Competency-Based Learning Material: Computer Systems Servicing NCII PDF

Document Details

Uploaded by Deleted User

Maria Cristina National High School

Tags

computer networks computer systems servicing competency-based learning information communication

Summary

This document is a competency-based learning material for the Computer Systems Servicing NCII qualification within the Electronic Sector. It details the setup of computer networks, including topics like network materials, tools, and equipment, and the criteria for successful installation. This document appears to be a module or learning unit.

Full Transcript

**COMPETENCY-BASED LEARNING MATERIAL** ![](media/image2.jpeg) ![](media/image4.jpeg) +-----------------------+-----------------------+-----------------------+ | Sector | : | **ELECTRONIC SECTOR** | +-----------------------+-----------------------+---------------...

**COMPETENCY-BASED LEARNING MATERIAL** ![](media/image2.jpeg) ![](media/image4.jpeg) +-----------------------+-----------------------+-----------------------+ | Sector | : | **ELECTRONIC SECTOR** | +-----------------------+-----------------------+-----------------------+ | | | | +-----------------------+-----------------------+-----------------------+ | Qualification | : | **COMPUTER SYSTEMS** | | | | | | | | **SERVICING NCII** | +-----------------------+-----------------------+-----------------------+ | | | | +-----------------------+-----------------------+-----------------------+ | Unit of Competency | : | **SET-UP COMPUTER | | | | NETWORKS** | +-----------------------+-----------------------+-----------------------+ | | | | +-----------------------+-----------------------+-----------------------+ | Module Title | : | ***SETTING-UP | | | | COMPUTER NETWORKS*** | +-----------------------+-----------------------+-----------------------+ **COMPETENCY-BASED LEARNING MATERIALS** ---------- -- -- ----------------------- -- ---------------------------- -- ----------------- -- **No.** **Code** 1. Install and configure Installing and configuring ELC724331 computer systems computer systems ***2.*** ***Set-up Computer*** ***Setting up Computer*** ***ELC724332*** ***Networks*** ***Networks*** 3. Set-up Computer Setting up Computer ELC724333 Servers Servers Maintain and Repair Maintaining and ELC724334 4. Computer Systems and Repairing Computer Networks Systems and Networks ---------- -- -- ----------------------- -- ---------------------------- -- ----------------- -- Cables, set network configuration, set router/Wi- 1. 2. **3.Inspect and test the configured computer networks** 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 19. 20. 21. 22. Cables, set network configuration, set router/Wi- - **LEARNING OUTCOME NO.1** - **[INSTALLING ETHERNET CABLES ]** **CONTENTS:** **1. NETWORK MATERIALS,TOOLS AND EQUIPMENT** **ASSESSMENT CRITERIA:** 1. Cable routes are determined and planned in accordance with ***network design*** and actual installation site. 2. ***Network materials*** necessary to complete the work are identified and obtained in accordance with established procedures and checked against systems requirements 3. ***Tools, equipment* and *testing devices*** needed to carry out the installation work are obtained in accordance with established procedures and checked for correct operation and safety 4. ***Appropriate*** ***personal protective equipment*** is used and ***OHS policies and procedures*** are followed 5. Copper cable ***splicing*** is performed based on Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) standards 6. ***Network cables*** and ***cable raceway*** are installed in accordance with established procedures and ***installation requirements*** 7. Installation work is performed and is checked to ensure no unnecessary damage has occurred and complies with requirements 8. OHS standards and 5S principles are followed according to enterprise requirements *Excess components and materials are disposed of based on WEEE directives and 3Rs waste management program* **RESOURCES:** Tools, Materials and Equipment and Facilities **METHODOLOGIES:** Lecture /discussion Demonstration Self-learning **INFORMATION SHEET 1.1-1** **NETWORK MATERIALS,TOOLS AND EQUIPMENT** **LEARNING OBJECTIVES**: 1. **Determine the network materials,tools and equipments** 2. **Identify the network materials,tools and equipments** **Network equipment and cables** ================================ An IT network connects all your devices, plus other peripheral equipment such as printers To build a [network](https://www.techdonut.co.uk/communications/networks/networks-overview) you will need a range of equipment including the following: - - - - - Network hardware building blocks -------------------------------- Some businesses still build their network with cables because they\'re very reliable and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6 cables can carry data fast enough for any business purpose. When building their network most businesses install network sockets at convenient locations in their premises, so computers and other devices can be plugged into the network. The sockets cost about 150 pesos each. The router: a vital network component ------------------------------------- The router acts as a signpost, indicating where data on your network should go and enables devices to communicate with one another. Routers also connect directly to the internet and share the connection via cable or Wi-Fi with devices on the network. A basic router with four wired connections will cost from £70. A more advanced model, with 24 connections, could cost £150 or more. Going wireless -------------- Routers also include Wi-Fi capability, enabling people to connect laptops, [smartphones, tablets](https://www.techdonut.co.uk/computer-hardware/mobile-devices/mobile-devices-overview) and other devices to the network wirelessly. Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting rooms or common areas. It\'s also useful for offering internet access to visitors, with many routers including a separate \'guest\' network for the purpose. Wireless routers start at around £70. Network equipment speeds ------------------------ Most network equipment complies with common standards, so you can combine routers, cables and firewalls from different manufacturers. However, the speed of your network might be governed by the slowest element. For example, if all your cables and computers are rated to Cat 6, make sure your router is rated to Cat 6 too. There are a number of wireless networking standards to take into account, although the majority of modern devices will include support for the latest versions. Try to get a wireless router or access point rated to \'Wireless n\' or \'802.11n\'; it\'s the fastest type available, but will still work with older wireless equipment, too. **What are the Equipment, tools and materials needed in Connecting two computers using wired connection ?** ![](media/image6.png)**RJ45** RJ means Registered jack. This is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment ![](media/image8.png) **UTP CABLE** The cheapest cable use in computer in networking is the UTP (Unshielded Twisted Pair) cable. Other use the STP (Shielded Twisted Pair) cable which is cost much than UTP but more reliable. **CRIMPER** Crimping tool is used to join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable. ![](media/image10.png)**WIRE STRIPPER** A tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires. Because different wires come in different shapes, there are dozens of different wire strippers available. ![](media/image12.jpeg)**LAN TESTER** A cable tester is a device that is used to test the strength and connectivity of a particular type of cable or other wired assemblies. **NETWORK INTERFACE CARD** Short for Network Interface Card, the NIC is also referred to as an Ethernet card and network adapter. It is an expansion card that enables a computer to connect to a network; ![](media/image14.jpeg)**ROUTER** A **router** is a networking device that forwards data packets between computer networks. A packet is typically forwarded from one **router** to another **router** through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination node. **SWITCH HUB** ![](media/image16.jpeg)A network **switch** (also called **switching hub**, bridging **hub**, and by the IEEE MAC bridge) is networking hardware that connects devices on a computer network by using packet  **switching** to receive and forward data to the destination device. **BAY RACK** A rack, in an IT (information technology) context, is a supporting framework that holds hardware modules. In this context, racks typically contain [servers](https://whatis.techtarget.com/definition/server), [hard disk drives](https://searchstorage.techtarget.com/definition/hard-disk-drive) and other computing equipment. Racks make it possible to contain a lot of equipment in a small physical footprint without requiring shelving. ![](media/image18.jpeg)**PATCH PANEL** a board in a switchboard, computer, or other device with a number of electric sockets that may be connected in various combinations. **Modular box** A **modular PC** is a **computer** that has individually-housed components, which are interconnected but separately removable for service or upgrading.. While Piston is upgradable, **modules**  are not actually individually housed, making them more similar to the way typical desktops are **modular**, with bare PCB-based parts. ![](media/image20.png)**2 COMPUTER DESKTOP** an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. **RACEWAY or SLOTTED** **Slotted** PVC cable **raceways** are very convenient for cable laying of on-wall installations in offices, laboratories, workshops etc. **Raceways** are made of very hard, self-extinguishing PVC, with temperature resistance to 70 Co. ![](media/image22.jpeg) **COMPUTER TABLE** **a [flat](https://dictionary.cambridge.org/us/dictionary/english/flat) [surface](https://dictionary.cambridge.org/us/dictionary/english/surface), usually [supported](https://dictionary.cambridge.org/us/dictionary/english/support) by** **four [legs](https://dictionary.cambridge.org/us/dictionary/english/leg), used for putting things on** **UNINTERRUPTIBLE POWER SUPPLY** An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time. **SELF-CHECK 1.1-1** **NETWORK MATERIALS,TOOLS AND EQUIPMENT** **Fill the blank** : Write the correct answer in the blank \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**1**. Its is a network **switch** (also called **switching hub**, bridging **hub**, and by the IEEE MAC bridge) is networking hardware that connects deviceson a computer network by using packet  **switching** to receive and forward datato the destination device. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**2.** Its is a board in a switchboard, computer, or other device with a number of electric sockets that may be connectedin various combinations. **\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_3.** is a networking device that forwards data packets between computer networks. A packet is typically forwarded from one **router** toanother **router** through the networks thatconstitute an internetwork (e.g. the Internet) until it reaches its destination node. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**4.** A cable tester is a device that is used to test the strength andconnectivity of a particular type of cable or other wired assemblies. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**5.** is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment. **Enumeration:** write in your whole sheet of pad paper **1.**what are the Equipment, tools and materials needed in Connecting two computers using wired connection? **2.** what is to build a [network](https://www.techdonut.co.uk/communications/networks/networks-overview) you will need a range of equipment? **TASK SHEET 1.1-1** **NETWORK MATERIALS,TOOLS AND EQUIPMENT** **Performance Objective**: given necessary tools,equipment and materials, you should be able to networking material,tools, and equipment ff. Standard operating procedures within 1 hour **Supplies/Materials and Equipment:** **Rj45 , crimper ,utp cable, lan tester ,router ,switch hub,bay rack** **2 computer systems unit,table, etc.** **Steps / Procedure:**. **Assessment Method:** **Demonstration** **INFORMATION SHEET 1.1-2** **CREATING A NETWORK CABLE DEVICE** **LEARNING OBJECTIVES**: 1. **Determine the netwok cable device** 2. **Identify to creating a network cable device** **What is a network cable device?** **Networking cables**  are **networking** hardware used to connect one **network device** to other **network devices** or to connect two or more computers to share printers, scanners etc.Electrical connections using twisted pair or coaxial **cable** are used within a building. **Different Types Of Network Cabling** ====================================== ![](media/image24.jpeg)Four Types Of Network Cabling ---------------------------------------------------- **Network cable** acts like a medium through which information travels from one network device to the other. The type of cable selected for a network depends on the network's size, topology, and procedure. The various types of network cables act as the backbone of the network infrastructure. [Selecting the correct type of network cabling](https://dimtech.com.au/network-cabling/) can effect various business functions because enterprise network admins employ new technologies. The type of network cable used in any network infrastructure is one of the most vital aspect of networking in various industries. ### ### ### ### ### ### Coaxial Cable It has a single copper conductor in the middle. A plastic layer provides insulation between the braided metal shield and center conductor. The metal shield blocks outer interference from motors, fluorescent lights, and other computers.\ Coaxial cabling is extremely resistant to signal obstruction though it is complex to install. It can handle great cable lengths between network devices than the twisted pair cable. The two types of coaxial cables are thin coaxial and thick coaxial. ### ### ![](media/image26.jpeg)Shielded Twisted Pair (STP) Cable It is a special kind of copper telephone wiring used in business installations. An external shield which functions as a ground is added to the normal twisted pair telephone wires. Shielded twisted pair may be the answer if you want to place the cable in an area with potential interference and risk to the electrical current in the UTP. Shielded cables can also help in expanding the distance between the cables. ### ### ### Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by many layers of protective materials. It removes the problem of electrical obstruction by transmitting light rather than electronic signals. This makes them perfect for certain atmospheres which contain huge amount of electrical interference. It has become the standard for connecting networks between buildings because of its resistance to lighting and moisture. ![C:\\Users\\nlad30\\Desktop\\tools & equipment CSS\\switches.jpg](media/image28.jpeg) **Ensure your system establishment is 100% consistent and converse with Dimtech today.** ### ### ### ### ### ### ### ### Unshielded Twisted Pair It is the most admired type of network cable in the world. [UTP cable](https://en.wikipedia.org/wiki/Twisted_pair#Unshielded_twisted_pair) is used for both conventional telephone and computer networking. The various wiring schemes for UTP are: - CAT1 which is used for telephone wire. CAT2 supports speeds up to 4 Mbps and used frequently for token ring networks. - CAT3 and CAT4 are both used for Token Ring networks for higher network speeds. - CAT5 wire is now replaced by the CAT5e designs providing an enhanced crosstalk specification allowing it to support speeds up to 1 Gbps. It is the most used network cabling specification in the world. - CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to 55 meters. Organizations using CAT6 cabling should use a specialized cable analyzer to request a complete test report, to ensure that the the CAT6 guidelines and standards have been followed during the installation. - The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps and length up to 100 meters. For the development of a successful network in an organization, understanding the different types of cable and how they affect other aspects of a network is vital. ### ### Network Cabling in Perth RJ45 and CAT 6 are the most widely recognized innovations out there with regards to organize cabling. As system cabling masters, [Dimtech](https://dimtech.com.au/contact) comprehends the significance of utilising the right cabling. Our network cabling work consents to all statutes, directions, and models. This is vital on the grounds that numerous suppliers will utilise shabby, substandard cabling which does not follow national norms. Ensure your system establishment is 100% consistent and converse with Dimtech today. **STEPS IN CREATING A NETWORK CABLE** **STRAIGHT THROUGH** **TYPE A TYPE B** ![](media/image30.gif) ![](media/image32.gif) **CROSS OVER COLOR CODE** **NOTED:** Memorize the color code combination before doing this activity. Above, you could see the color assigned for each pin. **Creating of a STRAIGHT THROUGH network cable** **Materials Needed:** 2 RJ45 1 meter Network Cable -- UTP cable **Tools Needed:** Crimping Tool Wire Stripper LAN Tester Equipment Needed:\ 2 Working computers with Network Adapter (LAN port) **STEP BY STEP TO STRAIGHT THROUGH CABLE** ![](media/image34.png) Strip off the insulator ![](media/image36.png) Position all eight wires according to its assigned pins in the RJ45 Position all wires. Make sure that all are in proper pin assignment ![](media/image38.png) Cut the wires ![](media/image40.png) Make sure that the cut is even and small enough for the RJ45 Put all wires inside the RJ45. ![](media/image39.png) **HOW TO TEST YOUR NETWORK CABLE?** A **LAN TESTER** is a hand held electronic device. It is used to verify electrical connections in a cable network. Signal strength, particularly in a computer networks, is crucial for data transmission. A **LAN TESTER** can come in one of many shapes & sizes, and may have multiple functions. A hand held battery-powered tester checks for insulation losses and crossed wiring, and is generally easy to use. Most testers are designed with two parts -- the tester itself and a remote. Testers typically have different testing ports to test today's [most popular media](http://www.tektel.com/10-Connectors-Plugs.html) including ports **for RJ-45, RJ-11, USB and BNC.** ##### **WHEN TO USE A LAN TESTER:** Once you are ready to check if a cable is set up properly to achieve a strong connection between source and destination. That time is, typically, after installation / set up is complete. It is good practice to test the system once all components are connected in order to assure the job has been done properly. If the test shows connectivity troubleshoots, you can address the issue(s) and retest. ##### **POSSIBLE ISSUES:** ![](media/image44.jpeg)Connection between server and computer(s) is weak\ Outside interference causing data loss or decreased signal strength\ Faulty cable ##### **HOW TO USE A LAN TESTER**: ![](media/image46.jpeg)**1.** Select the cable to be tested and make sure it is not plugged to any electrical power and free of any packaging or tangled with other cables, to prevent false reading.\ **2.** Visually inspect the cable for damage. If cable is broken or torn it should be replaced.\ **3.** Plug the network cable into the appropriate port on the cable tester, and then connect the other end of the cable to the remote.\ **4.** Switch the tester on to test your cable. The tester will show results, and if applicable, will indicate what the potential problem is **PC to PC Networking** 1. **Two Computers with compatible O.S. and Ethernet adapter.** 2. **Cross Over Cable** 2.Assign the following on both **SELF-CHECK 1.1-2** **CREATING A NETWORK CABLE DEVICE** **ENUMERATION: Write the correct answer in your whole sheet of pad paper** **1.What is the color coding of straight through?** **2.What is the color coding of cross over?** **3. What is the network cable devices?** 4. Four Types Of Network Cable? ------------------------------- 5\. How to test Network Cable? **TASK SHEET 1.1-2** **CREATING A NETWORK CABLE DEVICE** **Performance Objective**: given necessary tools,equipment and materials, you should be able to creating a network cable device ff. Standard operating procedures within 1 half hour **Supplies/Materials and Equipment:** **Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack** **Patch panel ,2 computer systems unit,table, etc.** **Steps / Procedure:**. - **Unroll the required length of network cable and add a little extra wire, just in case.** - **Carefully remove the outer jacket of the cable** - **Inspect the newly revealed wires for any cuts or scrapes that expose the** - **Untwist the pairs so they will lay flat between your fingers.**  - **Arrange the wires based on the wiring specifications you are following.** - **You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires are switched.** - **Press all the wires flat and parallel between your thumb and forefinger** - **Keep the wires flat and in order as you push them into the RJ-45 plug with the flat surface of the plug on top** - **Place the wired plug into the crimping tool** - **Repeat all of the above steps with the other end of the cable** - **Test the cable to ensure that it will function in the field** **Assessment Method:** **Demonstration** **PERFORMANCE CRITERIA CHECKLIST 1.1-2** -- -------------------------------------------------------------------------------------------------------------------- -- -- **Did you......** **Wear your ppe** **Observe safety and proper sanitation** **Gather the necessary materrials and equipment** **Unroll the required length of network cable and add a little extra wire, just in case.** **Carefully remove the outer jacket of the cable** **Inspect the newly revealed wires for any cuts or scrapes that expose the** **Untwist the pairs so they will lay flat between your fingers. ** **Arrange the wires based on the wiring specifications you are following.** **You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires are switched.** **Press all the wires flat and parallel between your thumb and forefinger** **Keep the wires flat and in order as you push them into the RJ-45 plug with the flat surface of the plug on top** **Place the wired plug into the crimping tool** **Repeat all of the above steps with the other end of the cable** **Test the cable to ensure that it will function in the field** -- -------------------------------------------------------------------------------------------------------------------- -- -- - **LEARNING OUTCOME NO.2** - **SETTING NETWORK CONFIGURATION** [ ] **CONTENTS:** **1. CONFIGURE A WIRELESS ROUTER** **ASSESSMENT CRITERIA:** 1\. Network connectivity of each terminal is checked in accordance with network design. 2\. Any fault or problem in the network system is diagnosed and remedied in line with the standard operating procedures. 3\. Network interface card (NIC) settings are configured in accordance with network design. 4\. Communication checking between terminals are carried out in accordance with OS network configuration guides 5.Unplanned events or conditions are responded to in accordance with established procedures **RESOURCES:** Tools, Materials and Equipment and Facilities **METHODOLOGIES:** Lecture /discussion Demonstration Self-learning **INFORMATION SHEET 2.1-1** **CONFIGURE A WIRELESS ROUTER** **LEARNING OBJECTIVES**: 1. **Determine the configure a wireless router** 2. **Identify the configure a wireless router** ![](media/image49.jpeg)**Wireless Configuration** (**WZC**), also known as **Wireless Auto Configuration**, or **WLAN AutoConfig**, is a [wireless connection management utility](https://en.wikipedia.org/wiki/Wireless_connection_management_utility) included with [Microsoft Windows](https://en.wikipedia.org/wiki/Microsoft_Windows) XP and later operating systems as a [service](https://en.wikipedia.org/wiki/Windows_service) that dynamically selects a [wireless network](https://en.wikipedia.org/wiki/Wireless_network) to connect to based on a user\'s preferences and various default settings.^[\[1\]](https://en.wikipedia.org/wiki/Wireless_Zero_Configuration#cite_note-1)[\[2\]](https://en.wikipedia.org/wiki/Wireless_Zero_Configuration#cite_note-2)^ This can be used instead of, or in the absence of, a wireless network utility from the manufacturer of a computer\'s wireless networking device. The drivers for the wireless adapter query the [NDIS](https://en.wikipedia.org/wiki/Network_Driver_Interface_Specification) Object IDs and pass the available network names ([SSIDs](https://en.wikipedia.org/wiki/Service_set_identifier)) to the service. The service then lists them in the user interface on the *Wireless Networks* tab in the connection\'s *Properties* or in the *Wireless Network Connection* dialog box accessible from the notification area. A *checked* (debug)[^\[3\]^](https://en.wikipedia.org/wiki/Wireless_Zero_Configuration#cite_note-checkdbg-3) build version of the WZC service can be used by developers to obtain additional diagnostic and tracing information logged by the service. **SET-UP A WIRELES ROUTER** As more and more devices are able to connect to wireless networks, setting up a wireless router has become a crucial step for virtually any home network. Setting up a wireless network will allow your devices to connect to the internet from practically anywhere in the house, without the need for messy wires.[\[1\]](https://www.wikihow.com/Set-Up-a-Wireless-Router#_note-1) To get started setting your **HOW TO SET UP A WIRELESS ROUTER** **\ Purchase a wireless router.** Routers come in all shapes and sizes. Compare features to find the router that is right for you. If you have more area that you need to cover, or have lots of walls in your home, you'll need a router that offers the option of upgrading antenna(s) with high gain types - if not supplied in the box. If more than one wireless device will be connecting at the same time at different speeds, a MiMo type router is recommended, otherwise the speed for all devices will drop the highest supported by all at that time. - **2.Connect your router to your modem.**[\[2\]](https://www.wikihow.com/Set-Up-a-Wireless-Router#_note-2) Routers and wireless routers enable you to share your broadband internet connection with multiple devices. To do so, you will need to connect your broadband modem to the router. For best results, place your router near your modem. - - ![](media/image51.jpeg) **3.Connect any devices you want to hard wire with CAT 5 (or better) Ethernet cables.** If you have computers that are close, or a video game console or TV, you can connect them to the router via Ethernet.[\[3\]](https://www.wikihow.com/Set-Up-a-Wireless-Router#_note-3) This will result in a more stable and faster connection, and doesn't require any extra configuration. **4.Connect at least one computer via Ethernet.** You will need at least one computer connecting via Ethernet cable in order to adjust your router settings. You can disconnect this computer afterwards if you want to connect wirelessly. You can also connect your laptop wirelessly for the first time, the wifi network name and the default password will be printed on the router\'s label **PART 2 SET-UP :** ![](media/image53.jpeg) **1.When you power on the router, it will only create its wi-fi network, and the device will be connected to the router\'s wi-fi connection, not the internet.** To connect the router to the internet, with some internet providers (i.e. GTPL in India), it is required to register router\'s MAC address to the internet service provider\'s website. - **2.Go to the internet service provider\'s website.** Type ip address Log in with the username and password provided by the internet service provider and go to MAC address update option. one can see their existing laptop / computers MAC address there. Add the router\'s MAC address there and save it. This process means that the router is authorized to use the internet provide by the broadband company. **PART 3 SET-UP: Configuring the Router** ![](media/image55.jpeg) **[\ 1.Find the IP address of the router](https://www.wikihow.com/Find-Your-Router%27s-IP-Address).** If this is a new installation or new router, determine the default IP address that may be printed on a label affixed to the router or in the documentation.[\[4\]](https://www.wikihow.com/Set-Up-a-Wireless-Router#_note-4) If you can't find the router's IP address anywhere, you can do a web search for the router model to see what the default address is. - - **2.Enter your username and password.** In order to access the configuration page, you will need to be on the router\'s IP address and enter a valid username and password at the prompt. Most routers have a basic account set up that you will need to use to log on. This varies from model to model, but should be printed on the router or in the documentation. - - - - **3.Open the Wireless Settings.** When you log in to your router, you will be taken to the router's main menu or status screen. There will be several options to choose from. The Internet section can usually be left at default settings, unless you received specific instructions from your internet service provider. The Wireless section will allow you to set up your wireless network. **4.Enter a name for your wireless network.** In the Wireless section, you should see a field labeled **SSID or Name**. Enter a unique name for your wireless network. This is what other devices will see when scanning for networks. - 3. **Choose a security method.** Choose from the list of available security options. For the best security, choose WPA2-PSK as the encryption method. This is the most difficult security to crack, and will give you the most protection from hackers and intruders. ![](media/image58.jpeg) 4. **Save your settings.** Once you are finished naming and securing your wireless network, click the Apply or Save button. The changes will be applied to your router, which may take a few moments. Once the router has finished resetting, your wireless network will be enabled. **PART 4 SET-UP: Connecting Your Devices** **1. Connect a computer, tablet, or smartphone to the wireless network.** Scan for the wireless network with the **SSID** you provided above. On any device that supports wireless networks, you should see your new network as long as you are within range of the router. Select it and you will be prompted for the passphrase. ![](media/image60.jpeg) **2. Enter your wireless passphrase.** Once you enter the **passphrase**, your device will be automatically connected to the wireless network. The network will be stored in your devices memory and will automatically connect whenever you are within range. - **3.Connect your other devices.** Besides other computers and tablets, you can connect other devices as well, such as printers, game consoles, TVs and more. See the following guides for instructions for your specific device. **SELF-CHECK 2.1-1** **CONFIGURE A WIRELESS ROUTER** **ENUMERATION:** Write your answer in your whole sheet of pad paper 1. What is the wireles configuration? 2. HOW TO SET UP A WIRELESS ROUTER ? **TASK SHEET 2.1-1** **CONFIGURE A WIRELESS ROUTER** **Performance Objective**: given necessary tools,equipment and materials, you should be able to configure a wireless router ff. Standard operating procedures within 1 half hour **Supplies/Materials and Equipment:** **computer systems unit,table, wireless router tp-link** **Steps / Procedure:** **1.Wear your ppe**. **Mentioned in this article** Step 1: Place your **wireless router**. Step 2: **Configure** your **wireless router** gateway. Step 3: Connect your gateway to your new **router**. Step 4: Change your **wireless router\'s** admin password. Step 5: Update the **router\'s** firmware. Step 6: Establish a password for your Wi-Fi network. **Assessment Method:** **Demonstration** **PERFORMANCE CRITERIA CHECKLIST 2.1-1** -- --------------------------------------------------- -- -- **Did you......** **Wear your ppe** **Observe safety and proper sanitation** **Gather the necessary materrials and equipment** **Place your wireless router** ** Configure your wireless router gateway** **Connect your gateway to your new router** **Change your wireless router\'s admin password** **Update the router\'s firmware** **Establish a password for your Wi-Fi network** -- --------------------------------------------------- -- -- **INFORMATION SHEET 2.1-2** **CONFIGURE NETWORK CONNECTIVITY** **LEARNING OBJECTIVES**: 1. **Determine the configuration of network connectivity** 2. **Identify the configuration of network connectivity** **Network Connectivity** ======================== Definition - What does *[Network Connectivity]* mean? ----------------------------------------------------------------- Network connectivity describes the extensive process of connecting various parts of a network to one another, for example, through the use of routers, switches and gateways, and how that process works. What is a Network? ------------------ A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. **Two very common types of networks include:** - [**Local Area Network (LAN)**](https://fcit.usf.edu/network/chap1/chap1.htm#LocalAreaNetwork) - [**Wide Area Network (WAN)**](https://fcit.usf.edu/network/chap1/chap1.htm#WideAreaNetwork) You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN). Local Area Network ------------------ ![](media/image62.png)A **Local Area Network** (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide \"services\" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network\'s resources, and many others. Workstations are called such because they typically do have a human user which interacts with the network through them. Workstations were traditionally considered a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and iPhone, our definition of workstation is quickly evolving to include those devices, because of their ability to interact with the network and utilize network services. Servers tend to be more powerful than workstations, although configurations are guided by needs. For example, a group of servers might be located in a secure area, away from humans, and only accessed through the network. In such cases, it would be common for the servers to operate without a dedicated display or keyboard. However, the size and speed of the server\'s processor(s), hard drive, and main memory might add dramatically to the cost of the system. On the other hand, a workstation might not need as much storage or working memory, but might require an expensive display to accommodate the needs of its user. Every computer on a network should be appropriately configured for its use. On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access to a wired network is made possible by wireless access points (WAPs). These WAP devices provide a bridge between computers and networks. A typical WAP might have the theoretical capacity to connect hundreds or even thousands of wireless users to a network, although practical capacity might be far less. Nearly always servers will be connected by cables to the network, because the cable connections remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable to the network, although the cost of wireless adapters has dropped to the point that, when installing workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use wireless for a desktop. See the [Topology](https://fcit.usf.edu/network/chap5/chap5.htm), [Cabling](https://fcit.usf.edu/network/chap4/chap4.htm), and [Hardware](https://fcit.usf.edu/network/chap3/chap3.htm) sections of this tutorial for more information on the configuration of a LAN. Wide Area Network ----------------- **Wide Area Networks** (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN. **DIAGRAM NETWORK CONNECTIVITY** **HOW TO STEP BY STEP NETWORK CONNECTIVITY** ![](media/image64.jpeg)**FIRST :** CONNECT CABLE MODEM TO ROUTER **SECOND:** CONNECT NETWORK CABLE TO ROUTER **THIRD** : CONNECT ROUTER TO SWITCH HUB ![](media/image66.jpeg) **FOURTH**: CONNECT SWITCH HUB TO PATCH PANEL **FIFTH:** CONNECT PATCH PANEL TO 2 SYSTEMS UNIT ![](media/image68.jpeg) **Configuring Network Connections for** **Windows 7 & window 2008 r2** **CONNECT TO ASSIGN AN IP ADDRESS TO THE CLIENT:** ![](media/image70.jpeg) Click the Ethernet link at the top of the window. You\'ll see this next to ![](media/image72.jpeg)Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don\'t uncheck it, just highlight it.**Click Properties.** ![](media/image74.jpeg) ![](media/image76.jpeg) **This is the ip address of router take note:** **Network Connecting to Windows 2008 R2** **CONNECT TO ASSIGN AN IP ADDRESS TO THE SERVER:** A. Click Start B. ![](media/image78.png)Right-click Network and click Properties\   C. Click Local Area Connection D. Click Details. Make note (on a piece of paper) of the address on the right side of IPv4 Address:\  (For our example, we are building a small network and we will just use a small range of IP addresses. In the real world or for a large network, you would need to actually know TCP/IP, design a range of IP addresses you plan to use, then assign those IP addresses, or design a way to assign the IP addresses to the computers) E. **Click Close** F. In the Local Area Connection Status dialog box, click Properties G. ![](media/image80.png)In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)\  \ **Click Properties** H. Click Use the Following IP Address I. Type the IP address you want the server to use. For our example, and based on the above dialog box, we **type 192.168.001.001** J. Press Tab K. Type the subnet mask (normally, it should be added automatically when you press Tab from the previous IP address text box) and press Tab L. Type the default gateway address (use the first and the second octets of the IP address you had provided **(such as 192.168)** and use 001.001 for the other two bytes) M. Provide the Preferred DNS server address (we use **127.0.0.1** for our example) and the Alternate DNS Server address (we leave ours empty)\  \ Internet Protocol version 4 (TCP/IPv4) Properties N. Click Advanced to check the values that were put in the IP Settings and DNS property pages O. Click OK P. Click OK Q. Click Close R. Click Close **INFORMATION SHEET 2.1-2** **CONFIGURE NETWORK CONNECTIVITY** **ESSAY:** write the correct definition in your whole sheet of pad paper 1.What is the LAN? 2.What is the WAN? 3\. What does *Network Connectivity* mean? 4\. Draw the network connectivity diagram? 5\. How to step by step network connectivity? 6\. how to configure the connection of window 7 and window 2008 r2 server **TASK SHEET 2.1-2** **CONFIGURE NETWORK CONNECTIVITY** **Performance Objective**: given necessary tools,equipment and materials, you should be able to configure network connectivity ff. standard operating procedures within 1 half hour **Supplies/Materials and Equipment:** **2 computer systems unit,table, wireless router tp-link,switch hub,patch panel,network cable,modem internet** **Steps / Procedure:** **1.Wear your ppe** 1.Click the Ethernet link at the top of the window. You\'ll see this next to \"Connections.\" Click Properties. 2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don\'t uncheck it, just highlight it.Click Properties. 3.Click the Use the following IP address radio button. 4.Type 1 9 2. 1 6 8. 1. 50 into the IP address field. 5.Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field. 6.Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field. - This is the ip address of router take note: 7.Click OK. This will save the settings for that computer. This computer is now configured on your network with a unique IP address. **Assessment Method:** **Demonstration** **PERFORMANCE CRITERIA CHECKLIST 2.1-2** +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | | **Did | | | | | you......** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Wear your | | | | | ppe** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Observe | | | | | safety and | | | | | proper | | | | | sanitation** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Gather the | | | | | necessary | | | | | materrials and | | | | | equipment** | | | +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+ | | **Click the | | | | | Ethernet link | | | | | at the top of | | | | | the window. | | | | | You\'ll see | | | | | this next to** | | | | | | | | | | **\"Connections | | | | |.\" | | | | | Click | | | | | Properties.** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Click | | | | | Internet | | | | | Protocol | | | | | Version 4 | | | | | (TCP/IPv4). | | | | | Make sure you | | | | | don\'t uncheck | | | | | it, just | | | | | highlight | | | | | it.Click | | | | | Properties.** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Click the Use | | | | | the following | | | | | IP address | | | | | radio button.** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Type 1 9 2. | | | | | 1 6 8. 1. 50 | | | | | into the IP | | | | | address | | | | | field.** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Type 2 5 5. 2 | | | | | 5 5. 0. 0 into | | | | | the Subnet mask | | | | | field.** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Type 1 9 2. 1 | | | | | 6 8. 0. 0 into | | | | | the Default | | | | | gateway | | | | | field.** | | | | | | | | | | **his is the ip | | | | | address of | | | | | router take | | | | | note:** | | | +-----------------+-----------------+-----------------+-----------------+ | | **Click OK. | | | | | This will save | | | | | the settings | | | | | for that | | | | | computer. This | | | | | computer is now | | | | | configured on | | | | | your network | | | | | with a unique | | | | | IP address.** | | | +-----------------+-----------------+-----------------+-----------------+ - **LEARNING OUTCOME NO.3** - **INSPECT AND TEST THE COMFIGURED COMPUTER NETWORKS** **CONTENTS:** 1. **Testing the configured computer networks** ============================================ 2. **Secured configured computer networks** **ASSESSMENT CRITERIA:** 1\. Final inspections are undertaken to ensure that the configuration done on the computer networks conforms with the manufacturer's instruction/manual 2\. Computer networks are checked to ensure safe operation. 3\. Reports are prepared/completed according to company requirements. **RESOURCES:** Tools, Materials and Equipment and Facilities **METHODOLOGIES:** Lecture /discussion Demonstration Self-learning **INFORMATION SHEET 3.1-1** **TESTING THE CONFIGURED COMPUTER NETWORKS** **LEARNING OBJECTIVES**: 1. **Determine the testing computer networks** 2. **Identify and test the computer networks** Network testing definition -------------------------- **What is network testing**, really? Since I am not very good at explaining things, I went to the Wikipedia article on software testing and found this: "*Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation.*" --  That sounds pretty good to me. But if we take that passage and replace "software" with "network", we get: ![](media/image82.jpeg)**"*Network testing*** *is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Network testing can also provide an objective, independent view of the network to allow the business to appreciate and understand the risks of network implementation.*" Couldn't be further from the truth. Network testing is, in the end, making sure that your network configuration works as designed. Network testing is very similar to software testing, with one exception: in contrast to software testing, network testing often has to happen in a production environment, after the configuration change was made. In fact, it is sometimes very difficult, or almost impossible, to model a complex system like a large enterprise network, or the Internet itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the network implementation process. What is Use Case in Testing? ---------------------------- A **Use Case in Testing** is a brief description of a particular use of the software application by an actor or user. Use cases are made on the basis of user actions and the response of the software application to those user actions. It is widely used in developing test cases at system or acceptance level. Use Case Testing ---------------- **Use Case Testing** is a software testing technique that helps to identify test cases that cover entire system on a transaction by transaction basis from start to end. Test cases are the interactions between users and software application. Use case testing helps to identify gaps in software application that might not be found by testing individual software components. **HOW TO TEST COMPUTER NETWORKS?** 1.Testing Network Connectivity ------------------------------ A few tools can help you determine whether the network can send data between computers; these tools test the network protocols as well as low-level network hardware layers. ### Ping ping is a fundamental tool for testing TCP/IP network connectivity. Because most networks today use the Internet (TCP/IP) protocol for file and printer sharing services, as well as for Internet access, most Windows users can use the ping test to confirm that their network cabling, hardware, and the TCP/IP protocol are all functioning correctly. Ping sends several data packets to a specified computer and waits for the other computer to send the packets back. By default, it sends four packets and prints the results of the four tests. To see whether the network can carry data between a pair of computers, use the ipconfig command (described previously) to find the IP address of the two computers. Then, on one computer, open a command prompt window by choosing Start, All Programs, Accessories, Command Prompt. Next, type the following command: **Ping 127.0.0.1** This command tests the networking software of the computer itself by sending packets to the special internal IP address 127.0.0.1. This test has the computer send data to itself. It should print the following: Reply from 127.0.0.1: bytes=32 time\ - Each computer on the same LAN should have a similar valid IP address and the same network mask. If they don\'t, check your network configuration. The built-in Windows \"Repair\" function may also be used to help fix problems with DHCP-based (automatic) IP address assignment. **NOTE** To learn more about IP addressing, network masks, and configuration, visit support.microsoft.com and search for article number 164015, which is titled \"Understanding TCP/IP Addressing and Subnetting Basics.\" ### Computer You can check your computer\'s identification and **workgroup or domain** membership setup from the Computer window. To do so, click Start, Computer. Look in the Details pane at the bottom of the screen for the computer name and domain or workgroup name, as shown in  On a Windows Workgroup network, the workgroup name should be the same on all computers on your workgroup LAN. All of the computer names *must* be different from each other. **NOTE** None of your computers can use the workgroup or domain name as its computer name. For example, if your workgroup is MSHOME, you can\'t also name a computer MSHOME. If you find this on one of your computers, change that computer\'s name. On a Windows domain network, you should see your computer\'s name displayed as part of a Windows domain name (for example, my computer named myvpc-hb would be called myvpc-hb.mycompany.com on a domain network) and the domain name. Your domain name might not include .com. It might say .local instead, or may use a different ending. In any case, be sure that your computer is actually a domain member. If the word \"workgroup\" appears instead, your computer is not a domain member and will not be able to use domain logins or some domain resources. ### ### Network Connections You can manually check all installed network protocols and services and their configuration by viewing Network Connections and viewing the properties for Local Area Connection. To view this screen, click Start, Network. At the top of the Network window, click Network and Sharing Center. In the left pane of that window, click Manage Network Settings. Then, right-click your Local Area Connection icon (or the appropriate wireless connection icon) and select Properties. Confirm that each required protocol is installed and correctly configured. In general, the settings on each computer on your LAN should match, except that the IP address differs (usually only in the last of its four dot-separated numbers). If your LAN uses Automatic IP address configuration, you need to use the ipconfig command, described earlier, to check the settings. **HOW TO CHECK THE SERVER AND CLIENT NETWORK?** What Is a Client-Server Network? -------------------------------- A **client-server network** is designed for end-users, called **clients**, to access resources such as files, songs, video collections, or some other service from a central computer called a **server**. A server\'s sole purpose is to do what its name implies - serve its clients! You may have been using this configuration and not even have known it. Have you ever played Xbox Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video, and game demos. How Does It Work? ----------------- ![](media/image89.png)Imagine a customer sitting at a restaurant. He is waiting for the server to come by and take his order. The same rules apply in a client-server network; the client, which can be a laptop, desktop, a smartphone, or pretty much any computerized device, can make a request from the server. The **client** uses the **network** as a way to connect with and speak to the server. Just as the customer speaks to his server, the client uses the network to send and receive communications about its order, or request. The server will take the request and make sure that the request is valid. If everything checks out okay, then the server will fetch the request and serve the client. The **server** can make a request from the client as well. It may want to check up on the status of the client, or ask if it has received any security patches, or if it still needs resources from the server. If not, the server will close the connection in order to free up network traffic. Can you imagine a server standing next to a customer who just stares at the menu without ordering anything? After 15 minutes, it would be a good idea for the server to leave and check on other customers. In both cases, the server moves on to other clients as needed. What Are the Advantages of a Client-Server Network? --------------------------------------------------- The biggest advantage to using this setup is central management of the server. Only one server is used to host the resources that all the clients request and use. This is especially good for server administrators, because they only have to be in one place and can solve all the problems in one place, as well. Having to manually update several hundred servers would take much more time. One centrally managed server is the key to ease of management, and it is cost effective, too. Another advantage of using one physical server is that the configuration is simple to set up and takes less time to troubleshoot. For instance, if there were a site with multiple servers providing redundant services, and it was having issues, it could take an extreme amount of work to effectively troubleshoot why services are being hindered. In a single server role, all troubleshooting takes place at one physical server, so it takes much less time. **How To Secure & check your Computer System And Network** ========================================================== Technology advancements have helped us improve our security and safety -- think security cameras. It has helped us increase our productivity -- think smartphones. However, at times we technology also presents to us some potential threats that we need to deal with. For instance, in offices as well as households, we have wireless networks connecting all major electronic devices. This can potentially bring about a security concern -- as hackers can aim to attack your system or network and steal your confidential information. **How Severe Is The Threat?** According to a report by Javelin Strategy and Research, the cost of recovering from such security damage for major organizations can be as high as \$7 Million. And this is just the economic loss -- there is always the damage done to brand image and reputation that is far more disastrous. **How Can You Deal With It?** ![](media/image91.jpeg)**So, how do you protect devices from the prying eyes of the hackers?** Here are some of the ways in which you can secure your home or office system and network. 1. **Securing your system with Passwords** It may seem unnecessary for having passwords and encrypted system altogether, but this has been among one of the main reasons why hackers are easily able to attack to the systems because of weak password and accessibility to access points. All the wireless networks and secretive information should be well encrypted with unique username and passwords making it difficult for the hackers to break into the system. Using a WPA2 encryption is more secure way than any other encryption protocol as it is not easily hacked into. 2. **Safe and Secure Wireless Router** The wireless router allows multiple users to use the internet at the same time, but if that is kept wide open, it can be dangerous. Any Individual with malicious intention can use your internet for free, and can even steal your valuable information or may use for some cyber crime. So it is always advised to change the SSID provided by the service network and use firewall. 3. **Active checking of the system** This majorly applies for the office users, as there may be some of the malicious insiders, employees from the company who may hack into the systems. It is comparatively easy for the employees to steal and hack the accounts, as they are well aware of the system and networks. Such hackers are dangerous for the organization. So a thorough screening of the employees is advised. Also, the important files should be admin encrypted so nobody can use it whenever required. 4. **Encrypt the whole disk** This is especially true for Laptop users, as such devices can be stolen easily. One can even lose it, and there may be some of the important files on the laptop which can be accessible by the potential hacker or stealer. So it is a better idea to protect your laptops or systems with whole disk encryption. They are not very costly but gives protection to your valuable information. 5. **Updated security software** Always make sure to update the operating system, web browser and most importantly security software. They prove good against any of the viruses or malware. Make sure to scan any of the USBs and other external devices with your software security scan to guard against any of the threats. It is important to keep the software updated. 6. **Keeping your in-house security out of reach** Most offices as well as households have been using [CCTV cameras](http://minerva-security.co.uk/services/cctv-security-camera-systems/) to keep their home or office secure and are attached to the home or office network to view them anytime and anywhere. But this can be dangerous at times. If the CCTV hooked up with the system is not encrypted strongly than hackers can easily view your updates of home or office and steal prime information. Hackers could get all the insights of your office and household and can make a right move at the right time.So it is very important to keep it secure with username and password which may not be guessed. You can have an alarm and security features if any unknown device hacks into it to keep your system safe. 7. **Beware of Spoofing and Phishing** Hackers know how and when to break into the system. They may attract the home mobile users or office desktop users by asking them to download or install any software to speed up the performance of the system. Upon downloading, all lucrative information can be stolen by them. Do not register on any untrusted websites asking for personal details or installing any such software. Also avoid opening unknown email attachments as they may have a virus, worms or Trojans. These emails can be sent from trusted sources -- so think before clicking. - **Secure your Computer Network** ================================ Top of Form 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. Bottom of Form **SELF-CHECK 3.1-2** **SECURED THE CONFIGURED COMPUTER NETWORKS** **Fill the blank:** write the correct answer \-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\--**1.** Its is a wireless router allows multiple users to use the internet at the same time, but if that is kept wide open, it can be dangerous. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**2.** Its is a reputable antivirus software application is an important protective measure against known malicious threats. It can automatically detect, quarantine, and remove various types of malware, such as viruses, worms, and ransomware. Many antivirus solutions are extremely easy to install and intuitive to use. **\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_3.** Its is a Anybody who gains access to the router configuration settings can disable the security you have set up. If you forget the password, most routers have a hardware reset that will restore all of the settings to factory defaults. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**4.**its is a while it may be impractical to turn the Wi-Fi signal off and on frequently, consider disabling it during travel or extended periods when you will not need to be online. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_**5.** Its is a regular software updates are one of the most effective steps you can take to improve the overall cybersecurity posture of your home networks and systems. **Enumeration:** write the answer in your whole sheet pad paper 1. **Gives the secure your computer network?** Gives the Secure & check your Computer System And Network? ========================================================== **TASK SHEET 3.1-2** **SECURED THE CONFIGURED COMPUTER NETWORKS** **Performance Objective**: given necessary tools,equipment and materials, you should be able to secured the configured computer networks ff. Standard operating procedures within 2 half hour **Supplies/Materials and Equipment:** **Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack** **Patch panel ,2 computer systems unit,table, etc.** **Steps / Procedure:** 1. Put In And Monitor Firewall Performance. A firewall is a piece or set of software or hardware designed to block unauthorized access to **computers** and **networks** 2. Update Passwords At Least Every Quarter 3. Maintain Your Anti-Virus Software 4. Create A Virtual Private **Network** (VPN) 5. Training Your Employees 6. Ask for Help **Assessment Method:** **Demonstration** **PERFORMANCE CRITERIA CHECKLIST 3.1-2** -- ------------------------------------------------------------------------------------------------------------------------------------------------------------------- -- -- **Did you......** **Wear your ppe** **Observe safety and proper sanitation** **Gather the necessary materrials and equipment** **Put In And Monitor Firewall Performance. A firewall is a piece or set of software or hardware designed to block unauthorized access to computers and networks** **Update Passwords At Least Every Quarter** **Maintain Your Anti-Virus Software** **Create A Virtual Private Network (VPN)** **Training Your Employees** **Ask for Help** -- ------------------------------------------------------------------------------------------------------------------------------------------------------------------- -- --

Use Quizgecko on...
Browser
Browser