Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

TVL – Computer Systems Servicing -12

Name: _________________________________ Date: ____________

Grade: _____________________________________ Section: ___________

Quarter: 3 Week: 3 ELC(s): Computer Naming and Network Sharing


ELC Code: TLE_IACSS9-12SUCS-IIIa-e37

Ø Title of Textbook/LM to Study: SLM/Manual CSS, MELC


VocTek – CSS Module 3 1st Edition
Ø Topic: Set up user access in accordance with Network operating system
features.
Ø Learning Target: Server PC configuration

Let Us Discover

Server Configuration Tool

When you have finished installing Microsoft Windows Server 2008 R2, a window
titled Initial Configuration Tasks may come up:

The Initial Configuration Tasks window is used to perform the most fundamental or
routine operations of Microsoft Windows Server 2008 R2. This window displays when
the computer starts. If you don't want to come up like that, click the bottom check box.
If it doesn't come up when the computer starts, to restore this window, click Start ->
Run, type oobe and press Enter.
After installing the operating system, there are a few things you should (must) do
before continuing:
• You must make sure the computer is connected to the Internet
• If this is the first computer, you must make it a domain controller (this is not a
requirement if the computer will not be a domain controller; if you don't (yet)
know what a domain controller is, don't worry about that now)

1 GSC-CID-LRMS-ESSLM, v.r. 03.00, Effective June 14, 2021


The Server Name
Every computer in the network must have a
name. The installation gives a default name that
you can accept or change. Some installations,
such as Small Business Server, prompt you to
accept or specify the name of the server. After
installing Microsoft Windows Server 2008, to
check and/or change the name of the server:
• In the Initial Configuration Tasks window,
click Provide Computer Name and
Domain:
• In the Computer Name property page,
click Change...
• Accept or change the name of the server

• Click OK
• A dialog box will ask you to restart your computer. Click
OK

• Click Close
• Click Restart Now

Considerations when creating a Network Share


a. Maximum absolute path and File Name Length – According to the Microsoft
Development Network website the safest length of a file name is 259 characters.
b. Defining who has access – Access on a Microsoft windows shared folder is
controlled by an access control list (ACL). Each ACL contains an access control
entry (ACE) that explicitly identifies what a user or group of users can (allow) or
cannot do (deny)
There are two ACLs in use in a shared folder: the file system permission (if any)
and the File and Print Sharing Permissions.
File system permission – is a more secure file system option for MS allows
individualized or generalized access to various users.

2 GSC-CID-LRMS-ESSLM, v.r. 03.00, Effective June 14, 2021


Setting Up Network Share Process

1. Create a folder on the server. The name should be short but is irrelevant at this
point.
2. Right click folder then click properties, and go to the sharing tab. You can then
take the easy step of clicking on the share button, or take a more controlled
approach with advanced sharing.
Initially, only administrators have full access with sharing. Full access usually
means you can read files, write, create more folders and alter file permissions.
Note: that the dialog indicates that the is owned by the group named
administrators. If you want to add all users with accounts automatically, enter the
group name. Users into the text field. The default access foe new entries is read-
only (i.e cannot edit, delete or make new files and folders.
3. To change these permissions, click on the drop-down arrow next to the
permission level entry, and select whether you want read or read/write (full)
permissions.
4. Click on share, and you will see the full share name of this folder.
Note: You might get a warning about the network being a public network. It is not
advised to use file shares on a public network, as File and Print sharing has been
known to be easily compromised by attackers. Shared folders and printer always
take the form \\nameofserver\nameofresource. This form with the double-
backslash is called the Universal Naming Convention (UNC) name
5. To access the network resource from a workstation, you can go to network node
on windows explorer and enter server with the shared folder is located. This will
list all the shared resources you have to access.
Alternatively, you can type the UNC path in the address bar of windows explorer.
Note: If you are experiencing authentication problems even though you know the
user name, password and permission are correct, ensure that both server and
workstations have the correct time.
Note: Saving and editing item via network share will directly save to the server. If
you get disconnected from the network, you may lose data. Another indicator of
shared resource the icon have a host below, a hand and two heads.

3 GSC-CID-LRMS-ESSLM, v.r. 03.00, Effective June 14, 2021


Let Us Try

Activity I. Computer Naming!

Arrange the given procedures in their proper order. Use numbers to indicate their
order of precedence. The first number is done for you.
_______1. A dialog box will ask you to restart your computer
_______2. Accept or change the name of the server
_______3. In the Computer Name property page, click Change...
_______4. Click Restart Now
_______5. Click Close

Let Us Do

Activity 2: THINK IT!


Directions: Briefly discuss the importance of configuring the computer name.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

Let Us Apply

Activity 3. INSIGHT!

Directions: Briefly discuss the process on how network discovery configure.


___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

4 GSC-CID-LRMS-ESSLM, v.r. 03.00, Effective June 14, 2021


Rubrics

Activity 2 & 3. Scoring Rubric


Excellent Very Satisfactory
Criteria Satisfactory (3) Score
(5) (4)
Content Substantial, specific
Sufficiently developed Limited content with
Knowledge and/or illustrative
content with adequate inadequate elaboration
presentation of ideas elaboration of ideas or explanation
Organizatio The information is broken The information is Organizational pattern is
n and down into block-by-block broken down into block- not identifiable. Some
Structure structure. It follows a by-block structure, but details are not in order
consistent order when may not follow a and this distracts the
describing. consistent order when reader.
describing.
Grammar No error in grammar 1-3 errors in grammar 4 or more errors in
and and/or spelling that and/or spelling that grammar and/or spelling
Spelling distract the reader from distracts the reader that distract the reader
the content from the content from the content

References

CG TVL CSS: Code: TLE_IACSS9-12SUCS-IIIa-e37

SSLM DEVELOPMENT TEAM


Writer: Wilma M. Abendan
Editor: Mayeth B. Ramos
LR Evaluator: Aida D. Nale
Creative Arts Designer: Reggie D. Galindez
Education Program Supervisor – EPP/TLE/TVL: Amalia C. Caballes
Education Program Supervisor – Learning Resources: Sally A. Palomo
Curriculum and Instruction Division Chief: Juliet F. Lastimosa
Asst. Schools Division Superintendent: Dr. Carlos G. Susarno, CESE
Schools Division Superintendent: Romelito G. Flores, CESO V

5 GSC-CID-LRMS-ESSLM, v.r. 03.00, Effective June 14, 2021

You might also like