CSS G12 Module 3 Q1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

12

Computer Systems
Servicing NCII
Quarter 1
Module 3: Network Operating Systems
(NOS) features.

Source: Kamala Pujhari, “Client Sever Network”, Client Server Network Examples, Security, Advantages and Disadvantages,

February 3, 2020, https://lucentgkquiz.blogspot.com


Computer Systems Servicing NCII - Grade 12
Quarter 1 – Module 3: Network Operating Systems (NOS) features.

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government
of the Philippines. However, prior approval of the government agency or office wherein the work is
created shall be necessary for exploitation of such work for profit. Such agency or office may, among
other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners. The publisher
and authors do not represent nor claim ownership over them.

Regional Director: Gilbert T. Sadsad


Assistant Regional Director: Jessie L. Amin

Development Team of the Module

Writers: Jovy E. Ilan

Editors: Armando Lamadrid, T III / Jaspy Silanga, T I

Reviewers: Dr. Nixon SA. Olfindo, EPS / Darcy Guy Y. Mañebo, EPS

Illustrator: Jovy E. Ilan

Layout Artist: Jovy E. Ilan


Computer Systems Servicing NCII - Grade 12
Quarter 1 – Module 3: Network Operating Systems (NOS) features.

I. Introduction:
In able for you to create an efficient client-server network, it is necessary to
understand different terms and policies you will encounter in configuring a server
network and the benefits of using Group Policy Object (GPO). In this lesson you will
also be familiarized in the step by step process of creating accounts like the OU,
Groups and User. Understanding it will also be helpful in troubleshooting future
problems in your network.

II. Objectives
At the end of the lesson you are expected to:

Create user folder in accordance with Network Operating System Features -


TLE_IACSS9-12SUCS-IIIa-e-37:
• Define FQDN, OU, GPO
• Simplify steps in creating OU, GPO and User
• Appreciate the advantage of Group Policy

III. Vocabulary List


Listed below are some important terms that you can find in this lesson.

➢ Active Directory Domain Services (AD DS)


Active Directory Domain Services (AD DS) is a server role in Active
Directory that allows admins to manage and store information about
resources from a network, as well as application data, in a distributed
database.

➢ Active Directory Users and Computers


The active Directory Users and Computers is tool and a console snaps in
introduced by Microsoft for the management purposes.

➢ FQDN (Fully Qualified Domain Name)


The FQDN is specified for the host, internet or specific computer. It is the
complete name with two parts host name and domain name and also top-
level domain

1
➢ Hostname
The term hostname is sometimes used in place of ‘FQDN’

➢ Host name
The term host name (with space in between) refers to the ‘host’ or the
computer name in a network

➢ Group Policy Object (GPO)


Group policy object is the tool which provides centralized configuration and
management for the operating system and let you set rules on user and
computer accounts in the Active Directory as the system administrator

➢ Network Drive
A network drive is a storage device on a local access network (LAN) within a
business or home. Within a business, the network drive is usually located on
a server or a network-attached storage (NAS) device.

➢ (Organizational Unit):
Organizational Unit let you organize the users in one container that can hold
all user and computer accounts that have common needs so that can be easily
managed and supported by the administrator

➢ User
User is the person who can use any specific computer in the given
environment with the specified policies.

IV. Pre-Test

True or False. Read each statement carefully and on your answer sheet/notebook,
write FACT if the statement is correct, or BLUFF if the statement is false.

1. A domain name can be considered as a fully qualified domain name if it has a


sub-domain name and a top level domain name.
2. The term “host name” also used to refer ‘FQDN’.
3. The user is the one who manages the network.
4. One of the benefits of GPO is that as the administrator you can block the devices
for specific users
5. User group is a collection of user accounts that share the same security rights
and permissions.

2
V. Learning Activities
Learning Activity 1. I knew it!
Take a look at the words listed in the box. .com, .ph .gov

Do they look familiar to you? Where do you think you


saw them? What does it call?

Correct! Those words are called domains names. You can find it on any website you visit like
Facebook.com, YouTube.com, en.wikipedia.org., deped.gov.ph and many other sites.

INSTRUCTION:

In this activity you will have to answer the crossword puzzle below with the help of the guide
question from. Write your answer on your notebook.

Vertical
1.
1. Domain name used for government agencies.
2. This domain name was created for U.S.
3.
Military branches

Horizontal
4. 2.

3. Domain name created for non-profit


organizations
5.
4. Domain name created for the use of
commercial organization.
5. This domain brand a website as business-
focused.

See. You easily answered the activity!

Let’s now proceed to our discussion for you to learn


more.

Source: Kchungtw, 3d business man presenting word easy


concept, Free Royalty, www.gograph.com

3
Important Terms, Tools and Concepts in AD DS:

FQDN (Fully Qualified Domain Name):


FQDN is specified for the host, internet or specific computer. It is the complete name with two
parts host name and domain name and also top level domain. Like project.sbk.com is FQDN where
project is host name, “sbk” is second level domain and com is top level domain. FQDN has specific
location in the hierarchy of Domain Name System (DNS).
Study this sample URL below.

SLD – Second Level Domain


TLD – Top Level Domain

Source:
Domain Name System (DNS),
www.iteanz.com/tutorials/aws/dom
ain-namesystem-dns/

Samples of some Top-Level Domain

Source:
MD Juwel, What is a Top-Level Domain
(TLD), July 2018,
https://www.techjan.com/2019/06/what-
is-top-level-domain.html

Need more explanation?


You can also refer to the link below. (Optional, only if internet is available.)
https://www.youtube.com/watch?v=S6uYZ8V1vRc
https://www.youtube.com/watch?v=7fJwSLo65wo

Active Directory Users and Computers:


The active Directory Users and Computers are tools and console snaps are introduced by
Microsoft for the management purposes. You can create user and computer accounts; set their security
policies and you can also apply group policies.

User:
User is the person who can use any specific computer in the given environment with the
specified policies. You can log on the computer by the Active Directory user account. The Active
Directory account identifies the user and establish authentication so that the user can use the resources
within the domain.

4
OU (Organizational Unit):
Organizational Unit let you organize the users in one container that can hold all user and
computer accounts that have common needs so that can be easily managed and supported by the
administrator. The example is an OU Students that is for all the common users. The domain can contain
the collection of different OUs with the same policies as security (password policy) that is basically
same for every user in the OU. The organizational unit administrator is responsible for user and
computer account maintenance in the OU.

Learning Activity 2. Let Us Examine!


As a student and a young adult, you have
encountered lot of policies or rules that you must
abide. Some may seem easy to follow but most
likely difficult. However, at the end of the day
when you think upon these things you will realize
that each policy is made with a good purpose.

Source: https://changemakerhighschool.org/policies

INSTRUCTION:

In this activity, using a graphic organizer (like


the picture shown on the left) list 5 common policies
in your house, community or school and think of its
purpose. You may do this on your notebook.

Example: 1. (School) No homework policy. Students


will not be given a home work during Friday for them
to enjoy a quality time with their family during
weekend.

Good Job.

You have listed 5 policies and its purposes.

Same thing with the real life, computer network also has policies.

5
Group Policy Object (GPO):
Group policy object is the tool which
provides centralized configuration and
management for the operating system and let
you set rules on user and computer accounts in
the Active Directory as the system
administrator. It is used in the small businesses
and organizations very commonly.

Group policy object will store the


configured setting of Active Directory. The
management and configuration of software,
desktop and network environments can be
done by GPO. The Group Policy is the feature
in Windows Server 2008’s Server Manager
you need to install so that you could use and
Source: Margaret Rouse manage multiple accounts. Group Policy
https://searchwindowsserver.techtarget.com/definition/ management console let you easily use different
Group-Policy-Object policies for the group policy objects.

Benefits of using GPO


There are some uses of Group Policy Objects
▪ You can block as the administrator the devices for specific users

▪ The improved security implementations for devices and users using firewall and IPsec

▪ Categorized management of resources makes it possible to easily deploy and manage the
resources

▪ You can manage multiple groups, logs and event in the GPO

TWO TYPES OF GROUP POLICIES:


1. Local Group Policy
Each computer running the windows line of operating system has exactly one local
group policy. It is available only to the particular computer in which it resides and to users who
log on to that computer. The local group policy objects reside in the
%systemroot%\System32\Group Policy folder. It has only a subset of settings that are available
in the non-local group policy.

2. Non-local Group policy


Each domain controller has one or more non-local group policies. They are available
to all the machines and users in the Active Directory environment. A non-local group policy
can be applied to all users and computers in a domain or to a particular OU depending on where
the group policy is linked.

6
Need for Group Policies
As organizations seek to increase productivity and revenues through
technology, they are also trying to minimize the complexity of managing a huge IT
infrastructure. The following are some of the reasons that illustrate why group policies
are necessity:

➢ Uniform User experience


Users are no longer confined to a single computer in their workplace. They use different
computers for different tasks. So, all their files and folders along with their personalized settings
such as taskbar location, wallpaper settings, desktop icons, etc., must be made available in all
the machines the user logs on to.

➢ Security
Even with all the authentication protocols and authorization techniques involved in AD, a
malicious user, can still gain access to network resources, if the attacker comes to know about a
user’s password. So, it is very important to have a strong password setting for all the users in an
organization. It is also important to record certain events like user login, access to a particular folder,
etc., for auditing purposes.

➢ Organization wide Policies


Most organizations use wallpapers, screen savers, interactive logon messages, etc., to establish
a standard among all its employees. Organizations also have Internet policies that all users in the
organization should adhere to.

➢ Cost and Time


Tasks like software installation consume a lot of time. Installing and updating software in all
computers, for all users, will not only take time, but also affects productivity, as employees lack
access to their computers when the installation is taking place.
Group Policies play a crucial role in ensuring that the employees of an organization can have a
hassle-free experience when it comes to using the IT resources to accomplish their tasks.

7
Create objects (OU, User and Groups) on Active Directory Windows Server
2008 R2
In this topic, the step by step procedure in creating an OU, User and Groups on ADD Windows
Server 2008 R2 will be given

Steps in Creating an OU
(Organizational Unit)

1. To start the Active


Directory Users and
Computers snap-in, click
Start, point to
Administrative Tools, and
then click Active
Directory Users and
Computers:

2. To create Organization Unit right click on Tekbloq.local and Click New and then
Click Organization Unit:
(Tekbloq.local is the sample domain name)

8
3. Type name of your New
Organizational Unit and click OK:

As you see New OU (Organization Unit) has


been created, Same way you can create child
OU under IT Users OU:

Steps in Creating a User Under an OU

1. To create user, right click on IT Users


OU and Click New and then click User:

9
2. Type all required information below and
click next:

3. Type password for the User and click


Next (In this screen you can also set up 4
important setting with checking up checkbox):

4. Create User by clicking Finish:

5. So now created an
account for Asim
Alili in the IT Users
OU:

10
Steps in Creating a Group under an OU

1. To create group, right click on IT Users OU and Click New and then click Group:

2. Type group name, Group scope and type for


that and click OK:

• The Group type indicates whether the group can be


used to assign permissions to other network
resources, such as files and printers. Both security
and distribution groups can be used for e-mail
distribution lists.
• The Group scope determines the visibility of the
group and what type of objects can be contained
within the group.

3. IT Group created:

11
VI. Practice Tasks
Practice Task #1 Identify me

Part 1. In this activity, you must identify whether the following are ‘FQDN’ Fully Qualified Domain
Name or a Domain name. Write your answer on your answer sheets.

Domain Name or
Identify the following name:
Fully Qualified Domain Name (FQDN)
Ex. www.one.com Fully Qualified Domain Name
1. en.wikipedia.org
2. twitter.com
3. nbi.gov.ph
4. www.jollibee.com.ph
5. css.local

Part 2. Create your own Fully Qualified Domain Name (FQDN) then identify its parts. Whether it’s
the Top level domain, Second level domain or Host. Write your answer in your answer sheet.

Ex. www.one.com = www (sub domain)


= one (second level domain)
= .com (Top Level Domain)

Practice Task #2. I can relate


INSTRUCTION: In a ½ sheet of paper, write a paragraph with 3 to 5 sentences that answers the given
situation. Based on your experience, did you ever encounter or experienced a client-server type of
network?

If yes, where did you encounter a client-server type of network and what do you think its benefits?

If not, where do you think we can apply or use a client-server type of network or what situation can you
apply it?

Your score will be based it the rubrics given below.

Scoring Rubrics
5 4 3 2 Score
All content 80% of the Some content is The content is
reflects the content reflects related to the topic far from the
Content

learner’s the learner’s it also reflects their lesson.


understanding on understanding on understanding.
the lesson. the lesson.

12
No spelling, Few spellings and Several spelling, So many
Spelling and Grammar
punctuation or punctuation punctuation or spelling,
grammatical errors, minor grammatical punctuation and
errors grammatical errors. grammatical
errors errors that’s
interferes in the
meaning

TOTAL

Practice Task #3 Let’s us organize!


organiz
Using a flowchart, map the step by step process of creating an OU, User and Groups. Do this
using your own domain name, OU name, User name, password and Group name. You can also add
more box and use your own flow chart design.

Creating OU Creating New User Creating New Group

Step1 Step1 Step1

Step 2 Step 2 Step 2

Step 3 Step 3 Step 3

VII. Post Test


Read the direction in every part carefully and follow the individual instruction and write your answers
on your answer sheets.

Part I. True or False. Write FACT if the statement is correct, or BLUFF if the statement is false.
1. A domain name can be considered as a Fully qualified domain name if it has a sub-domain name
and a top-level domain name.
2. The term “host name” also used to refer ‘FQDN’.
3. The user is the one who manage the network.
4. One of the benefits of GPO is that as the administrator you can block the devices for specific users
5. User group is a collection of user accounts that share the same security rights and permissions.

Part 2. Multiple choice. Choose the letter of the correct answer. Then write it in on your answer sheet.
6. What does FQDN stands for?
a. Fully Qualified Domain Name c. Fairly Qualified Domain Name
b. Fully Qualified Device Name d. Full Quality Device Name

13
7. In which tool can we create user and computer accounts; set their security policies and you can also
apply group policies?
a. Active Directory c. NAS
b. FQDN d. roaming profile
8. Which of the following is not a benefit of using GPO?
a. You can manage multiple groups, logs and event in the GPO.
b. You can block as the administrator the devices for specific users
c. You can easily manage the resource and deploy it to other computers.
d. You can as a user block the network administrator.

9. Which group policy enables a user to access its files and profile in any computer connected to a 1
domain?
a. Local Group Policy c. OU
b. Non-local Group Policy d. NAS
10. What does the abbreviation NAS mean?
a. Network-attached storage c. New account system
b. Network accessed storage d. New access system

VIII. Assignment/Additional Activities

In your notebook, write at least a paragraph containing a minimum of 3 sentences that’s answering
the questions below. (You make use any reference available. But don’t forget to cite your reference or
acknowledge your sources.)

1. What is the importance of user account password?


2. How many characters are recommended to have a strong password?

14
References

Illustrations

Kamala Pujhari, “Client Sever Network”, Client Server Network Examples, Security, Advantages
and Disadvantages, February 3, 2020, https://lucentgkquiz.blogspot.com

ICONS - https://iconarchive.com/

Kchungtw, 3d business man presenting word easy concept, Free Royalty, www.gograph.com

https://changemakerhighschool.org/policies/

MD Juwel, What is a Top-Level Domain (TLD), July 2018,


https://www.techjan.com/2019/06/what-is-top-level-domain.html
Margaret Rouse https://searchwindowsserver.techtarget.com/definition/Group-Policy-Object
Domain Name System (DNS), www.iteanz.com/tutorials/aws/domain-namesystem-dns/
Thumbs up Icon, https://iconarchive.com/show/noto-emoji-people-bodyparts-icons-by-google /12008-
thumbs-up-icon.html

Content

Kristin Crabb, “Types of Domain Names: A Helpful Guide”, October 30, 2018,
https://www.domain.com/blog/2018/10/30/domain-name-types/

Malou Elevera, “System Administration Windows Server 2008”,


https://www.scribd.com/document/409078171/System-Administration-Windows-Server-2008-docx

Zoho Corp., “Group Policy”, Active Directory 360, http://www.windows-active-


directory.com/group-policy.html

Create objects(OU,user and goups) on Active Directory Windows Server 2008 R2, May 12, 2017,
https://tekbloq.com/2017/05/12/create-objectsouuser-and-goups-on-active-directory-windows-server-
2008-r2/

Video Links

https://www.youtube.com/watch?v=S6uYZ8V1vRc
https://www.youtube.com/watch?v=7fJwSLo65wo

15
IX. Answer Key

Pre-Test Key
True or False.
1. Fact
2. Bluff
3. Bluff
4. Fact
5. Fact

Learning Activity 1.
Vertical Horizontal
1. .gov 3. .org
2. .mil 4. .com
5. .biz
Learning Activity 2. (Possible Answers)
1. (for School) Anti-Bullying. This policy is imposed to maintain a healthy learning
environment for every student and promote unity beyond the students diversity.
2. (for School) No Smoking. The purpose of this policy is to keep the school a healthy
environment for everyone and keep them away from developing bad habits/vices.
3. (for School) Dress code. Proper dress code for student also develops discipline and
lessen unnecessary distractions to every learner.
4. (for School) No littering. This policy is to keep the school premises neat and clean and
to instill discipline to students when it comes to waste management.
5. (for Home) Be at home before dusk. This is to assure our safety.

Practice Task #1 Try Your Best


Part 1. In this activity, you must identify whether the following are ‘FQDN’ Fully Qualified Domain
Name or a Domain name.

Domain Name or
Identify the following name:
Fully Qualified Domain Name (FQDN)
1. en.wikipedia.org FQDN
2. twitter.com Domain Name
3. nbi.gov.ph FQDN
4. www.jollibee.com.ph FQDN
6. css.local Domain Name

Part 2. Create your own Fully Qualified Domain Name (FQDN) then identify its parts. Whether it’s
the Top level domain, Second level domain or Host.

ANSWERS MAY VARY 16


jovy.ilan.com = jovy.ilan (sub domain)
= .com (TDL)
Practice Task #2 Try Your Best
Answers may differ.

Yes, I already have seen a client-server type network in a computer shop. Every computer is connected
to what we call a server and the server controls the other computer. The benefit of that kind of set up
was having a central control, the management of the other computer will be easy and efficient. It can
also lessen the resources needed to accomplish a task because it’s easier to share files and other
resources from computer to another computer.

Practice Task #2 Try Your Best

Access the administrative


tool, the Open Active
Directory Users &
Creating OU
Computers

Right click on css.local


then select New

From the new select the


Organizational Unit

Type CSS team as the Organizational


Unit name then hit OK

Access the administrativ tool, the Open Active


Directory Users & Computers
Creating Group

under the css.local Right click in


the CSSteam

From the new select the


Group

Type CSSgroup , select the group scope


and group type then hit OK.

2
Access the administrative tool, Creating User
the Open Active Directory
Users & Computers

under the css.local Right


click in the CSSteam

From the new


select the User

Type qwerty123 for the


password, then click the next

Type Jovz for the first name, ALi (Last


name). Then fill the user logon name, the hit
next

Post-Test Key
True or False.
1. Fact
2. Bluff
3. Bluff
4. Fact
5. Fact
6. A
7. B
8. C
9. C
10. A

Assignment/Additional Acticity Key


1. “Passwords provide the first line of defense against unauthorized access to your computer and
personal information. The stronger your password, the more protected your computer will be
from hackers and malicious software. You should maintain strong passwords for all accounts
on your computer.”

Source: uOttawa, “The Importance of Passwords”,


https://it.uottawa.ca/security/identity-authentication-theft

2. Password should at least 8 characters long and must contain combination of text, number and
special character.

You might also like