Professional Documents
Culture Documents
Tle Ict Chs Grade 10 TG
Tle Ict Chs Grade 10 TG
Tle Ict Chs Grade 10 TG
Department of Education
Republic of the Philippines
Republic Act 8293, section 176states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein the
work is created shall be necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Authors:
Rosalie P. Lujero
Teacher III / School ICT Coordinator
Dasmariñas East National High School
Ronaldo V. Ramilo
Education Program Specialist
Division of Tanauan
ii
TABLE OF CONTENTS
iii
iv
vi
vii
viii
Quarter I 4 hrs.
Content Standard
Performance Standard
Learning Competencies
I. Introduction
This teacher’s guide will lead you to effectively and efficiently teach Module
1. Moreover, this will guide you in determining relevant and appropriate teaching
techniques and strategies that will fit the learning needs and demands of the
learners to make them best understand and appreciate the importance of
II. Objectives
With your assistance and the guidance of this module, learners are
expected to understand the underlying principles and concepts of PECs,
particularly in:
- identifying areas for improvement, development, and growth,
- aligning learners’ PECs according to their business or career choice, and
- creating a plan of action that ensures success in their business or career
choice.
III. Presentation of Content
Introduction
Guide learners in appreciating and understanding PECs for them to be
successful in business or in the workforce by sharing inspiring real-life
stories of successful businessman and or well-known employees in the field
of Computer Hardware Servicing in the province.
Explain to learners the importance of assessing their PECs.
Guide learners in understanding the importance of entrepreneurs and
entrepreneurship.
Objectives
Guide learners in identifying and understanding the objectives of Module 1.
Pre-Assessment
Use the sample pre-assessment test available in the learners’ materials or
craft a comprehensive teacher-made test to assess learner’s prior
knowledge and skills in PECs.
Evaluate the result of the pre-assessment and prepare a plan of action to
V – Feedback
1. E 6. B
2. K 7. C
3. H 8. I
4. A 9. D
5. J 10. F
VI – References
business-environment--165.php#ixzz1PVjUuaWu
4. http://www.thetimes100.co.uk/theory/theory--constraints--
421.php#ixzz1PVki8a36
5. http://www.thetimes100.co.uk/theory/theory--constraints-on-production--
303.php#ixzz1PVkyDy8k
6. http://www.thetimes100.co.uk/theory/theory--production-and-resource-
requirements--354.php#ixzz1PVlGG7zv
7. http://www.thetimes100.co.uk/theory/theory--nature-and-role-of-marketing--
245.php#ixzz1PVlc88gR
Quarter I 4 hrs.
Content Standard
Performance Standard
The learner independently creates a business vicinity map reflective of
potential market in Computer Hardware Servicing in a province.
Learning Competencies
V. Introduction
cultural, and social conditions prevailing in an area. Needs and wants of the
people in a certain area that are not met may be considered as business
opportunities. Identifying the needs of the community, its resources, available
raw materials, skills, and appropriate technology can help a new entrepreneur in
seizing a business opportunity.
VI. Objectives
Pre-assessment
Use the sample pre-assessment test available in the learner’s materials
or craft a comprehensive teacher-made test to assess learner’s prior
knowledge and skills in environment and market.
Evaluate the result of the pre-assessment and prepare a plan of action to
strategically address the learning needs and requirements of the
learners.
Guide Questions
Ask learners to perform task 2 and guide them in presenting their
answers to the class.
Process learners’ responses and guide them in making appropriate
generalizations.
Learning Goals and Target
Help learners in planning their own learning goals and target as reflected
on page 18.
Provide enrichment activities and guide them in analyzing available
resources and technology in the community to be used in accomplishing
their learning goals and targets.
10
V – Feedback
6. D 6. D
7. C 7. B
8. A 8. C
9. B 9. D
10. A 10. D
VI – References
11
K to12 BASIC EDUCATION CURRICULUM
Information and Communications Technology
Downloaded by Jacly Alima (jaclyalima@gmail.com)
lOMoARcPSD|29254698
60 hrs
Content Standard
Performance Standard
I - Introduction
12
II - Learning Competencies
13
a. Ipconfig c. msconfig
b. regedit d. dxdiag
14
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Input c. Sound
b. Music d. System
8. Which of the following networking cable category is the most
commonly used?
15
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
A B
1. Copper cabling used for a. Crimping tool
telephone communication b. Cross- over
2. Standard Ethernet cable c. Fiber- optic
3. Cable that has a very thin d. Ipconfig
core e. Multi- mode
4. Cable that has a thicker core f. Ping
5. Tool used for crimping RJ45 g. Protocol
6. Connector for Cat 5e cable h. RJ45
7. Set of rules i. Single- mode
8. Indicates the network portion j. Straight through
of an IP address k. Subnet mask
9. Command used find out the l. Twisted pair
IP address
10. Glass or plastic conductor
16
Configuration Skills
Directions: Below is a matrix containing the most important skills that one
must have to configure computer systems and networks successfully. Check
(∕) the appropriate column which describes the level of your confidence in
performing the given tasks.
17
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
What to KNOW
1.1- Safety Procedures
Guide the learners in understanding safety procedures and
general safety guidelines
Let learners understand the fire safety guidelines.
18
What to PROCESS
1.1- Safety Procedures
Guide learners in performing a peer to peer activity on page 45.
Instruct the students to get a partner in order to perform the
said activity.
Explain the general directions and show example evidences
and picture for a certain circumstances of the activity.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
True
19
performing
services, one must
unplug the power
from the source.
3. It is a best practice
thatafire
extinguisher and
first aid kit must be
available in the
workplace.
4. You are allowed to
open the power
supply or a monitor.
1. Event Viewer
2. Safe Boot
3. List of services that start when computer boots
4. Make all boot settings permanent
5. Normal startup
6. No GUI Boot
7. OS Boot information
8. Hide All Microsoft Services
9. Convenient List of Diagnostic Tools
10. Base Video
20
21
Excellent (86-
Criteria Poor (70-75) Good (76-85)
100)
Content/Informatio The provided The provided The provided
n (50%) information was information information was
not necessary was, for the necessary and
Technically sound or not sufficient most part, sufficient to the
information to the computer necessary and computer
Coherence of
laboratory sufficient to the laboratory
information
safety computer safety
precautions. laboratory precautions.
safety
precautions.
Quality of Video It lacks clarity Most part is The video was
(30%) and/or does not well organized, well organized,
Clarity and present ideas in clear and clear and
cohesiveness of a coherent way. presents ideas presents ideas
the video in a coherent in a coherent
Organization and way. way.
coherence of
ideas
22
Directions: Conduct a research that identifies other available tools used for
computer system and network configuration. Use some other resources like
the World Wide Web and interview a practitioner preferably an IT specialist or
a computer technician to find out the different tools they use for configuration.
Your research will be rated according to the following rubrics:
23
24
What to TRANSFER
1.1- Safety Procedures
Let learners showcase their understanding on safety procedures
through a role playing using the collected and collaborated information
gathered from the research and investigation activity.
Rate the learner’s performance using the rubric for role playing
provided on page 47 of Learner’s Material.
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
base on the Rubrics written below:
25
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
AP A
B D P
CRITERIA (80- (90-
(70- 74) (75-79) (85-89)
84) 100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
26
7. Maintained
eye contact
8. Maintained
acceptable posture.
9. Utilized audio-
visual aids
10. Handled
questions and
comments confidently
Total
Grand Total
27
What to KNOW
Introduce the concept of system configuration to the learners by citing
circumstances related to configuration.
28
What to PROCESS
2.1- Safety Precautions Related to Networks
The teacher is suggested to craft appropriate activities to process
learners understanding relevant to safety precautions in system
and network configuration.
29
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
Task: Protocols
Direction: In this worksheet, you will write the name of the protocol and the
default port(s) for each protocol definition in the table.
The teacher shall provide several IP address for the task entitled
“Identifying IP address classes”. It must be written in the board or any
visuals available. Give the directions and instruct the learners to
accomplish the worksheet for the said activity.
30
Task: Comparison
Direction: Using the table below, cite the features of peer-to-peer and client
/server network that describes their difference.
1.
2.
3.
4.
5.
31
A B
1. when an employee intends to a. Accidental threats
cause damage b. Antivirus software
2. when user damages data or c. Data encryption
equipment unintentionally d. Firewall
3. attached to small pieces of e. Malicious threats
computer code, software and f. Traffic
documents g. Trojan horse
4. a self-replicating program that is h. Virus
harmful to network i. VPN
5. it is technically a worm j. WPA
6. software designed to detect, k. WEP
disable and remove viruses l. Worm
7. it involves using codes and
ciphers
8. a way of protecting a computer
from intrusion through the ports
9. an encryption system that
protects data
10. data being transported on a
network
32
1. Cite the importance of file sharing and give an example scenario where its
worth was proven.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Advantages Disadvantages
33
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
34
1. What are the different type of fiber connectors and cite their advantages
and disadvantages?
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
35
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
36
37
38
AP A
B D P
CRITERIA (80- (90-
(70- 74) (75-79) (85-89)
84) 100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information
in logical manner
4. Used complete
sentence
5. Offered a concluding
summary
6. Spoke clearly,
correctly, distinctly, and
confidently
7. Maintained eye
contact
8. Maintained acceptable
posture.
9. Utilized audio-visual
aids
10. Handled questions
and comments
confidently
Total
Grand Total
39
2. Which hardware firewall would you purchase? List reasons for your
selection.
3. Using the Internet, research two different software firewalls. Based on
your research, complete the table below.
Company/Software Website Cost Subscription Length Software
Name URL (Month/Year/Lifetime) Features
4. Which software firewall would you purchase? List reasons for your
selection.
40
What to TRANSFER
2.2- Networking Devices, Media and Connector
Guide the learners in creating their own Ethernet cable by stating the
general directions, materials and tools needed and by discussing the
procedures for the said activity.
Inform the learners about the rubrics to be used in order to rate their
performance (rubrics is on page 90).
Materials:
1) 6 meters Ethernet Cable Category 5e or Cat5e- standard wire for
cabling;
2) RJ45 crimpable connectors for Cat5e;
You just need to follow the procedures cited in this module and apply
the safety precautions to avoid injury or any unwanted incident. You will be
given 30 minutes to complete the task. You will be rated according to the
performance rubric.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out
as shown. The color order is important to get correct.
4. Use scissors to make a straight cut across the wires 1/2 Inch from the
cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.
41
6. A view from the top. All the wires are all the way in. There are no short
wires.
7. Crimping The Cable – carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
8. For a standard "Straight Through" cable, repeat all steps and wire
color order on the other end of cable. For a cross-over cable, the other
end will have a different color order as shown by the crossover picture
above.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
42
Quality of Product
(40%)
-produced a fully
functional Ethernet
Cable
Configuration Rubrics
Adherence to the
Procedures (30%)
(The specified job was done
by following the procedures.
Safety measures were
observed during the activity)
Quality of Work (30%)
(The device was configured
properly)
43
Comprehension (10%)
(Interview / Guide questions
were answered correctly
according to the job
requirements)
Recommended Equipment
Linksys 300N router
A Computer running Window XP Professional
Ethernet patch cable
Step 2
Right-click Local Area Connection, and then choose Properties.
The “Local Area Connection Properties” window appears.
44
Activity Questions:
1. What is the name and model number of the NIC in the “Connect
using:” field?(Answers may vary)
2. What are the items listed in the “This connection uses the
following items:” field? (Answers may vary but must include
Internet Protocol (TCP/IP)
Step 3
Choose Internet Protocol (TCP/IP).
Click Properties.
The “Internet Protocol (TCP/IP) Properties” window appears.
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway
listed in the fields of the “Use the following IP address:” area?
Answers may vary. If the computer is configured to obtain an IP
45
Click OK.
Restart your computer.
Step 4
Log on to Windows as an administrator.
Check the lights on the back of the NIC. These lights will blink
when there is network activity.
Choose Start > Run....
Type cmd and click OK.
46
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter
Local Area Network Connection”? Answers may vary.
2. What is the IP address of the DHCP server? Answers may vary.
3. On what date was the Lease Obtained? Answers may vary.
4. On what date does the Lease Expire? Answers may vary.
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the
LinksysWRT300N.
Recommended Equipment
A computer with Windows XP Professional
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
router
Connect the computer to one of the Ethernet ports on the wireless
with an Ethernet patch cable.
as anPlugadministrator.
in the power of the wireless router. Boot the computer and log in
Step 2
Choose start > Run…, and type “cmd”. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
47
Step 3
48
assigned
Type “CHS#” in the “Network Name (SSID):” field, where # is the number
by your instructor.
Click Save Settings.
The “Settings are successful” screen appears.
Unplug the Ethernet patch cable from the rear of the computer.
Hands- on Activity
50
Direction: In this laboratory activity you will explore the Windows XP Firewall
and configure some advanced settings. There are essential questions that
you need to answer while performing the activity.
Step 1
Navigate to the Windows XP Firewall:
Start > Control Panel > Security Center
The Firewall indicator shows the status of the firewall. The
normal setting is “ON”.
Step 2
51
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
Step 3
52
Essential Question:
Creating too many exceptions in your Programs and Services file
can have negative consequences. Describe a negative consequence of
having too many exceptions.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Step 4
From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings. Network Connection Settings
displays the different connections configured for your computer .
Essential Question:
In the space below, list the services that are available.
___________________________________________________________
___________________________________________________________
___________________________________________________________
Step 5
There are many applications that users do not normally see that
also need to get through the Windows Firewall to access your
computer. These are the network level commands that direct traffic on
the network and the Internet.
53
the menu
Under the ICMP heading, click the Settings button. You will see
where ICMP exceptions are configured.
Essential Question:
In the space below, list the requests for information that your computer will
respond to.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
54
Procedures:
Step 1
Choose My Computer > Tools > Folder Options
Click the View tab.
Uncheck the “Use Simple File Sharing (Recommended)”
checkbox, and then click OK.
Step 2
Right-click the desktop, and then choose New > Folder.
Type Example, and then press the Return key.
Open WordPad. Type “This is an example document”.
Save the file in the “Example” folder with the name “Brief.doc”, and
then close WordPad.
Step 3
Right-click the Example folder, and then choose Sharing and
Security
Click the Share this folder radio button, and then click OK.
55
56
Step 7
Return to the computer that is not directly connected to a printer.
57
58
Step 8
Choose start > Printers and Faxes.
59
Step 9
able to Toprinttesta document
the functionality of file and printer sharing, you must be
or try the sample print feature of a printer.
60
What to KNOW
3.1- Safety Precautions
Let the students be aware of Occupational Health and Safety Policy.
Cite examples and different situations.
61
What to PROCESS
3.1- Safety Precautions
Teacher may provide variation of activities for this lesson to process
learners understanding on the subject matter.
3.2- Guidelines for Testing Configured Computer System and Network
Teacher shall fabricate variation of activities for this lesson to process
learners understanding on the subject matter.
What to TRANSFER
3.2- Guidelines for Testing Configured Computer System and Network
Guide the students in performing the final task on page 161 entitled
“Test the Wireless NIC”.
Ask learners to accomplish the technical report on page 165 after
performing the final task.
The teacher must construct rubrics to validate the performance of
learners.
Direction: In this activity, you will check the status of your wireless
connection, investigate the availability of wireless networks, and test
connectivity. After accomplishing the task you need to write a technical report
regarding the test conducted.
Recommended Equipment
A computer with Windows XP Professional installed
A wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Internet connectivity
62
Step 1
63
Step 2
Open a web browser.
Type www.google.com in the “Address” field, and then press Return.
Step 3
64
Name of Technician:_______________________________________
Date of Inspection: __________________ Time: _______________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
65
V – Summative Assessment
VI –Feedback
Pre / Post- Assessment
I. True or false
1. True
2. True
3. True
4. False
5. False
6. True
7. True
8. True
9. False
10. True
1. C
2. B
3. D
4. A
5. C
6. A
7. C
8. B
9. D
10. A
11. C
12. C
13. C
14. B
15. A
66
1. L
2. J
3. I
4. E
5. A
6. H
7. G
8. K
9. D
10. C
IV. Acronyms
67
Security Center
1) Automatic updates
2) Windows Firewall
3) Internet Options
68
2. VIRUS- PRIMARY
3. SECURITY
4. SECURITY
5. SECURITY
69
Electronic Resources:
“Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
70
http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-
on-off#turn-windows-firewall-on-off=windows-7
71
CONTENT STANDARD
The learner demonstrates understanding of the underlying concepts and
principles in maintaining computer and network systems.
PERFORMANCE STANDARD
The learner independently demonstrates skills in computer systems as
prescribed in the TESDA Training Regulations.
LEARNING COMPETENCIES
I. OBJECTIVES
Guided by the teacher and this module the learner is expected to:
72
II. PRE-ASSESSMENT
I can… YES NO
73
74
75
What to PROCESS
76
Security
1)Anti-Spyware Programs
2)Anti-Virus
Maintenance
1)System Maintenance
Internet Research
Students will answer pages 215-216.
Guide the students in answering the worksheet. Show examples on
hardware components, their specifications and cost.
Let the students browse online.
Let the students go to the community and ask the computer stores and
shops.
Network Layout
77
Pictorial Tour
Investigative Report
Answer activity on page 209.
In this activity, the students may search online about computer systems
status or interview a practitioner lending a service in computer
78
hardware servicing.
Encourage them to make profiling as a source of evidence of
their reports.
Ask the students to make documentations.
79
Critical Review
Answer the activity on page 222.
Let the students create a table of specifications on network hardware.
List brand names and compare.
What to TRANSFER
80
Magazine Article
Answer activity on page 209.
Let the students write an article on the risk about turning off messages
about spyware and virus protection.
Students may base their idea on the interview taken.
Encourage students to ask help from their English teachers in
generating idea.
1. What is the risk of turning off messages about spyware and related
protection?
2. What is the risk of turning off messages about virus protection?
81
Rubrics
Contents Excellent Good Poor(1)
(5) (3)
Total Points
Computer Specifications
Students will answer activity on page 217.
Make a market scanning and look for business establishments for
computer sales and services. Create a price list of brands and sample
model of computer parts with its price.
Show a sample complete hardware components and their prices.
82
Direction: In this activity, students will draw in a short coupon, layout plan of
a computer café connected to a network. Write the specifications of the
network hardware. Incorporate the following requirements:
1. One computer server
2. 20 client computers
3. One DSL modem
4. UTP cables
5. Hub
PERFORMANCE RATING
83
UNDERSTANDING PARTITIONS
84
Scan Disk
http://pcsupport.about.com/od/maintenance/ht/manualtempxp.htm
http://www.computerhope.com/issues/ch000225.htm
http://www.wikihow.com/Delete-Temporary-Internet-Files
http://www.youtube.com/watch?v=_jrCVrMnct8
Disk Cleanup
Discuss lesson on page 271-272.
Define and discuss disk cleanup.
Mention / Infer to the following references
a) http://www.computerhope.com/jargon/d/diskclea.htm
b) http://www.theeldergeek.com/disk_cleanup_utility.htm
c) http://support.microsoft.com/kb/310312
d) http://windows.microsoft.com/en-us/windows/delete-files-using-
disk-cleanup#delete-files-using-disk-cleanup=windows-7
e) http://www.udel.edu/it/help/best-practices/running-disk-cleanup-
windows-computer.html
85
What to PROCESS
2.1 Essay Activity
Let the student answer the activity on page 229.
Let the students write an essay on the importance of data backup
Directions: In this activity, list down at least five (5) problems, error
messages or incidents you encountered while working or using the computer.
Then your actions you have taken.
86
Directions: Have five members per group and make a research on the
different cause and effect of data backup, malware maintenance and disk
maintenance. You can also interview / observe a practitioner while lending a
quality service in computer hardware servicing. This event will be presented
orally through a role playing.
87
Before you start, ask yourself the following questions to help you determine
the kind of partitions to create:
Now, that you are done with the disk image, to enlighten your
understanding and knowledge have some more readings about it thru books
and other resources. You should consider the following topics for research:
1. Acronis True Image
2. Norton Ghost Image
3. Other disk Image backup software
2.5.1
1. What are the things that the scan disk could do in a computer? How
often do you scan disk your computer?
2. Computers should be protected from errors to prevent component
malfunction. What anti-static are the things you should do to avoid
such malfunction?
2.5.2
Computer Terminologies
88
In this activity, you will learn how useful the Internet can be for a PC support
technician.
1. Research the Web site for the importance of Disk Cleanup and
when to apply it.
What to TRANSFER
2.1
The students will have a group activity on pages 230-231.
Guide the students to analyze the given situations and perform the
task required.
Let the students showcase their talents in acting.
Role Playing
89
Content (40%)
-Conveys full understanding
of the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting
purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with
props and costumes
Cooperation (10%)
-displays teamwork
90
Directions: In this activity, the students will group into three (3) and make an
interview and observation with a practitioner, the group will showcase what
you have learned through a video demo or tutorials. Use your digital cameras
or cell phones. You will be rated base on the Rubrics written below:
Criteria Excellent Good Fair Weak
4 3 2 1
Content (40%)
-Conveys full understanding of
the content
Enthusiasm (10%)
-Facial expression and body
language generates strong
enthusiasm
Interest and Purpose (10%)
-Displays interesting purpose
Speak Clearly (10%)
-Group members speaks
clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with props
and costumes
Cooperation (10%)
-displays teamwork
2.3
Student will answer the activity on page 258.
Let the students perform the activity
Directions: The class will be divided into five (5) groups. Each group has its
own respective leader. The group will perform a task regarding familiarizing
the cleaning components of computer. After the activity they will be graded
using the given Performance Score Card below:
91
Performance Rating
2.5
Answer activity on page 267.
Guide the students in answering the following activities.
Let the students follow the procedure on scanning flash drives
1. Concept Mapping
In this activity, you will write on the figures the concept which will relate
to the word “scan”. Add more shapes if you want.
92
SCAN
Here's How:
Directions: Pair the students. Let them perform the deleting of temporary
internet files. After the activity they will be graded through the given
Performance Score Card below:
CRITERIA Passed Failed
93
2.5.3
Answer activity on page 274-275.
Let the students perform the activity.
Activity
Directions: You are to delete temporary files in the different Operating
Systems.
1. Delete Temporary Files in Windows 7 and Windows 8
2. Delete Temporary Files in Windows XP
What to KNOW
Maintain Network Systems
Discuss the lesson on pages 276-282.
Educate the students on how to create a simple maintenance
schedule and how to fill-up the checklist.
Teach the students how to perform network maintenance procedure.
Show Teacher’s personal monitoring checklist for the computer
laboratory
Discuss procedures for General Safety
Burn-In Testing
Discuss the lesson on page 283-284.
Demonstrate the burn-in testing procedure.
Follow the step by step process.
What to PROCESS
3.1
Let the students answer the activity on page 282.
Guide the students in filling-up the Maintenance Inspection Checklist
Let the students accomplish the maintenance inspection checklist.
94
Guide them in performing the task. Ask if they have any suggestions.
Accomplish the maintenance inspection checklist below: Put a check mark on
the column which states an action taken.
Video Tutorial
Direction: To deepen your understanding about maintaining networks
system, watch the video on http://www.youtube.com/watch?v=cMCCLKDHXqI
and make an outline steps or procedure of the action taken presented or
shown in the video.
What to TRANSFER
Let the students do the activity on page 276.
95
What to KNOW
96
4.7 Prepare technical reports that comply with the job requirements
Discuss the lesson on General Safety Guidelines on page 305.
What to PROCESS
Let the students do the activity on page 293.
Let the student download and explore free network diagnostic tool.
Experiment and Demonstrate
To check the vulnerability or stability of your network connection, go to the
internet and download a free network diagnostic tool.
Go to any search engine and type – network diagnostic tool.
97
After downloading the application, run the setup file of the program and
install it into your computer.
If the program was already installed, run the application. Take note of the
diagnosis. Do some action if there are problems or errors encountered.
98
99
100
101
Video Tutorial
Let the students perform the task on page 304.
102
Direction: You are to enumerate the hardware items that can be seen inside
the computer laboratory, applications installed in a computer, network
devices, computer tools and others.
What to TRANSFER
System Restore
Network Checking
Guide the students in doing the activity on pages 300.
Let the students apply the Ping Command in doing the activity.
Direction: In this activity, you will check the network status by using the ping
command. Make a status report on the results.
1. Ping a website
2. Ping the router
103
3. Ping a terminal/computer
CRITERIA 1 2 3 4 5
Total:
104
PERFORMANCE RATING
VI –Feedback
Answer key for Module 4
1. C
2. A
3. K
4. J
5. H
6. D
7. G
105
8. L
9. B
10. F
106
Summative Test
Test 1.
1. Tablet PC
2. Server
3. Minicomputer
4. Microcomputer
5. Netbook
6. Desktop computer
7. Digital
8. Mainframe
9. PDA
10. Wearable computer
11. Operating system
12. Input devices
13. Output device
14. Storage devices
15. Firewall
16. WAN
17. Network gateway
18. Network
19. Hub
20. Bridge
Test II
1. True
2. True
3. True
4. True
5. True
6. True
7. True
8. True
9. True
10. True
11. True
12. True
13. False
107
14. True
15. True
Test III.
1. C
2. D
3. A
4. C
5. B
6. B
7. A
8. D
9. C
10. B
Test IV
1. C
2. A
3. P
4. O
5. J
6. E
7. H
8. Q
9. B
10. G
11. D
12. M
13. L
14. I
15. K
Test I
1. Place computer in a well-ventilated area.
2. Schedule the use of computer for its longer life
3. Treat your computer properly
4. Backup your files.
5. Delete temporary files.
108
Test II
1. a
2. b
3. c
4. b
5. c
6. c
7. b
8. b
9. a
10. a
11. a
12. b
13. a
14. c
15. c
16. a
17. a
18. c
19. d
20. d
Test III
1. e
2. c
3. b
4. d
5. a
VII. REFERENCES
Ron Gilster, “PC Repair Bench Book”., Wiley Publishing Inc., 10475
109
Barry Press, Marcia Press, “PC Upgrade and Repair Bible, Desktop
Edition”., Wiley Publishing Inc., 10475 Crosspoint Boulevard,
Indianapolis,IN 46256
Electronic Resources:
110
http://www.instructables.com/id/Disassemble-a-Computer/-
111