Beruflich Dokumente
Kultur Dokumente
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the
body of the module:
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.
ii
For the learner:
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.
iii
This is a task which aims to evaluate your
Assessment level of mastery in achieving the learning
competency.
In this portion, another activity will be given
Additional Activities to you to enrich your knowledge or skill of the
lesson learned.
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!
iv
What I Need to Know
This module was designed and written with you in mind. This will help you
understand the computer systems. The scope of this module permits its to be used
in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.
In this module, explore on how to make your packaging design attractive and
marketable.
1
Lesson
Understanding System
1 Configuration
What I Know
I.
Direction: Read each item carefully and use your notebook to write
your answers.
___________ 5. DHCP is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer.
___________ 6. The key to a well-tuned computer system is the proper configuration.
Note: If you get 100% correct in this pre- assessment, skip the lesson but if
not and only get 50% to 99% correct, then proceed with the lesson.
2
What’s In
Many software products require that the computer has a certain minimum
configuration. For example, the software might require a graphics display monitor
and a video adapter, a particular microprocessor, and a minimum amount of main
memory capacity.
When you install a new device or program, you sometimes need to configure
it, which means that you need to set various switches and jumpers (for hardware)
and to define values of parameters (for software). For example, the device or
program may need to know what type of video adapter you have and what type of
printer is connected to the computer.
3
What’s New
Direction: Read each item carefully and use your notebook to write your answers.
What is It
IP Addressing
A person’s name and fingerprints usually do not change. They provide a label
or address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to the
host Network Interface Card (NIC) and is known as the physical address. The physical
address remains the same regardless of where the host is placed on the network in
the same way that fingerprints remain with someone regardless of where he or she
goes.
4
is called dotted-decimal notation. When a host is configured with an IP address, it is
entered as a dotted-decimal number, such as 192.168.1.5.
The logical 32-bit IP address is hierarchical and is composed of two parts. The
first part identifies the network, and the second part identifies a host on that network.
Both parts are required in an IP address. For example, if a host has an IP address of
192.168.18.57, the first three octets, 192.168.18, identify the network portion of the
address, and the last octet, 57, identifies the host. This is called hierarchical
addressing, because the network portion indicates the network on which each unique
host address is located. Routers only need to know how to reach each network, not
the location of each individual host.
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 1 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are reserved
for research use only.
5
What I Have Learned
Assessment
Direction: Identify what is being asked. Write your answers in you notebook.
6
7
Assessment What’s New What I Know
Lesson 1 Lesson 1 Lesson 1
1. IP Address 1. True 1. True
2. System Configuration 2. False 2. True
3. Class A 3. True 3. True
4. Class B 4. True 4. True
5. Subnet Mask 5. False 5. False
6. Octets 6. True
7. Class E 7. True
8. Class C 8. True
9. Class D 9. False
10. Dotted-decimal 10. True
Notation
Answer Key
Lesson
2 IP Configuration
What I Know
I.
Directions: Write the letter of the correct answer in a clean sheet of paper.
1. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
2. In which of the following IP address classes does 192.168.1.105 belong to?
a. Class A c. Class C
b. Class B d. Class D
3. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. Subnet mask
4. What command is used to test the ability of the source computer to reach a
specified destination computer?
a. Ipconfig c. Regedit
b. Msconfig d. Ping
5. Which of the following the node in a computer network using the internet
protocol suite that serves as the forwarding host (router) to other networks?
a. Default gateway c. IP address
b. DNS Server d. Subnet mask
Note: If you get 100% correct in this pre- assessment, skip the lesson but if
not and only get 50% to 99% correct, then proceed with the lesson.
What’s In
IpConfig
1. Click on Start Button, then type cmd (command prompt) on the search box.
2. A black screen will appear as shown in the figure below.
3. Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window
will be useful because it shows the IP address, subnet mask and default
gateway of a network you are connected to.
Direction: Give the expanded form of the following acronyms. Write your answer
on your notebook.
1. TCP/IP 6. ISP
2. APIPA 7. NIC
3. DNS 8. ICMP
4. DHCP 9. LAN
5. MAC 10. IP
What is It
6. Type the IP address for your computer. Enter the appropriate IP Address
in the IP address section.
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so
type the router’s address. Figure 54 shows an example of assigning an IP
Address, Subnet mask and default gateway.
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
10. Type the address for the alternate DNS server. The alternate Domain Name
System (DNS) server’s IP address is something that your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address
What’s More
Direction: Answer the following questions briefly and write your answer on your
notebook
1. What is an IP address? Explain.
2. Discuss the 4 classes of IP address.
3. Why is it necessary to assign IP address?
4. Compare static IP address from a dynamic IP address.
What I Have Learned
Assessment
Directions: Choose the best letter of your answer and write it on you notebook.
1. Which two components are configured via software in order for a PC to participate
in a network environment?
a. MAC address and IP address c. IP address and kernel
b. shell and subnet mask d. IP address and subnet mask
2. Which of the following IP addresses is public?
a. 10.1.1.1 c. 172.16.4.4
b. 128.107.0.7 d. 192.168.5.5
3. Which of the following class of IP provides a maximum of only 254 host addresses
per network ID?
a. Class A b. Class B c. Class C d. Class D
4. There is _____ Classes of IP address version 4.
a. 5 b. 4 c. 3 d. 2
5. What range of addresses can be used in the first octet of a Class C address?
a. 129-192 c. 1-127
b. 192-223 d. 204-223
6. Which of the following is the INCORRECT IP address?
a. 213.231.56.4 c. 253.251.256.0
b. 176.9.59.4 d. 188.40.139.40
7. The IP 123.213.321.1 belongs to what class?
a. Class A b. Class B c. Class C d. None of these
8. To which IP Class does 236.128.192.142 belong?
a. Class A b. Class B c. Class C d. Class D
9. Which option shows the proper notation for an IPv6 address?
a. 2001,0db8,3c55,0015,abcd,ff13 c. 2001.0db8.3c55.0015.abcd.ff13
b. 2001-0db8-3c55-0015-abcd-ff13 d. 2001:0db8:3c55:0015::abcd:ff13
10. Which device should be used for enabling a host to communicate with another
host on a different network?
a. switch b. hub c. router d. host
What’s More Assessment
Lesson 2 Lesson 2
1. Answers may vary 1. d
2. Answers may vary 2. b
3. Answers may vary 3. c
4. Answers may vary 4. a
5. b
6. c
7. d
8. d
9. d
10. c
What’s New What I Know
Lesson 2 Lesson 2
1. Transmission Control 1. a
Protocol/Internet Protocol 2. c
2. Automatic Private IP Addressing 3. c
3. Domain Name System 4. d
4. Dynamic Host Configuration 5. a
Protocol
5. Media Access Control
6. Internet Service Protocol
7. Network Interface Card
8. Internet Control Message
Protocol
9. Local Area Network
10. Internet Protocol
Answer Key
Lesson
Understanding DHCP
3 and PING
What I Know
I.
a. 255.0.0.0 c. 255.255.0.0
b. b. 255.255.255.0 d. 255.255.255.255
2. The IP address class of 150.255.255.254.
b. 255.255.255.0 d. 255.255.255.255
5. An IP address is divided into what two parts?
a. Physical and logical c. Network and subnet
Note: If you get 100% correct in this pre- assessment, skip the lesson but if
not and only get 50% to 99% correct, then proceed with the lesson.
What’s In
These are the IP address information that a DHCP server can assign to hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server address
The DHCP server receives a request from a host. The server then selects IP
address information from a set of predefined addresses that are stored in a database.
After the IP address information is selected, the DHCP server offers these values to
the requesting host on the network. If the host accepts the offer, the DHCP server
leases the IP address for a specific period of time.
What is It
Ping
The ping is a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network
with another computer or network device.
Syntax Description
-t Using this option will ping the target until you force it to stop using
Ctrl-C.
-a - This ping command option will resolve, if possible, the hostname of
an IP address target.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request packet
from 32 to 65,527. The ping command will send a 32 byte echo
request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target. The
-f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number of hops
between the computer and the target computer or device that you
would like to be recorded and displayed. The maximum value for
count is 9 so use the tracert command instead. If you are
interested in viewing all hops between two devices.
-s count Use this option to report the time, in Internet Timestamp format,
that each echo request is received and echo reply is sent. The
maximum value for count is 4 which means that only the first four
hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with the -4
option, is only necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP
address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.
What’s More
1. Click on Start Button, then type cmd (command prompt) on the search box.
2. A black screen will appear as shown in the figure below.
3. Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.
Figure 2: Step 3
Figure 3: Pinging
Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client machine sent
out the ping message until a reply came back (1 ms is 1 millisecond, or one
thousandth of a second). The variability in the times you see reflects that
networks do not always respond identically. Differing amounts of traffic on the
communication lines or differing loads on the server are common causes.
You will see very different response times depending on the access equipment
you use.
Routing hop count — The part of the replies that says TTL=50 tells you about
the route the message took from one point to another. The acronym TTL
stands for Time to Live, which is a measure of how many rerouting from one
point to another the packet has to go through before IP declares it
undeliverable. The number following TTL (called the hop count) is a number
that usually starts at 255 and counts down by one every time the message
gets rerouted through an intermediary computer.
Assessment
A
B D AP P Total
Criteria (90-
(70-74) (75-79) (80-84) (85-89) (=score x %)
100)
Proper
Configuration (30%)
(The configured
hardware was
properly configured
according to job
specification.)
Adherence to the
Procedures (30%)
(The specified job was
done by following the
procedures. Safety
measures were
observed during the
activity.)
Quality of Work
(30%)
(The device was
configured properly.)
Comprehension
(10%)
(Interview/Guide
questions were
answered correctly
according to the job
requirements.)
TOTAL
Legend:
B – Beginner
D – Developing
AP – Approaching Proficiency
P – Proficient
A – Advance
Procedures:
Step 1
Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.
Plug the other end of the Ethernet patch cable into the network port on the
NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Open Control Panel and go to Network and Sharing Center.
Step 2
Right-click Local Area Connection, and then choose Properties.
The Local Area Connection Properties window appears.
Step 3
Choose Internet Protocol (TCP/IP).
Click Properties.
The Internet Protocol (TCP/IP) Properties window appears.
OPTION B: Direction: Write the letter of the correct answer on your notebook.
1. Which of the following is the default subnet mask for the class A IP address?
a. 255.0.0.0 c. 255.255.0.0
b. b. 255.255.255.0 d. 255.255.255.255
2. The IP address class of 150.255.255.254.
a. Class A b. Class B c. Class C d. Class D
b. 255.255.255.0 d. 255.255.255.255
5. An IP address is divided into what two parts?
a. Physical and logical c. Network and subnet
Answer Key
d 5.
a 4.
c 3.
b 2.
a 1.
Lesson 3
Option B
Assessment
References
Lesson 1:
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTER_SYSTEMS_AND_NET
WORKS_Content_Standard_Performance_Standard
Lesson 2:
https://www.premiumexam.net/ccna-2-v6-0-rse/ccna-2-rse-6-0-pretest-exam-answers-2018-2019-
100/
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTER_SYSTEMS_AND_NET
WORKS_Content_Standard_Performance_Standard
http://www.certiology.com/quizzes/ip-address-classes-quiz.html
Lesson 3:
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTER_SYSTEMS_AND_NET
WORKS_Content_Standard_Performance_Standard