied in the first 30 days, we’ll refund your money.”
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Identify the type of USP used in the statement below.
“Cleans up, tunes up, and speeds up your PC to help it run like new.”
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Identify the type of USP used in the statement below.
“We’re on call 24 hours a day.”
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Identify the type of USP used in the statement below.
“We are a low-fee computer service center.”
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Identify the type of USP used in the statement below.
“We specialize in password removal and recovery.”
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Identify the type of USP used in the statement below.
“Permanently eliminates malwares.
Criteria and Steps in Selecting a Business Idea
Objectives
At the end of this lesson, you should be able to enumerate various criteria and steps in selecting a
business idea.
Venturing into entrepreneurship takes a lot of thinking and time. It is also one of the most difficult
decisions that you will make. There are a lot of factors to consider when starting a business and
choosing an idea is the first step. You have to think about the finances, customers, time, and
potential of the business.
1. What type of business are you interested in pursuing? You may start a creative agency
if you are inclined to art or a retail store if you love interacting with clients. Others start as
insurance agents or freelancers who have the freedom to expand their networks and earn
unlimited income.
2. Is it something you personally love doing? Businesses are often started from a hobby or
a skill that you have. You may be fond of fashion, food or photography which can be pursued
as a businesses. Find out if the business is something you are genuinely passionate about
and make sure to nurture it well.
3. Will the business idea answer a need or an existing problem? The potential of a
business depends on the perceived need of a customer or an existing problem that has no
solution. You can think of your community and see what areas or services that can be
improved. For example, you can start a tutorial class within the neighborhood for children
who have difficulty in keeping up in subjects such as Math or Science.
4. Is there a market for your business idea? Think of the target customers that your product
or service will cater to. Before launching the business, you need to do market research to
know more about the customer preferences as well as the competitors. This will affect the
profitability of the business and its growth.
5. Will the business need capital? Some ventures are dependent on capital while others can
start with virtually zero funds. Assess the financial requirements of the start-up and
determine if it will need minimal or large capital.
Tips
There are a lot of opportunities in entrepreneurship and it will be more rewarding if it is something
that you are truly engaged in. Always remember that every successful business came from a simple
idea that was coupled with hard work and determination.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
What do you need to do to know more about the customers and competition?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
John is thinking of starting a new business. He is passionate about gourmet food and cooking. What type of business
will he most likely pursue?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Multiple Choice
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Applying the Criteria/Steps in Selecting a Viable Business Idea
Objectives
You should be able to apply the criteria/steps in selecting a viable business idea at the end of this
lesson.
A business idea is a concept that is usually used as the starting point of a business venture. It is
usually materialized in a form of a product or a service that is offered to consumers to gain profit. In
order for business idea to be recognized as viable, it must possess certain criteria and conditions
that will be beneficial to the growth and development of a business venture.
1. Perform Market Research – this step must never be taken for granted. A well-accomplished
market research can spell success or failure for the business venture. There are two types of
market research, primary and secondary. The only difference is that primary market research
is done by the entrepreneur himself while secondary market research are obtained from
other sources.
2. Identify the Potential Customers – after careful market research, the target market must be
identified. This will be the main source of profit for the business since these customers are
the ones who will be willing to pay for the product or services that you will offer. If potential
customers are not well-defined, it will be hard to assess the viability of the business idea.
3. Know the Competitors – competition is always present in running a business. In order to gain
a competitive advantage over the competitors, an entrepreneur must be able to devise a
plan or idea to edge them. Failure to do so will not put the business idea on top of whatever
product is already offered by the competitor.
4. Recognize the Industry Trends – short-term and long-term trends must be recognized. Both
of these will greatly affect the business venture. This is normally influenced by the economy,
demand, and technological advancements. Failure to recognize the current trends will make
the business idea a disaster.
After the criteria are identified and steps are properly followed, the viable business idea can now be
materialized into a product or a service. The only thing left to do is find ways to commercialize the
product or service to turn the viable business idea into profit.
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Aside from turning it into a product, a viable business idea can also be materialized as __________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Which step is described by knowing the people who are willing to spend money on the product?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What step is defined by identifying the potential rivals of the business idea?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
What step is described by realizing the current business situation?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What is the next step to be taken after finalizing that the business idea is indeed viable?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What is the next step after producing and marketing a viable business plan?
Determining a Business Idea Based on the Criteria/Techniques Set
Objectives
Learn how to determine a business idea based on the criteria/techniques set with the help of this
lesson.
In order to thrive in establishing a business venture, an aspiring entrepreneur must have a viable
business idea that will anchor his undertakings to success. A business idea is a concept that is
materialized and then commercialized once certain criteria are met and there is a significant market
for it. Being able to meet the conditions needed in thinking of a business idea to the actual selling of
it to the customer must be well studied and calculated.
1. Demanded – in this criterion, a thorough market research must be conducted. No matter how
good or innovative a business idea is, it will not be successful if there really is no real market
for it. Continuing to put efforts in an idea that will not sell will only waste the business’
resources.
2. Profitable – the business idea must be lucrative. Investing in a business idea that will take
years to return the investment of the entrepreneur may not be viable at all, especially for
business that are just starting up. The possible profit from the business idea must be well-off
from the amount of resources spent on it.
3. Competitive – a business idea must have an edge over the competitors, this is called
competitive advantage. When thinking of a business idea, the current products and the
competitors that are in the same industry must be taken into account in order to come up
with a concept that will bring some sort of lead over them. This will make the product or
service attractive to the consumers.
4. Aside from the mentioned criteria above, a viable business idea must also meet the
objectives and goals of the entrepreneur. These objectives are often the center of all the
business activities that an entrepreneur engages in. Being able to meet the objectives set by
the entrepreneur will make it easier to materialize and commercialize the concept.
5. The business idea must also be attainable. This can be based on the resources that are
readily available to be used in marketing, producing, and selling the concept. If too much
resources are needed to the point that the business will not be capable of providing, the
business idea may not be viable at all. The skill, expertise, and capabilities of the
entrepreneur and his team must also be considered. If they are not capable of materializing
the business idea, it is not viable.
6. Business ideas must always undergo strict scrutiny. Failure to do so may spell failure for the
business especially if all resources and attention have been put to it only to realize in the end
that it was not even viable to start with.
Question
Which of the following is considered as the starting point of a start-up venture?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
If consumers are willing to spend money on a product or service, it means that it is ____________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Which of the following business activity can determine of a business idea is demanded or not?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Which of the following must be done if little or no market demand was determined for the business idea?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which of the following statements is true about return of investment for a start-up business?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What term is used to describe an edge over the competitors and their products?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
If all resources are already available, a business idea can be considered as ______________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Which of the following people determines if there is a real demand for a product?
The Benefits of Having a Good Brand
Objectives
After completing the lesson, you should be able to identify the benefits of having a good brand.
The brand name is the single most important element for a product and plays an influential role in
determining whether new brands succeed. It works with advertising and other product features to
communicate and position the brand’s image.
The brand name identifies the product and differentiates it from others on the market. A good brand
name can evoke feelings of trust, confidence, security, strength, durability, speed, status, and many
other desirable associations.
A brand name should satisfy several fundamental requirements: it should describe the product’s
benefits, be compatible with the product’s image, and be memorable and easy to pronounce.
According Chiaravelle and Schenck (2014), great brands create consumer trust and emotional
attachments. As a result, they foster relationships between consumers and products that lead to the
following valuable benefits:
Premium pricing: Consumers pay more for branded items that they believe have higher
value and lower risk than lesser-known alternatives.
Lower cost of sales: Consumers of valued brands make repeat and frequent purchases. As
a result, customer-acquisition costs are amortized over a long-term client relationship.
Amortize – to pay money that is owed for something by making regular payments over a long period
of time.
- Lower cost of promotion: Consumers of valued brands become ambassadors who spread
positive word-of-mouth at no cost to the brand.
- Higher market share: Valued brands acquire loyal customers who recruit more customers to the
brand, increasing the brand’s share of market while reducing customer-development costs and
building immunity to competitive attacks.
Customer Development – it is a process for discovering and validating market demand for an idea
and determining the right product features to meet customer needs through interviews and
structured experiments. Customer development is used to help build products that customers want
and avoid spending time and money on products customers don’t want. It can be used to identify
problems and new startup ideas, to test ideas, and to optimize ideas and existing products.
Customer development helps us learn about our potential customers so we can build products they
will actually use.
Lower employee turnover: Great brands attract passionate employees who pass their
enthusiasm to satisfied consumers, who in turn make employees’ jobs more enjoyable,
reducing employee turnover as a result.
Higher stature: Valued brands enjoy a high level of awareness and esteem in the minds of
consumers, industry leaders, community leaders, news editors, and financial analysts and
investors, which leads to yet higher brand preference and marketplace prominence.
Keypoints
The brand name is the single most important element for a product and plays an influential
role in determining whether new brands succeed.
Great brands foster relationships between consumers and products that lead to the following
valuable benefits: premium pricing, lower cost of sales, lower cost of promotion, higher
market share, lower employee turnover, and higher stature.
Identify if the following statement is true or false.
Great brands create consumer trust and emotional attachments.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Identify if the following statement is true or false.
Consumers of valued brands make irregular purchases.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Identify if the following statement is true or false.
A brand name should be memorable and easy to pronounce.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Identify if the following statement is true or false.
Consumers of valued brands spread positive word-of-mouth at no cost to the brand.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Identify if the following statement is true or false.
Great brands promote employee turnover.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Identify if the following statement is true or false.
Customer development is used to help build products that customers want.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Identify if the following statement is true or false.
Valued brands enjoy a high level of awareness and respect.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Identify if the following statement is true or false.
Consumers pay more for branded items that they believe have lower value and higher risk.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Identify if the following statement is true or false.
Valued brands acquire loyal customers who recruit more customers to the brand, increasing the brand’s
share of market and customer-development costs.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Identify if the following statement is true or false.
Customer-acquisition costs are amortized over a short-term client relationship.
We hide question answers, hints and explanations, to prevent students from cheating.
Recognizable Brands in the Town/Province
Objective
In this lesson, you should be able to learn how to enumerate recognizable brands in the
town/province.
One of the basic but most important aspects of establishing a business is forming a brand. Branding
is a scheme that will give a business a certain competitive advantage against the existing players in
the market. A brand can be considered as the name of a business including the products and
service that they provide, or it can be considered as a statement that tells the consumers what to
expect from your business.
The following are the criteria that must be observed when checking out the brands of the
competitors:
1. Uniqueness – means that it has nothing equal or equivalent. An aspiring entrepreneur must
determine how the brands of the competitors employ distinctiveness among others. Based
on this, a unique brand must be thought of in order to stand out from what the competitors
are employing into their brand.
2. Target Consumers – this pertains to the possible customers of the product or service. One
must know how the brands of the competitors aim at specific customers. Knowing this will
provide an insight on how to create a brand that will be a sure hit among the target
consumers.
3. Message Delivery – this relates to the meaning of the brand. Most brands have a certain
slogan that pertains to the quality of the products or service that they offer. Studying how the
competitors use such slogans will help in creating your own. In most cases, slogans are
created to counteract whatever statement the competitors says.
4. Steadiness – refers to the unfailing capacity of the brand to deliver. The competitors may be
highly recognizable because their brand continues to stand out. Knowing how to consistently
uphold the promised principles of a product or a service will make your brand recognizable
as well.
The business environment where a potential business venture belongs must be well observed and
studied. One of the most basic things to know is the recognizable brands of the competitors. Failure
to do this may result to bankruptcy because improper or inadequate research on the existing brands
will not result in deriving your own brand that has competitive advantage against them.
Aside from telling what the business promises to the customers, what does a brand refer to?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What term is used to describe an edge over the rival business in the nearby area?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
What term is used to describe the businesses that offer the same products and services as yours?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What must an aspiring entrepreneur do to make his message delivery stand out against the competitors?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Which of the following refers to the unfailing capacity of the brand to deliver?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Which of the following can result from incomplete research of the current brands in the nearby area?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
In this lesson, you should be able to enumerate the criteria for developing a brand.
According to Shimp and Andrews (2013), choosing a proper brand name is an important decision,
primarily because that choice can affect early trial of a new brand and have an effect on future sales
volume. A product’s brand name plays an important part in shaping its immediate achievement upon
introduction and its persistent success as it matures.
1. Distinctiveness – A brand name should have a quality or characteristic that differs from
others.
2. Brevity – A brand name should be short enough to be used and remembered easily.
Consumers have limited mental capacity and find it easier to remember short words in
memory.
3. Appropriateness – A brand name should be appropriate with the business purpose of the
product or service.
4. Easy spelling and pronunciation – A brand name should be easy to spell and pronounce.
Avoid unique spellings or pronunciations that consumers won’t remember.
5. Likability – A brand name should be aesthetically appealing or likeable. Names that are
intellectually interesting or give a good “mouth feel” have more advantage than others.
6. Extendability – A brand name suggests a visual interpretation and lends itself to graphic
displays and other creative executions.
7. Protectability – A brand name should be available to trademark. A trademark is something
that identifies a specific brand and cannot be used by another business without permission.
Strongly defend trademarks from infringement by competitors.
8. Meaningfulness – A brand name should be reflective of product benefits. Names that convey
consumer benefits help consumers’ interpretation of brands.
9. Flexibility – Develop brand names that allow flexibility. The brand name should allow the
brand to adapt to changing market needs. For example, Apple™ was able to expand from
computers into MP3 devices and mobile phone handsets, while retaining the image of the
brand.
10. Positivity – A brand name should elicit positive associations in the market served.
Keypoints
There are ten (10) criteria in developing a good brand name: distinctiveness, brevity,
appropriateness, easy spelling and pronunciation, likability, extendability, protectability,
meaningfulness, flexibility, and positivity.
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
True or False
A distinctive brand name has a quality or characteristic that is distinguishable from others.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
True or False
A brand name shouldn’t turn into a spelling test or make people ignorant.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
True or False
Consumers have infinite mental capacities and find it easier to remember short words in memory.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
True or False
A flexible brand name lends itself to graphic displays and other creative executions.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Generate a Clear Appealing Product Brand
Objectives
You should learn how to generate a clear appealing product brand at the end of this lesson.
If you are prepared to brand yourself or your business, you should have a clear insight of what
developing a brand essentially entails. In this lesson, you will be guided on how you can generate a
clear appealing product brand.
Make a decision of what you are intending to brand.What do you want to brand: an
individual, a product, a company, or a service?
Undertake research. First, know your market. Second, know about your product or service.
Emplace your product or service. Discover and gain a place for your contribution in the
market and in consumers’ minds by giving only one of its kind solutions to the problems or
necessities that aren’t being concentrated on by competing products.
Compose your brand definition. A brand definition explains what to proffer, why you
proffer it, how your proffering is distinctive and better, the advantages and guarantees that
your customers can be assured of.
Create your name, logo, and tagline. A name is the key that opens the lock on the image
of your brand in the mind of your customers. A logo is the brand symbol that appears on your
product. A tagline is a remarkable phrase that gives customers a brief indication of your
manufactured goods, brand, and market position.
Introduce your brand to the public. Your brand becomes known to the public when you
reveal the name, logo, and slogan, and when you start to inform your market the story of how
your brand suggests what you stand for.
Administer, leverage, and secure your brand. This is the “care and feeding” part in the
process of branding; it’s the stage that results to a strong, healthy, and resilient brand. Akin
to smart parenting, proper management of brand can be summarized in one word –
CONSISTENCY.
Organize your brand in a different way or realign it to keep it up-to-date. From time to
time, you can (and should) modify how your brand is offered. You also need to keep your
brand presentation up-to-date to keep it appropriate to the marketplace.
3 Rules of Branding
As you introduce and administer your branding program, keep in mind these three branding rules:
Your brand is a guarantee that must be strengthened every time people come to get in touch
with any feature of your organization.
Your brand must exactly manifest the core values of your organization, your management or
leadership, and all who bring your brand experience to customers.
Consistency develops brands, so every time you come across with your brand – whether
with your employees, manufactured goods, websites, advertising communications, news
reporting, social media, or any other type of brand experience – must reliably express the
promise of your brand and contribute to your preferred brand identity.
Question
Arrange the following steps in brand development process.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
It is a memorable phrase or sentence that is closely associated with a particular product.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
It is a symbol that is used to identify a company and that appears on its products.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
It is the key that unlocks your brand image in your consumer’s brand.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
It describes what you offer, why you offer it, how your offering is different and better.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Identify the following statements as true or false.
It is important to update your brand presentation.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Identify the following statements as true or false.
Good branding management can be summed up in a single word – consistency.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Identify the following statements as true or false.
Provide solutions to problems or needs that are already addressed by competing products.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
If Sheila finds out everything there is to know about the market around her and finds out everything there is
to know about her product and service, she is __________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
This is the “care and feeding” phase of the branding process
Configuring Computer Systems and Networks
15 topics141 questions
OHS in Planning and Preparing for Configuration of Computer Systems and Network
Preparing Computer Systems, Tools, Devices, Equipment and Materials
Checking Computer Systems and Networks Configuration Against Specified
Requirements
Procedures in Using the Tools and Equipment
OHS Procedures in Configuring Computer Systems and Networks
Inspect Networking Devices, Media and Connectors
Creating Cross-over and Straight-through Cables
Assigning IP Address to Clients and Servers
Configuring the Assigned IP Address to Clients and Servers
Enabling Network Security to the Computer Systems
Configuring File and Printer Sharing
OHS Procedures in Testing Systems and Networks
Testing Computer Systems and Networks in Accordance with the Job Requirements
Accomplishing Technical Reports on the Tests Conducted
This topic is under development.
OHS in Planning and Preparing for Configuration of Computer Systems and Network
Objectives
At the end of this lesson, you should be able to follow OHS in planning and preparing for
configuration of computer systems and network.
Occupational health and safety policies and procedures must always be observed in fulfilling any job
requirements. One of the requirements that requires strict implementation and practice of OHS
procedures is configuring computer systems and networks. Various workplaces have diverse sets of
OHS procedures that they find it necessary to carry out the tasks safely and efficiently.
1. OHS policies and procedures must be discussed prior to any planning. This can be done by
the IT manager or if the workplace has one, a safety officer.
2. If OHS policies and procedures has not yet been established, it may be developed
concurrently with the planning.
3. All technicians and other personnel involved must be well aware of the contents of the OHS
policies and procedures. This will serve as the guide in performing tasks correctly and safely.
4. During the preparations, technicians may be assigned to a specific task depending on his
expertise to ensure competence and safety. This will increase efficiency and effectivity.
5. The job requirements must be made clear so that proper tools, equipment, and materials can
be requested beforehand. Proper handling of tools and equipment must also be included in
the contents of the OHS policies and procedures.
6. Personal protective equipment must also be readily available before starting any actual
configuration. This will minimize if not prevent the risk of having an injury or illness.
7. The list of computer systems and the networking devices must be prepared. Their technical
and physical specifications must also be indicated so that adequate preparations in handling
them can be done.
8. The location where the system and network configuration will take place must be studied to
define any hazards that are present. This is known as hazard identification. Some of these
hazards can be electricity, high working area and difficult to reach places.
9. The effects that a hazard must also be taken into consideration. This is known as risk
assessment.
10. A set of contingency plans must be arranged in case any hazard translated into a risk. These
plans are referred to as risk management plans. This will ensure that proper procedures will
be done in the event of an unwanted accident.
In the end, having a concrete plan and preparation for any activity is needed so that a job
requirement can be carried out timely and efficiently. Personnel must also maintain diligence in
performing their tasks so that risks can be greatly minimized.
Question
What set of policies and procedures can help minimize the hazards and risks present in a workplace?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Who is responsible for discussing the OHS policies and procedures to the technician?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
What is the best way to ensure that technicians can perform efficiently and safely at the same time?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What type of equipment must be prepared in order to reduce the risk of inflicting injuries to the personnel who is
completing a job requirement?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What is used to discuss the gravity of the effect a hazard may inflict on anyone?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What information is needed from the computer systems and networking devices that will allow the technicians to
know how to properly handle them?
Objectives
You should be able to prepare computer systems, tools, devices, equipment and materials at the
end of the lesson.
In configuring computer systems and networks, it is important that the technician would know the
specific tools, devices, equipment and materials needed before starting any activity. Being able to
prepare all the needed things before commencing will not only make the configuration faster, but
more efficiently as well.
1) Computer System
All integrated and external peripherals must be installed. These peripherals are essential to
the entire operation of the computer system.
Ensure that an operating system is properly running. The OS will manage the overall
processes of the computer system.
Application software needed for the different activities should be installed. It must be run and
tested to ensure smooth compatibility.
The system drivers for all the peripherals must also be installed. System drivers will enable
the full use of a peripheral’s functionalities.
Tools must already be requested from the property custodian ahead of the scheduled
configuration.
Tools must be well inspected to ensure that they are in good operating condition.
Tools that requires repair or maintenance must be brought back to the property custodian.
3) (Networking) Devices
Servers must be installed if central data processing is needed. A special operating system is
needed to be installed in order for this to function.
Network switches must be checked so that the appropriate LAN speed can be met. The
number of ports must also be confirmed to make sure that it will be enough to connect all the
computer systems into a network.
If wireless routers will be used, the range and frequency of the signal must be checked
against the specifications of the computer systems that will connect to it.
4) Materials
A list of needed materials must be specified. Materials are commonly those which are
consumed.
The specifications of materials must be specified to ensure that they are compatible with the
components.
Correct quantity must be determined to avoid running out in the duration of the configuration.
In case the exact quantity cannot be determined, analogous estimation can be used which
derives the number from a previously completed task with the same requirement.
Completing the checklist indicated above may help a technician in determining if all the components
needed in the configuration are already prepared. Having all of these prepared will result in a hassle
free completion of the job requirement at hand. This may also increase the efficiency rating of all the
personnel involved in the said activity.
Question
What type of software must be installed to manage the overall processes of a computer system?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
When is the correct time to create a checklist for the configuration of computer systems and networks?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What type of equipment is needed if central data processing is one of the job requirements?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What must be checked to ensure that all computer systems can connect to a network switch?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
What must be checked in a wireless router aside from its signal strength to ensure that wireless clients can connect
to it?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
In case the specific quantity of materials could not be determined, what is the best thing to do?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Which person is mainly responsible in providing all the needed materials requested by a technician?
Checking Computer Systems and Networks Configuration Against Specified Requirements
Objectives
In this lesson, you should learn how to check computer systems and networks configuration against
specified requirements.
Before starting the installation and configuration of computer systems and networks, the specific
requirements must be considered first in order to come up with a setup that will be sufficient to
support all the tasks that will be faced in the future. Having a checklist on what equipment must be
installed, how these must be configured, and in what way will they be maintained must all be
checked thoroughly.
The type of connection is determined by the location, the type and number of devices that will
connect to the network, and budget constraints. For a small area with a small number of computer
systems and devices, wired connectivity is recommended. The advantage of having this type is
reliability and security. If the devices on the other hand are in a large area, wireless connectivity can
be used. Setting up a wireless access point is very easy and this will eliminate the use of cluttered
wires and cables.
Network configuration basically dictates how the computer systems and devices will behave.
Considering the job requirements that need to be accomplished by the computer systems will
determine the type of configuration.
For a small business where a central database is not needed, a peer-to-peer connection can be
established. This means that all computer systems will act equally among each other. This is a
simple setup that only needs a central access point, which can be a switch or a router.
For larger scaled needs, a client-server configuration must be established. This will have a powerful
computer system that will be assigned as a server that will provide resources to the clients
connected to the network.
In configuring a computer network, certain equipment are used to make sure that transmission of
data will be possible. Common networking equipment include hubs, switches and routers.
Hub – it connects all the computer systems together. Once data is sent, it is forwarded to all
the computer systems.
Switch – this is considered as an intelligent hub. Once data is sent, it is forwarded only to the
dedicated recipient.
Router – this transmits data from one network to another. Commonly used to connect
different local area networks together.
4) How to secure the network?
One of the most important thing to consider is network security. In a small network, enabling
the firewall (software) in each device can be sufficient enough. For larger scaled network,
installing a firewall hardware is recommended.
A wired network can be protected by securing all the ports that might be used for
unauthorized access. Wireless access points must be protected by a strong password,
preferably with a WiFi Protected Access (WPA) rating.
Once all of the above mentioned checklist have been accomplished, network configuration
may now commence. If all are taken into consideration, the configured network will have no
problem in meeting all the specified requirements at hand.
Q1
Single Answer
Question
What type of connection can be used for a very small area?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What type of network must be used when a very large number of connection is needed?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
What type of network configuration makes all computer systems equal?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
What type of configuration is established when a central database is needed?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Which of the following equipment is needed to establish a peer-to-peer configuration?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What type of network equipment sends a transmission to all the computer systems attached to it?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Which of the following network equipment sends transmission only to the dedicated recipient?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
What network equipment has the ability to transmit data from one network to another?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What type of password is recommended when using wireless connectivity?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Which of the following statements is true about wireless networks?
Procedures in Using the Tools and Equipment
Objectives
In this lesson, you should be able to identify the procedures in using the tools and equipment.
There are multiple tools and equipment needed to install and configure a computer network. In order
to accomplish the installation and configuration correctly, having the knowledge and skills in using
the said tools and equipment is needed. Improper use and handling may result in injuries and
damage the components of the system. In order to avoid this, proper procedures must always be
observed.
1) Use a tool for its intended function only. Listed below are some of the hand tools and where they
must be used.
The procedures in using these tools are quite easy and just require practical approach. No special
skills are even needed, just knowing when and how to use them is enough.
2) Network equipment are used to connect all the computer systems together. In order to know
which equipment to use, their usage must be well understood first:
Hub – this is the simplest of all the networking equipment. The downside of using this device
is that it broadcasts the transmission to all the computer systems attached to it, regardless if
they are the recipient or not. This is only recommended to be used in a very small network.
To use this, a twisted pair cable and RJ45 jack is required to be connected from the
computer systems to the hub’s ports.
Switch – this is considered as an intelligent hub. This equipment receives data from one
computer system and sends it only to the intended recipient. This is one of the most
commonly used network equipment today. To use this, connect the computer systems to its
ports via patch cables.
Being able to know the functionalities of tools and equipment used in networking will enable a
technician to properly use them. Performing the correct procedures will also ensure that the
configuration will be successful and will perform in accordance to the job requirements.
Q1
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Which of the following hand tools is used to attach a connector to a twisted-pair cable?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What type of cable is usually used to connect computer systems into a switch?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
To what port of a router must an Internet modem be connected in order to broadcast its signal to the computer
systems?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
To what port must the clients be connected in order to connect to the Internet via a router?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Add this topic to assignment
Create an assignment with selected topics
ENGLISH
TermsPrivacyContact Us
© 2020 Quipper Limited
OHS Procedures in Configuring Computer Systems and Networks
Objective
Learn how to follow OHS procedures in planning and preparing diagnosis of computer systems
errors at the end of this lesson
The diagnosis of computer systems errors is part of the responsibilities of the personnel from the IT
department. This is normally conducted after the configuration of computer systems in order to
detect any faults or errors that may be present. In planning and preparing the diagnosis, the safety of
the personnel as well as preserving the state of the devices and equipment is vital.
Listed below are the most common OHS policies and procedures that must be followed during the
diagnosis of computer systems:
1. All technicians must read and understand the contents of the OHS policies and procedures
on conducting diagnosis.
2. Every diagnosis must be conducted in a conducive environment, one that is well-lighted and
well-ventilated.
3. Use only the appropriate tools for diagnosis. Read the instructions to avoid damaging the
tools and equipment, and to prevent inflicting harm to the user.
4. Run the recommended diagnosis software for each particular component. Using a different
software may not only result to incorrect findings, but may also harm the components
causing it to overheat and even explode.
5. When dealing with unfamiliar procedures, the technician must seek help from the IT
manager.
6. All findings must be recorded so that it can be acted upon correctly by the IT personnel.
Aside from following the recommended OHS policies and procedures, the hazards in the workplace
must be identified so that the risks will be minimized, if not eliminated. In the end, it is the
responsibility of all concerned personnel to keep everyone safe and maintain the proper operating
conditions of all the computer systems.
Q1
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
In order to prevent any injuries, the technician must follow the ___________________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Aside from the safety officer, who is in-charge of ensuring that OHS policies and procedures are followed?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Which of the following tools must be used in the diagnosis of computer systems?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
To whom must a technician seek advice when dealing with unfamiliar situations?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What procedures must be taken after getting the results from the diagnosis?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
At the end of this lesson, you should learn how inspect networking devices, media and connectors.
Conducting an inspection or assessment after the installation and configuration of computer systems
and networks must always be done to ensure that all will work and function according to the job
specifications and requirements.
1) Networking Devices – these devices include those that are designed to act as a common
connection point for all the computer systems and other devices. Examples of networking devices
are hubs, switches and routers.
Always read the labels of all these devices to ensure that they have correct specifications.
Physically scan the devices for any dents, or external damages. These damages may lead to
malfunctions.
Check the power cables for any breaks. Damaged power cables may lead to short circuiting
and electrocution.
Ensure that all ports are free from any clogs and foreign objects to allow a connector to
properly be inserted to it.
Test the connectivity by sending a “ping” to the networking device using a connected
computer system.
2) Media – this is technically called transmission media. This refers to the means of transmission in
any computer network. A common transmission media is the twisted-pair cable. Another
transmission media uses wireless technology or most commonly known as WiFi.
Always check if the cable installed are correct. Twisted-pair cables have categories that
determine its transfer rate or transmission speed, so make sure that the right one is laid
down.
Check the twisted-pair cables for any breaks.
Ensure that no other devices can cause interference or noise. Common interference are
cross-talk; this happens when a cable intersects with another.
For wireless media, make sure that the wireless access point can broadcast a signal that the
computer systems can scan or detect. Enable all the channels and frequencies available to
ensure that all types of devices can access it.
3) Connectors – these are small materials that are attached to both ends of a cable. It serves as a
means of connection between the cables and the ports.
Ensure that the correct connectors are used for a particular cable.
Always check if the connectors are firmly attached to the end of the cable. Usually, an RJ45
connector that is properly attached to a twisted-pair cable will not fall out even if a strong
force is applied.
Ensure that the contact points of a connector are free from any dirt or lint to guarantee that
proper connection with the contact points of the port.
In inserting a connector to a port, ensure that it is locked. A clicking sound can be heard
when proper insertion is accomplished.
Doing the procedures above will not absolutely ensure that the computer network will run perfectly.
Other factors may also affect the performance of the networking devices, media and connectors.
Regular inspections and testing must be made in order to ensure that the above mentioned will
continue to work and perform their functions effectively.
Q1
Single Answer
Question
Which of the following equipment is designed to act as a central access point in a computer network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What part of a network device must always be free from clogs or any obstruction?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Connectivity between the networking device and a computer system can be tested by sending a __________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
What must be taken into consideration to ensure that a twisted-pair cable will be applicable to the job requirement?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
What must be avoided or minimized when laying down cables?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Aside from allowing all channels to be broadcasted, what must be enabled in wireless devices to ensure that all
computer systems will be able to receive its transmission signals?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
This lesson aims to help you learn to create cross-over and straight-through cables.
In configuring networks, it is needed that a transmission medium be established to allow data to flow
along the different computer systems and components connected to it. It acts as the main pathway
for data and signals that runs through a network. The most common transmission medium used in
networking is a cable. Twisted-pair cables are normally the first option to use in establishing
connections within the network because it is both cheap and efficient. It is composed of four pairs of
wire with different colors, four solid and four with white stripe. The colors are orange, green, blue,
and brown.
Crimping tool – this is a special tool used to cut, hold, and attach and RJ45 jack to the end of
the cable.
Cutters or Scissors – can be used to cut the cable
Twisted-pair Cables – these are cables that are specifically used in networking.
RJ45 Jacks – these are the connectors attached to the end of a twisted-pair cable.
3) Remove the outer jacket of the cable to expose the four pairs of wires inside.
4) Untwist the wires. Make sure that they are free from any damage. A small cut may result in failure
to transmit.
5) Arrange the wires based on the type of cable you want to create:
Straight-through Cable – this type of cable is usually used to connect a client to a host, to a
switch, or to a server. This could also be referred to as a patch cable. Shown in the table is
the arrangement of wires for both ends of a straight-through
cable:
Cross-over Cable – this type is used to directly connect a host to another host. This type of
connection is referred to as peer-to-peer. Shown in the table is the arrangement of wires for
both ends of a crossover cable:
6) After determining the type of cable that will be created, cut the wires so that they will be of exact
length. Make sure that the end of the wires are perfectly aligned.
7) Firmly hold the cable and insert the wires into the RJ45 jack. The part with the lock must be
placed at the bottom.
8)Check if the end of the wires touches the end of the RJ45 jack. If not, push it a little more.
9) Once alignment is ensured, plug the cable into the crimping tool, firmly squeeze it while securely
holding the cable. Once a locking sound is heard, release the grip. Do the same with the other end
of the cable.
10) Use a LAN tester or a cable tester to ensure that the connection of all the wires in both ends of
the cable is transmitting.
Having the correct knowledge and skills in cabling is needed in order for a technician to properly
connect the computer systems and peripherals in a network. Following the steps indicated above
and knowing the job requirements before creating a cable is necessary to ensure that connections
will be established, materials will not be wasted, and devices will not be damaged.
Q1
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Which of the following is used to attach the RJ45 jack to the end of a twisted-pair cable?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
In inserting the wires to the RJ45 jack, the lock must be located at the _______________.
Assigning IP Address to Clients and Servers
Objectives
In this lesson, you will learn how to assign IP address to clients and servers.
In configuring a network, computer systems are assigned with specific roles. These roles will
determine how they will work and behave in a network. A computer system can either be a client or
a server.
A server on the other hand is a powerful computer, normally with high end technical specifications
and running on a server operating system, which supplies the needed resources to all the clients
which are connected to it. All networks have one or more computers that can be designated as a
server.
In order for all the clients and servers to be identified in a network, they are given their own
addresses. An Internet Protocol (IP) address is used to give each one a unique network identifier.
An IP address is a distinctive sequence of numbers that is divided by periods or dots. An internet
protocol on the other hand is a set of specific rules that governs how data and information are
transferred over the Internet or in a local area network.
An IP address has four numbers that is separated by dots. Each number ranges from 0 to 255. As
an example, 192.168.0.1 and 192.168.0.254 are both IP addresses that may be assigned to a
computer system, server, or network device. It is divided into two major parts, the first two numbers
is the network identifier (192.168) while the rest is referred to as the client/host address (0.254). IP
address can be assigned dynamically or statically.
A dynamic IP address is temporary and is assigned every time a computer system or device
connects to the server. This means that a client will get a different IP address every time. A Dynamic
Host Configuration Protocol (DHCP) is a client/server protocol that does this assignment. The range
of the IP address that the DHCP server can be predetermined by an administrator. The advantage of
using this scheme is being able to send automatic IP addresses to all the clients every time the
server changes its network preferences.
Static IP addresses on the other hand, as the name implies, never change. This means that this
address is manually embedded to the client/host and will never change even if it disconnects and
reconnects to the server anytime. Each client must be configured one by one in order to assign a
static IP address to all of them. One disadvantage of this arrangement is the long time consumed in
assigning IP addresses to all the clients and must be re-assigned if the server changes
configuration.
Keypoints
Knowing how IP addresses are and what their main functions is vital in the installation and
maintenance of a computer network.
These addresses can be used to maximize the capabilities of all the clients, network devices
and servers that are connected to a computer network.
Q1
Single Answer
Question
What term is used to describe a computer system that normally gets resources from a more powerful
computer in the network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What term is used to describe the most powerful computer in a network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Which of the following addresses uniquely identifies all the devices connected to a network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Which of the following sets the rules that governs the transmission of data in a local area network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
How many sets of numbers does an IP address has?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
The network identifier refers to the __________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
The host address refers to the IP address’ ________________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
What type of IP address changes every time a client connects to a server?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What type of IP address is manually assigned to the clients in a computer network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What protocol automatically assigns IP addresses to the clients in a computer network?
Configuring the Assigned IP Address to Clients and Servers
Objectives
In this lesson, you should learn how to configure the assigned IP address to clients and servers.
Internet protocol (IP) addresses are used to uniquely identify the clients/host, servers and the
different devices in a network. This address is used to whenever transmission and reception of data
or information is being sent through the Internet or in a local area network. Configuring the IP
addresses of devices is one of the basic competencies a technician must have in order to
successfully install, configure, and maintain a computer network.
If static IP addresses need to be assigned, the following must be taken into consideration:
1. Subnet Mask – this is used to determine which subnet an IP address belongs to. This is
normally defined by the network address, which is the first two numbers of an IP address
(192.168.0.1).
2. Default Gateway’s IP Address – this is the device that receives and transmits data and
information to the other subnets in a network. The IP address of the default gateway must
always be known by the technician in order to transfer data to the different subnets.
3. DNS (Domain Name System) Server Address – this is the IP address of a special server that
stores computer names and their corresponding IP addresses. Having this eases the way
devices communicate with each other.
After knowing the above knowledge, configuring the static IP address of a client may now
commence. Listed below are some of the general procedures to do so:
1. Open the Network and Sharing Center or the interface where network configuration can be
accessed.
2. Open the Adapter Settings. Local Area Connection can be chosen if connected by cables,
and Wireless Network Connection can be chosen if wireless connectivity is established.
3. Right click to expand the options and choose Properties.
4. On the dialog box, choose Internet Protocol, and click Properties.
5. On the next dialog box, tick the Use the following IP address radio button.
6. Supply the needed values in the IP address, Subnet Mask, and Default Gateway. Be sure to
know what to put.
7. If a preferred DNS Server is available, tick the Use the following DNS server address radio
button and supply the needed values.
8. Tick the Validate settings check box upon exit to determine whether there are problems in
the configuration.
9. Click Okay to save the settings.
After following the steps above, the device will now have a static IP address that will not change until
it is reconfigured by the technician. Common problems that may occur are duplicated IP addresses,
invalid subnet masks, and incorrect default gateway. In order to avoid these problems, proper care in
supplying the values is needed. A system with incorrect values will not be able to gain access or
connect with the other devices in a network. Testing is always a must after configuration.
Q1
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which of the following receives and transmits data from one subnet to another?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What type of special server stores the computer name to its IP address?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
What settings must be opened to view the type of connections available to a computer system?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What must be immediately done after supplying all the needed values in the series of dialog boxes?
Enabling Network Security to the Computer Systems
Objectives
At the end of this lesson, you should learn how to enable network security to the computer systems.
Establishing a network has a lot of advantages to offer. Some of these advantages are sharing
resources, easier transmission of data and information, and access to shared data stored in central
database. In order to ensure that these advantages will not lead to unauthorized access, security
measures must be established both on the computer systems and devices, and the network
infrastructure itself.
8. This is to ensure that unauthorized access through the ports will be prevented. All ports must
be placed on secured areas that is not accessible by guests or unsanctioned personnel.
10. Wireless access points allow devices to connect to the network using WiFi connection.
Because of this, it is susceptible to breach. In order to protect it, the default Service Set
Identifier (SSID), the network name that can be scanned by wireless clients, must be
changed or better be hidden. Setting up a more complicated password such as Wi-Fi
Protected Access (WPA) is also recommended.
11. 3) Install a hardware firewall
12. Although firewalls in a form of software is already available in computer systems, installing a
separate firewall in a form of a hardware will definitely boost the network’s protection. It has
special features that will help prevent unauthorized access, even from skilled hackers.
Tips
Enabling these security measures will not only make the network safe and protected, they
will also ensure that confidential information and resources will not end up in the hands of
unauthorized people.
Network security must be maintained and supervised at all times.
Q1
Single Answer
Question
What type of communication is prevented by a firewall?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What software must be installed to secure the network from any viruses?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
What must be disabled to conceal a computer system from other devices?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
What feature must be turned off to prevent unauthorized access to files?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
Usernames and passwords are examples of _________________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What technical term is used for the name that wireless devices can scan and connect to?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What type of password is recommended for wireless access points?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Which statement is true about firewalls?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Which of the following people should have logged on to the access point’s configuration interface?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Which of the following statement is true?
Configuring File and Printer Sharing
Objectives
In this lesson, you will learn how to configure file and printer sharing.
One of the main goals of configuring a computer network is to allow all the connected devices to
share resources. These resources are often in the form of files, peripherals, and Internet
connectivity. Once a computer system or peripheral has been connected to the network, resource
sharing is not enabled by default. It is the task of the computer technician to ensure that file and
printer (example of a peripheral) has been enabled.
1) Right click on the file and find the “Share with” option.
2) Choose the appropriate users that are allowed to gain access to your file. The access levels are:
Read – an allowed user will be able to view the file but not edit it.
Change – an allowed user will be able to read and edit the file.
Full control – an allowed user will be able to read, change, and delete the file.
3) Click the “Share” button to close the dialog box and finish the process.
4) If multiple files are needed to be shared, transferring it to the Public Folder or enabling sharing on
the folder where the files belong can also be done.
Listed below are the procedures in configuring file and printer sharing:
1. Ensure that the computer system and the peripherals are connected to the network, either
via cable or wireless connection.
2. Open the “Network and Sharing Center” (or just network settings in some systems) to access
the configuration window.
3. On the network and sharing center, click the “Turn on Network Discovery” radio button. This
will allow other computer systems and devices that are connected in the same network to
find the computer that is being configured.
4. Once network discovery has been turned on, click the “Turn on file and printer sharing” radio
button to enable file and printer sharing.
5. Click the Save Changes button to finish the configuration.
Once all the procedures have been accomplished, files and printers that were given the shared
property will now be accessed remotely by any device that is connected in the same network. The
shared resources can be accessed by typing the IP address or the computer name of the host
computer system into the run command. Keep in mind that before accessing any file or peripheral for
the first time, appropriate credentials (username and password) are needed for authentication.
Proper security protocols must be laid down to restrict unauthorized personnel and guests from
accessing the shared files and printers.
Q1
Single Answer
Question
Aside from establishing communications, what is the other main goal of a computer network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What property must be enabled to a file or printer before they can be accessed remotely by another computer
system?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Which of the following access levels allows a shared file to be viewed only?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
What access level allows a shared file to be viewed and edited, but cannot be deleted?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What option must be enabled to allow devices in a network to see or find each other?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Aside from the computer name, what can be typed in the run command to access a shared file or printer?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What is needed when accessing a file or printer for the first time?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What is needed to restrict unauthorized access to the shared files and peripherals?
OHS Procedures in Testing Systems and Networks
Objective
Learn how to follow OHS procedures in testing systems and networks with the help of this lesson.
Testing systems and networks are part of the maintenance that we need to do to our computer
system for it to perform well.
1. Always work with someone or have somebody near the place where you are working, so that
in case of problems or an emergency, there will be someone to assist you.
2. The computer should be turned off and unplugged before you work on it.
3. To avoid getting electrocuted, getting wet, or damaging any part of the computer, remove
any liquid around or near your work area. Make sure that all parts, as well as your hands are
dry.
4. Always be careful in using tools that may cause short circuit.
5. Before touching any part of the computer, always ground or discharge yourself first. You can
also use an anti-static wrist strap.
6. In handling the computer parts, never use excessive force.
7. Always keep work area clean.
8. Do not touch the Integrated Circuit or IC parts. Hold computer components at the edges.
9. Always follow the organization’s OHS procedures and practices. Always wear Personal
Protective Equipment (PPE).
10. Always wear clothes that are appropriate for the specific job and it must allow you freedom of
movement.
11. When connecting cable connectors, pins should be checked if they are properly aligned.
12. In case of any accident or other emergencies, contingency measures should be recognized.
13. Blower, compressed air, or brush should be used whenever the computer system is cleaned.
14. Never connect or use a telephone or modem during a lightning storm to avoid any electric
shock that can be caused by lightning.
15. Use an Uninterruptible Power Supply (UPS), surge suppressor, or line conditioner to help
protect the components of the computer system from sudden increase and decrease in
electrical power.
Q1
Single Answer
Question
True or False
Always follow the organization’s OHS procedures and practices. Never wear Personal Protective Equipment (PPE).
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
True or False
Do not touch the Integrated Circuit or IC parts. Hold computer components at the middle.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
True or False
Before touching any part of the computer, always ground or discharge yourself first. You can also use a static wrist
strap.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
True or False
To avoid getting electrocuted, getting wet, or damaging any part of the computer, remove any liquid around or near
your work area. Make sure that all parts, as well as your hands are dry.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
True or False
Never connect or use a telephone or modem during a lightning storm to avoid any electric shock that can be caused
by lightning.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
True or False
Use an Interruptible Power Supply (IPS), surge suppressor, or line conditioner to help protect the components of the
computer system from sudden increase and decrease in electrical power.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
True or False
When connecting cable connectors, pins should be checked if they are properly aligned.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
True or False
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
True or False
Blower, compressed air, or brush should be used whenever the computer system is cleaned.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
True or False
Objective
At the end of this lesson, you should be able to test computer systems and networks in accordance
with the job requirements.
After the installation and configuration of computer systems and networks, they must always
undergo a series of tests to ensure that they will function according to the job requirements. Several
procedures must be conducted so that accurate results regarding their performance will be correctly
gathered and compared. Job requirements pertain to specific conditions and results that must be
obtained while using a computer system or establishing connections to the network.
1. Perform basic computing – a computer system is installed and configured to aid a user in
completing basic tasks. A system may be tested by simply booting it up and running the
appropriate burn-in tests to ensure that it is in proper operating condition. Testing the results
can be done by comparing the outcomes from the computer system and a manually derived
solution.
2. Accomplish specialized tasks – this job requirement needs exceptional hardware and
software component to complete. Testing the component’s compatibility with the computer
system, as well as the smoothness of the software must be checked to ensure that any tasks
will be accomplished while using them.
3. Provide communication – this network function is needed for the connected devices in a
network to communicate with each other. This can easily be tested by sending a ping to the
desired device in which a reply must be sent back.
4. Facilitate resource sharing – this job requirement is accomplished by the network by
ensuring that files and devices can be shared. This can be tested by attempting to connect to
a shared device and conducting an operation remotely; just like printing on a printer installed
on another device.
5. Supply Internet connection – this task allows all computer systems that are connected to the
network to access the Internet. This can be tested by running web browser application and
accessing a website or sending a ping to the web address in which a reply must be returned.
In reality, workplaces and end-users vary in the needs to accomplish specific job requirements. The
above mentioned are just the common job requirements that are native to all computer systems and
networks. Specific job requirements must be tested using the appropriate testing procedures to
ensure that will work accordingly.
Q1
Single Answer
Question
What is the main responsibility of a computer technician after the installation and configuration of computer systems
and networks?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Which of the following pertains to specific conditions and results that must be obtained while using a computer
system?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Testing the results of basic computing tasks can be accomplished by comparing the outcomes that was done
_____________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
What must be tested if a special hardware or software is to be installed to complete a specialized task?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What must be sent to a remote device to test whether communication has been established?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Before testing whether a device can connect to a remote file or device, it must be ___________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Aside from running a web browser, Internet connection can also be tested by sending a ping to the
_________________.
Accomplishing Technical Reports on the Tests Conducted
Objectives
At the end of this lesson, you should be able to accomplish technical reports on the tests conducted.
Technical reports contain detailed accounts on the different tests that were conducted in the
configuration of computer systems and networks. These reports are normally accomplished as soon
as the tests are completed to ensure that the computer technician will have a fresh memory of the
procedures that were conducted. Usually, the computer technician who conducted the test is also
responsible in accomplishing the technical reports.
1) Inclusive dates – includes the starting date or time until the date or time that the tests are
concluded.
2) Assigned technician – contains the name and signature of the technician/s who conducted the
tests and accomplished the technical reports.
3) Tests conducted – details all the procedures that were conducted. Some of the tests includes:
CPU testing
Memory testing
Hard disk drive testing
Network testing
System testing
4) Procedures – this contains a detailed narrative on how the tests listed above were conducted.
This houses the main content of the technical report.
5) Actions taken – this contains the activities conducted by the technician after completing the tests.
6) Outcomes – this contains the results of the actions taken by the technician based on the tests
conducted.
7) Recommendations – this comprises the endorsement of the computer technicians on what actions
can be done next based on the results that were derived.
8) Approval – this is proof that the technical report was checked by the immediate head, usually the
IT manager, before being distributed to all concerned personnel.
Technical reports must be written with full honesty and integrity. Making up the contents of these
reports may lead to unwanted incidents that may cause work stoppage or inflict injuries to personnel.
These reports can serve as references in case the same tests will be conducted after the
configuration of computer systems and networks.
Q1
Single Answer
Question
What type of document must be prepared right after conducting tests on configured computer systems and networks?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which part of a technical report contains a detailed narrative on how the tests listed above were conducted?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Which part of a technical report contains the activities performed by the technician after completing the tests?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Which of the following contains the results of the actions taken by the technician?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What can happen if a technical report was accomplished with false contents?
Maintaining Computer and Network Systems
27 topics261 questions
Topics under this module
Objective
You should learn how to follow OHS procedures in maintaining computer systems and networks at
the end of this lesson.
Maintenance procedures are conducted to ensure that computer systems and networks are in
proper operating conditions at all times. While performing these maintenance measures,
occupational health and safety policies and procedures must always be followed to ensure the well-
being of all personnel that are involved in the said activities. OHS policies and procedures are
composed of predefined actions that must be observed in order to prevent any harm to be inflicted to
anyone.
Learn about it!
The following are some of the most common OHS procedures that must be followed before
conducting any maintenance measure on computer systems and networks:
1. Always read the established OHS policies and procedures before conducting any
maintenance measures.
2. When dealing with electronic components, always wear an anti-static strap to prevent the
transfer or electro-static discharge. Taking off any jewelries is also advisable.
3. Always perform maintenance procedures in the best suitable work area with adequate space
and lighting.
4. Use only the appropriate tools in performing maintenance procedures to avoid any damage
to the equipment and cause injuries to the user.
5. Turn off and unplug all components and peripherals before touching them to avoid
electrocution. Waiting for a few minutes after unplugging is also recommended to assure that
no electric charge is left in the equipment.
6. Always hold components on their sides and prevent touching the terminals to avoid
wounding yourself. Also, avoid touching any sharp parts of a component to avert any cuts.
7. Be very careful in connecting and disconnecting cables and connectors. Faulty connections
may cause an explosion when they are plugged into a power source.
8. When maintaining network devices in hard to reach areas, make sure to use the appropriate
equipment. Use a stepladder when working with hanged devices. Maintain proper posture
when lower yourself down to reach lowly place components.
9. Always ensure that all peripherals and devices are properly closed cases before plugging
them back to the power source.
Maintaining the integrity of computer systems and networks is a vital part of ensuring that the
workplace will continue its operation; it is equally important that the well-being of all personnel
concerned in maintaining the computer systems and networks in proper operating conditions be
prioritized by establishing relevant occupational health and safety policies and procedures.
Q1
Single Answer
Question
Which of the following procedures is concerned in keeping the computer systems and networks in proper operating
conditions?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
What set of policies and procedures are designed to keep all personnel safe from any harm or injuries?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
Which of the following is true when describing OHS policies and procedures?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which tools must be used in maintaining the computer systems and networks?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
In reaching highly placed components, the best tool to use is a ________________.
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What must be ensured before plugging any equipment back to the power source?
Maintaining Computer and Networks Systems
Objective
You should learn to plan on how to maintain computer and networks systems at the end of this
lesson.
The maintenance of computer and network systems play a vital part in keeping the activities of a
workplace smooth and operational. Having systems that are not well-maintained may result to
incorrect outputs or even stoppage of the entire work. The IT department must always be on top in
maintaining the operational integrity of the installed computer and network systems.
The second and more recommended method is called preventive (proactive) maintenance. This is
normally done even if faults or errors were not experienced. It has the principles of applying
maintenance procedures the computer and network systems to prevent any damages from
happening. Preventive maintenance also follows a strict schedule when all procedures must be
accomplished on the designated systems.
Listed below are the common guidelines in conducting preventive maintenance procedures on
computer and network systems.
1) Hardware maintenance
Remove the dust from the components using a brush or compressed air
Clean the peripherals that are connected to the computer
Check and secure loose cables and connectors
Run hardware diagnostic tests
2) Software maintenance
3) Network maintenance
Q1
Single Answer
Question
Which of the following procedures pertains to keeping the computer and network systems in proper operating
conditions?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
What type of maintenance procedure is conducted when a fault has already been encountered?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
What type of maintenance is conducted even if no faults or errors have been encountered?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
You should be able to identify faulty computer and networks systems at the end of this lesson.
The use of computer and network systems in the workplace helps in completing a job or a task in a
faster and more efficient way. Although computer systems are thoroughly checked and inspected
before being deployed and the network systems are checked regularly, faults and errors can still be
experienced. The personnel from the IT department, especially the computer technicians must be
able to identify these faults so that proper actions can be conducted.
Faults in computer and network systems must be determined as soon as possible. Failure to know
these faults would result in failure to perform the specific actions needed. Maintenance and repair
procedures must be done immediately to address the faulty computer systems and network.
Q1
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
What fault can be caused by an inadequate main memory?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
Aside from broken data cables or loose connectors, what can cause failure of connection among wired computer
systems?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Aside from incompatible channels and frequencies, what could prevent a wireless client to connect to the network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What could prevent a computer system from accessing the Internet aside from a faulty Internet modem?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Objectives
In this lesson, you should learn to identify tools in maintaining computer and network systems.
In order to achieve the optimum performance of the installed computer systems and networks,
proper maintenance must be included in the list of priorities by the personnel from the IT department.
The computer technicians, as well as the IT manager are responsible in conducting maintenance
tests to ensure that all computer systems and the network itself is in proper operating conditions. In
order to do this, technicians must be well aware of the different tools to use for specific maintenance
checks.
1) Cleaning tools – one of the most basic maintenance that must be practiced is keeping all
computer systems, devices, and peripherals clean. Unclean components may lead into malfunctions
when too much dirt is already accumulated. Examples of cleaning tools are brushes, lint-free cloths,
cotton swabs, cleaning agents, vacuum cleaner, and compressed air.
2) Hand tools – this includes all the equipment that is used in the installation and maintenance of the
computer systems. Examples are screwdrivers, wrenches, cutters, and tools used for cabling like a
crimping tool and a wire stripper.
3) Back-up Utility – this tool is composed of an external storage device that automatically backs-up
important data. This maintenance tool will enable the retrieval of files and data in case something
bad happened to the computer system.
4) Diagnostic Software – these are software tools designed to check the different components of a
computer system. Examples are:
CPU Diagnostics – checks the central processing unit’s specifications and performance.
HDD Diagnostics – checks the hard disk drive’s integrity to store permanent data.
Memory Diagnostics – checks how the RAM stores and retrieves temporary data used by a
running application
Power-on Self-test – checks all the components every time the computer is booted up.
5) System Diagnostics Tool – if running each of the diagnostic software is not enough, a system
diagnostic tool may be used to maintain the system with respect to all the components, hardware
and software, that compose the computer system. This may check for hardware compatibility,
software updates, and scans for irrelevant and unused files that may be deleted.
6) Anti-malware – this is a software tool that is designed to protect the system from unwanted
viruses or infections. Having an anti-malware installed across the network will minimize the risk of
having malfunctions that are caused by unwanted software.
Network Monitor or Network Diagnostic Tool – this tool is used to scan the entire network for any
faults and will try to fix them. This can also be used to send ping across the network to ensure that
all connected devices are able to communicate. Some of the network activities scanned are the
following:
Bandwidth – this pertains to the amount of data that can be transmitted thru a network within
a specific period. This is normally measured in bits per second.
Connected devices – this will show all the computer systems and devices that are currently
connected to the network. It will also show their activities that will determine whether they are
behaving differently.
Logs – this lists all the activities that were performed by all connected devices.
These are just the common tools used in maintaining computer and network. Other tools with greater
capabilities can also be used if the situation calls for it.
Q1
Single Answer
Question
Brushes and lint-free cloths are examples of what tools used in maintenance?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
Which of the following tools is best used for removing loose dust particles?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Which tool is used to copy data from a computer system to an external storage?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
What type of software is used to check the integrity of the computer components?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which of the following diagnostic software checks all the components every time the computer boots up?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
What type of tool is used to check the entirety of the computer at once?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
Which of the following determines the amount of data transferred at a given period?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
What feature of a network monitor shows all the activities of computers and devices that are connected to the
network?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
What is sent to the connected devices in a network to ensure that they are able to communicate?
Inspection of Testing Equipment/Devices
Objectives
At the end of this lesson, you should be able to inspect testing equipment/devices.
Testing devices and equipment are used to check and maintain the proper operating condition of a
computer system or network. These tools enable a computer technician to perform physical
inspection as well as to check the internal functionalities of a computer system, its components, and
its peripherals. In order to perform a successful maintenance check, testing devices and equipment
must be inspected to ensure that they will produce correct results.
1) Digital Multi-meter – this device is used to check the various characteristics of electronic
components and circuits such as resistance, voltage, and current.
Inspection procedures:
2) Multifunction Cable Tester – this device is used to test if the connectors are properly connected to
both ends of the cable. This could also check the different ports like the USB, HDMI, and RJ45 ports.
Inspection procedures:
3) Toner Probe – this device is used to locate or trace cables and wires. One part is connected on
one end of the cable while the other part produces a sound or a tone if it gets near the other end of a
cable.
Inspection procedures:
4) Power Supply Tester – this device is used to determine whether the power supply generates the
correct voltages for the different computer components. This is used by testing the different power
connectors.
Tips
In the end, using a testing equipment or device that is not in good shape will not help in maintaining
a computer system or network. It might also add up to the faults and errors experienced by the user.
Inspecting these will assure that they are in proper operating conditions which in turn will produce
reliable and correct results.
Q1
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q2
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q3
Single Answer
Question
What type of testing device is used to check the characteristics of electronic components?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q4
Single Answer
Question
Which part of a digital multi-tester must be connected to the proper terminal?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q5
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q6
Single Answer
Question
Which part of a multifunction cable tester must be inspected for the presence of any dusts, dirt, and lint?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q7
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q8
Single Answer
Question
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q9
Single Answer
Question
Which testing device is used to determine the amount of voltages supplied to the computer’s components?
We hide question answers, hints and explanations, to prevent students from cheating.
Report errors
Q10
Single Answer
Question
Which of the following statements is true about using a defective testing device?
Checking PC Specifications
Objective
Learn how to check PC specifications with the help of this lesson.
A computer system is composed of multiple components that are chosen for a particular purpose. In
order to determine whether a computer system will be able to adhere to the job requirements
specified, it must have the correct PC specifications. PC (System) specifications pertains to the
specific capabilities and measurements of a computer system together with its installed components
and peripherals. Often times, the job requirements must be assessed first in order to determine the
PC specifications needed.
1. Check the box – normally, the box that contains the computer system indicates all the
necessary specifications that is needed to be known by the technician or the user. This can
only be used if the PC is bought brand new.
2. Check the system properties – most operating systems has an option to view its
specifications. These can be compared with the box if there is any. Most of the times, the
information listed in this is more reliable than those on the box since this displays the actual
specifications. This is often used for customized computer systems.
3. Check the support website – all you have to do is to know the model of the computer system
and log on into its support website to view the needed specifications. This is used if the
computer system is not new and does not boot up.
4. Listed in the table below are the most common PC specifications to look out for:
5.