Information and Communication Technology (ICT) is one of the four (4) components of Technology and Livelihood Education (TLE). One of the courses offered is Computer Hardware Servicing (CHS). This course covers Process and Delivery (PD) which consists of the core competencies that a Grade 10 student ought to possess namely: plan and prepare for configuration, configure computer systems and networks and inspect and test configured computer system and network.
Content Standard
The learner demonstrates understanding of the basic concepts and underlying theories in configuring and maintaining computer systems and networks.
Performance Standard
The learner independently demonstrates competencies in configuring and maintaining computer systems and networks as prescribed in the TESDA Training Regulations.
I - Introduction
The primary purpose of CHS is to provide the learners with the knowledge and skills that will help them become computer hardware technicians. In this year level, learners / trainee should be competent, knowledgeable and skillful in: (1) planning and preparing for configuration; (2) configuring computer systems and network; and (3) inspecting and testing the configured computer systems and network.
.
This curriculum document shall assist and guide the teachers/instructor to effectively teach the content of the Grade 10 Learning module, assess learner’s knowledge and skills, process learners understanding, and evaluate the learner’s evidences of learning.
II - Learning Competencies
The competencies expressed as learning outcomes in this teaching guide are the exact competencies that will be used to assess the learners / trainees for them to secure COC or NC in Computer Hardware Servicing.
This teaching guide would allow teachers / instructors to strategically teach the competencies spread out in the module; guide the learners in performing the activities; process learner’s understanding; and assist the learners in applying what they have learned to an entirely new context.
Utilizing effective teaching methodology and strategies suitable to the learning needs and requirements of the learners, the following are the competencies that should be mastered by learners / trainees after finishing this module.
Lesson 1. Plan and prepare for configuration
Follow OHS in planning and preparing for configuration of computer systems and networks
Prepare computer systems, tools, devices, equipment and materials
Direction: Give the complete meaning of the following acronyms.
UTP
STP
IP
TCP /IP
HTTP
FTP
SSH
IMAP
SMTP
DHCP
DNS
TTL
LAN
VPN
NIC
Skills test pages 41- 42 of Learning Module
Configuration Skills
Directions: Below is a matrix containing the most important skills that one must have to configure computer systems and networks successfully. Check (∕) the appropriate column which describes the level of your confidence in performing the given tasks.
Configuration Skills
I can do it confidently
3
I can do it but with assistance
2
I am not confident
1
I can use the different tools for configuration
I can inspect networking devices and connectors
I can create a cross- over and straight through Ethernet cable
I can test the functionality of an Ethernet cable
I can assign and configure IP address
I can execute the ipconfig command properly
I can manage to create a peer to peer networking
I can configure Network Interface Card using DHCP
I can enable firewall
I can configure file and printer sharing
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total number of items. Refer to the verbal interpretation on the next page to determine your initial configuration ability.
Numerical and Verbal interpretation
Numerical Value
Verbal Interpretation
2.51 – 3.00
Confident
1.76- 2.50
Confident but needs assistance
1.00 – 1.75
Not yet Confident
Other appropriate tools
Check their answers using the answer key on the Feedback portion of this guide.
IV – Know, Process, Reflect and Understand, and Transfer
LESSON 1. PLAN AND PREPARE FOR CONFIGURATION
What to KNOW
Safety Procedures
Guide the learners in understanding safety procedures and general safety guidelines
Let learners understand the fire safety guidelines.
Guide learners in familiarizing the procedures in using computer system configuration tools.
What to PROCESS
Safety Procedures
Guide learners in performing a peer to peer activity on page 45.
Instruct the students to get a partner in order to perform the said activity.
Explain the general directions and show example evidences and picture for a certain circumstances of the activity.
Task: Peer to Peer activity
General Directions: Get a partner to perform the next activity, because this involves a two- person activity. Identify whether the succeeding statements are true or false. You and your partner should gather evidences that make it true and false. Show the effects of not following the safety precautions through a picture presentation.
Example:
Turn off the power and unplug equipment before opening the case and performing service.
Answer
Picture Presentation
True
Evidence
Effect
TRUE OR FALSE
EVIDENCE
PICTURE
A safe workplace is clean, organized and well lit.
Before opening the case and performing services, one must unplug the power from the source.
It is a best practice that a fire extinguisher and first aid kit must be available in the workplace.
You are allowed to open the power supply or a monitor.
You can eat inside the laboratory.
Prepare Tools Used for Configuration
Let learners classify the different tools used for configuration by answering the MS Configuration Command Classification activity on page 56.
Instruct the learners to complete the diagram of applet grouping on page 57.
MS Configuration Command Classification
Directions: There are five functional tabs in MS Configuration utility, namely General, Boot, Services, Startup and Tools. Classify the following items according to the tabs they belong. Write your answer in a clean paper.
Event Viewer
Safe Boot
List of services that start when computer boots
Make all boot settings permanent
Normal startup
No GUI Boot
OS Boot information
Hide All Microsoft Services
Convenient List of Diagnostic Tools
Base Video
II. Applet Grouping
Directions: Complete the diagram of various Control Panel Applets with the components included in their category.
Procedures in Using Computer System Configuration Tools
The teacher may develop tasks relevant to the procedures in using computer system configuration tools to process the learners understanding on the subject matter.
Guide learners in deepening their understanding by conducting a research and investigation.
The teacher must supply the guide questions for the interview
Research and Investigate
Directions: Form a group of five members and research on the different safety precautions used in computer laboratory. Interview/Observe a practitioner while lending a quality service in computer hardware servicing. Use a video camera to record the event stressing the safety guidelines and procedures in the laboratory. You will be rated according to the following rubrics:
Video Documentation of Computer Laboratory Safety Precautions
Criteria
Poor (70-75)
Good (76-85)
Excellent (86- 100)
Content/Information (50%)
Technically sound information
Coherence of information
The provided information was not necessary or not sufficient to the computer laboratory safety precautions.
The provided information was, for the most part, necessary and sufficient to the computer laboratory safety precautions.
The provided information was necessary and sufficient to the computer laboratory safety precautions.
Quality of Video (30%)
Clarity and cohesiveness of the video
Organization and coherence of ideas
It lacks clarity and/or does not present ideas in a coherent way.
Most part is well organized, clear and presents ideas in a coherent way.
The video was well organized, clear and presents ideas in a coherent way.
Interview on practitioner (20%)
Congruency of questions to the topic
Clarity of questions
Questions were not congruent with the topic and were not delivered clearly.
Most of the questions were congruent with the topic and delivered clearly.
All of the questions were congruent with the topic and delivered clearly.
Prepare Tools Used for Configuration
The teacher may provide other relevant activity / activities that are suited to the subject matter.
Let learners conduct a research and exploration to identify the other tools used for computer system and network configuration.
The teacher must provide a format and specifications for the research that will be used by the learners as their guidelines.
Rate their performance based on the rubrics for term or research paper.
Task: Research and Explore
Directions: Conduct a research that identifies other available tools used for computer system and network configuration. Use some other resources like the World Wide Web and interview a practitioner preferably an IT specialist or a computer technician to find out the different tools they use for configuration. Your research will be rated according to the following rubrics:
Rubrics for Term or Research Paper
Qualities & Criteria
Poor (0-74)
Good (75-79)
Very Good
(80-89)
Excellent (90-100)
Format/Layout(15%)
Presentation of the text
Structuring of text
Requirements of length, font and style followed
Followed poorly the requirements related to format and layout.
Some format and layout related requirements were met.
Most format and layout related requirements were met.
All the requirements related to format and layout were strictly followed.
The research was not objective and poorly addresses the issues referred in the proposed topic.
The provided information was not necessary or not sufficient to discuss these issues.
The research was objective and for some part addresses an in depth analysis
The provided information was, for some part, necessary and sufficient to discuss these issues.
The research was objective and for the most part addresses an in depth analysis of most issues referred in the proposed topic.
The provided information was, for the most part, necessary and sufficient to discuss these issues.
The research was objective and addresses with an in depth analysis all the issues referred in the proposed topic.
The provided information was necessary and sufficient to discuss these issues.
Quality of Writing (25%)
Clarity and cohesiveness of sentences and paragraphs
No errors in spelling, grammar and use of English
Organization and coherence of ideas
The essay was not well written, and contains many spelling errors, and/or grammar errors and/or use of English errors.
It lacks clarity and/or does not present ideas in a coherent way.
The essay was well written for some part, without spelling, grammar or use of English errors.
The essay is for some part well organized, clear and presents ideas in a coherent way.
The essay was well written for the most part, without spelling, grammar or use of English errors.
The essay is for the most part well organized, clear and presents ideas in a coherent way.
The essay was well written from start to finish, without spelling, grammar or use of English errors.
The essay was well organized, clear and presents ideas in a coherent way.
References (10%)
Soundness of references
References were not appropriately used and cited.
Some of the references were appropriately used and cited.
Most of the references were appropriately used and cited.
All of the references were appropriately used and cited.
Procedures in Using Computer System Configuration Tools
The teacher shall craft different tasks to enrich learners understanding on the procedures of using different computer system configuration tools.
The teacher may assign learners to apply the result of their research about different computer system configuration tools through a demonstration.
What to TRANSFER
Safety Procedures
Let learners showcase their understanding on safety procedures through a role playing using the collected and collaborated information gathered from the research and investigation activity.
Rate the learner’s performance using the rubric for role playing provided on page 47 of Learner’s Material.
Task: Application of Safety Procedures while accomplishing a task Directions: After the interview and observation with a practitioner, your group will showcase what you have learned through a role playing. You will be rated base on the Rubrics written below:
Rubrics for Role Playing
Criteria
Excellent
4
Good
3
Fair
2
Weak
1
Content (40%)
-Conveys full understanding of the content
Enthusiasm (10%)
-Facial expression and body language generates strong enthusiasm
Interest and Purpose (10%)
-Displays interesting purpose
Speak Clearly (10%)
-Group members speaks clearly at all times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared with props and costumes
Cooperation (10%)
-displays teamwork
Prepare Tools Used for Configuration
Have learners perform an oral presentation of their collected information gathered from the research and exploration activity. Rate their performance through the rubric for oral presentation.
Task : Oral Presentation
Directions: After the thorough research and exploration, you have to present your work individually in an oral manner in front of the class. Your performance will be rated base on the rubric provided in this section.
Rubric for Oral Presentation
CRITERIA
B
(70- 74)
D
(75-79)
AP
(80-84)
P
(85-89)
A
(90-100)
1. Gave an interesting introduction
2. Presented clear explanation of topic
3. Presented information in logical manner
4. Used complete sentence
5. Offered a concluding summary
6. Spoke clearly, correctly, distinctly, and confidently
Procedures in Using Computer System Configuration Tools
Let learners perform the windows registry backup and recovery activity on page 65 of Learner’s Material.
Rate learner’s performance using the rubrics for Registry Backup and Recovery.
Task: Windows Registry Backup and Recovery
Rubrics for Registry Backup and Recovery
CRITERIA
Excellent
4
Good
3
Fair
2
Poor
1
Safety Procedures (15%)
-Applied / manifested safety precautions while working
Adherence to the Procedures (30%)
-Followed the procedures systematically
Workmanship (15%)
-Had organized materials and tools while accomplishing the task and has time management
Quality of work (40%)
-the windows registry was fully backed up
LESSON2. CONFIGURE COMPUTER SYSTEM AND NETWORK
What to KNOW
Introduce the concept of system configuration to the learners by citing circumstances related to configuration.
2.1- Safety Precautions Related to Networks
The teacher may append topics on safety precautions in system and network configuration.
Guide the learners in recognizing the safety precautions related to networks.
2.2- Networking Devices, Media and Connector
Review the different networking devices, media and connector.
Discuss and show visuals of the common types of network cable.
Assist learners in familiarizing the different Ethernet cable.
Discuss and demonstrate the procedures in fabricating Ethernet cables.
2.3- Internet Protocols
Introduce Internet Protocols and discuss the commonly used internet protocols.
Discuss IP address and its five classes.
Let learners be familiar with subnet mask by discussing the theory and types of it.
Discuss the concept IP config command and demonstrate procedures in using it.
Discuss and demonstrate the procedures in assigning a static IP address of a computer.
The teacher may use differentiated strategies to discuss and demonstrate the procedures in assigning a dynamic IP address of a computer.
Introduce the ping command and demonstrate the procedure in using the ping command.
2.4- Peer-to-Peer and Client/server Network
Let learners discover the difference between peer to peer and client / server network.
Demonstrate the essential procedures in setting up a peer to peer network in Windows XP or Windows 7 computer system.
The procedure in setting up a client / server network is not included in the learning module. The teacher must provide supplementary resources to obtain the procedures and have them demonstrated in the class.
2.5- Network Security
Facilitate brain storming activity on the class. The learners must be engaged in discovering the importance of security in computer system and network and the different security attacks.
Discuss and demonstrate the different security procedures.
2.6- File and Printer Sharing
Discuss the concept of file and printer sharing, cite example scenario where it has been used.
Hook learner’s interest by demonstrating the procedures in sharing resources and accessing shared resources as well as the procedures in printer sharing.
What to PROCESS
2.1- Safety Precautions Related to Networks
The teacher is suggested to craft appropriate activities to process learners understanding relevant to safety precautions in system and network configuration.
2.2- Networking Devices, Media and Connector
Let learners answer the criss- cross puzzle on page 86.
Task: Criss- Cross Puzzle
Direction: Complete the criss- cross puzzle and familiarize the cables being described.
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
2.3- Internet Protocols
Instruct learners to accomplish the worksheet for the task entitled “Protocols”.
Task: Protocols
Direction: In this worksheet, you will write the name of the protocol and the default port(s) for each protocol definition in the table.
Be prepared to discuss your answers.
Protocol Definition
Protocol
Default Port(s)
Provides connections to computers over a TCP/IP network
Sends e-mail over a TCP/IP network
Translates URLs to IP address
Transports Web pages over a TCP/IP network
Automates assignment of IP address on a network
Securely transports Web pages over a TCP/IP network
Transports files over a TCP/IP network
The teacher shall provide several IP address for the task entitled “Identifying IP address classes”. It must be written in the board or any visuals available. Give the directions and instruct the learners to accomplish the worksheet for the said activity.