0% found this document useful (0 votes)
27 views49 pages

TVL12 Ict-Css W3

This document is a self-learning module for Grade 12 students in the Technical-Vocational Livelihood program, focusing on Computer Systems Servicing and network configuration. It outlines the objectives, competencies, and activities for students to engage in guided and independent learning, while also providing instructions for facilitators. The module emphasizes the importance of understanding network connectivity and troubleshooting techniques to ensure effective network setup and maintenance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views49 pages

TVL12 Ict-Css W3

This document is a self-learning module for Grade 12 students in the Technical-Vocational Livelihood program, focusing on Computer Systems Servicing and network configuration. It outlines the objectives, competencies, and activities for students to engage in guided and independent learning, while also providing instructions for facilitators. The module emphasizes the importance of understanding network connectivity and troubleshooting techniques to ensure effective network setup and maintenance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

12

Technical-
Vocational-
Livelihood (TVL)
ICT – Computer Systems Servicing
Quarter 1 - Week 3

i
Technical-Vocational Livelihood – Grade 12
Self-Learning Module
Week 3 - Module 3
First Edition, 2020

Republic Act 8293 section 176 states that: No copyright shall subsist in
any work of the Government of the Republic of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency of office
may, among other things. Impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, photos, brand names,


trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek permission
to use these materials from their respective copyright owners. The publisher
and authors do not represent nor claim ownership over them.

DEVELOPMENT TEAM OF THE MODULE

Writers : Marvie A. Montano, Teacher I


Reviewers :
Illustrator : Mar Onell C. Booc, Designation
Layout Artist : Mar Onell C. Booc, Designation
Plagiarism Detector Software : PlagiarismDetector.com
Grammarly Software : CitationMachine.com

Management Team:
Schools Division Superintendent : Dr. Wilfreda D. Bongalos CESO V
Assistant Schools Div. Superintendent : Dr. Marcelita S. Dignos CESO VI
Chief Education Supervisor, CID : Dr. Oliver M. Tuburan
Education Program Supervisor, LRMDS: Mrs. Teresita A. Bandolon
Education Program Supervisor, TLE : Reynold Q. Velos

Department of Education – Regional Office 7


DepED-Division of Lapu-Lapu CIty
Office Address : B. M. Dimataga Street, Poblacion, Lapu-Lapu City
Telefax : (032) 340 7887
E-mail Address : depedlapulapu@deped.gov.ph

ii
Property of DepED-Division of Lapu-Lapu City | www.depedlapulapu.net.ph | (032) 340-7354
INTRODUCTORY MESSAGE

For the facilitator:

Welcome to the Computer Systems Servicing 12 Self-Learning Module


on Set Network Configuration.

This module was collaboratively designed, developed and reviewed by


educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social and economic constraints
in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21 st century skills while taking
into consideration their needs and circumstances.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners’ progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.

For the learner:

Welcome to the Technical-Vocational-Livelihood 12 Self-Learning


Module on Computer Systems Servicing.

The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.

iii
HOW TO USE THE MODULE

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.

2. Don’t forget to answer What I Know before moving on to the other


activities included in the module.

3. Read the instruction carefully before doing each task.

4. Observe honesty and integrity in doing the tasks and checking your
answers.

5. Finish the task at hand before proceeding to the next.

6. Return this module to your teacher/facilitator once you are through with
it.

If you encounter any difficulty in answering the tasks in this module,


do not hesitate to consult your teacher or facilitator. Always bear in mind that
you are not alone.

We hope that through this material, you will experience meaningful


learning and gain deep understanding of the relevant competencies. You can
do it!

iv
Lesson 3 – Set Network Configuration

What I Need to Know


This will give you an idea of the skills or competencies you are expected to
learn in the module.

This lesson is designed and written with you in mind. It is here to help
you understand on how to set network configuration. The scope of this
module permits it’s to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course.
At the end of this module, you should be able to:
Content Standards:
A. demonstrate an understanding of concepts and principle in setting
up computer networks.
Performance Standards:
A. set up computer networks based established procedures and system
requirements for hardware.

Learning Competency:
1. Check network connectivity of each terminal in accordance with
network design.

2. Diagnose and repair any problem or fault in the network system in


line with standard operating procedures.

3. Configure Network Interface Card (NIC) in accordance with the


network design.

4. Carry out communication check between terminals in accordance


with operating systems network configuration guides.

5. Respond to unplanned events or conditions in accordance with


established procedures.

DepED-Division of Lapu-Lapu City 1 TLE/TVE/TVL


What I Know
This part includes an activity that aims to check what you already know about
the lesson to take. If you get all the answers correctly (100%), you may decide
to skip this module.
Pre-Test 3.0
Let us determine how much you already know about setting network
configuration. Take this test.

A. TRUE OR FALSE
Write True if the statement is correct and False if it is wrong.

__________1. NDF simplifies and automates many of the common


troubleshooting steps and solution implementations for networking
troubles.
__________2. A sharing scenario is a predefined collection of providers
for a specific function, such as file sharing or wireless LAN access.
__________3. Request timed out message indicates that the requested
host name cannot be resolved to its IP address.
__________4. Ping is a network administration utility or tool used to test
connectivity on an Internet Protocol (IP) network. It also measures the
latency or delay between two computers.
__________5. Unknown host message indicates that no reply messages
were received within the default time of 1 second.

B. MULTIPLE CHOICE

Direction: Read the statements carefully. Encircle the letter of the correct
answer.

1. What permission level can view shared files and run shared programs,
but cannot change or delete files?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users

2. What permission level that is available only for shared folders (not shared
files), allows the user to view all files, add files, and change or delete files that
the user adds?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users

3. Which permission level that has the same privileges that you do as the
Owner: They can view, change, add, and delete files in a shared folder?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users

TVL 12-Computer Systems Servicing 2 DepED-Division of Lapu-Lapu City


4. What option removes access control entries that are not inherited, removes
network share, and folder will no longer be visible in another user’s Network
folder?
A. Advanced Sharing C. Default Sharing
B. Change Sharing permission D. Stop sharing

5. Which access permission allows users to create, read, write, rename, and
delete files in the folder and its subfolders?
A. Change C. Read
B. Full Control D. Write

6. What network issue that shows errors such as the network parth cannot
be found,
IP Address could not be found, or DNS name does not exist?
A. DNS Problems
B. Duplicate IP Addresses
C. Local Network in Unable to Connect to the internet
D. Unable to Connect to Local File or Printer Shares

7. It is a network issue that considered as among the most difficult network


problems to solve, due to the number of components that need to be
configured properly.
A. DNS Problems
B. Duplicate IP Addresses
C. Local Network in Unable to Connect to the internet
D. Unable to Connect to Local File or Printer Shares

8.It is a network issue typically due to congestion, or sometimes poor quality


connections that have corroded or otherwise deteriorated.
A. IP Address Exhaustion
B. Single Workstation Unable to Connect to the Network
C. Slow Internet Performance
D. Unable to Connect to Local File or Printer Shares

9. It is a network issue that only a single workstation is displaying the "No


internet"
message and we can turn the attention to any hardware and software that is
particular to that system.
A. IP Address Exhaustion
B. Single Workstation Unable to Connect to the Network
C. Slow Internet Performance
D. Unable to Connect to Local File or Printer Shares

10. What network issue that when two devices attempt to share a single IP,
you see the dreaded "Address Already in Use" error with no ability to access
the network?
A. IP Address Exhaustion C. Duplicate IP Addresses
B. DNS Problems D. Slow Internet Performance
Refer to Answer Key
TVL 12-Computer Systems Servicing 3 DepED-Division of Lapu-Lapu City
What’s In
This is a brief drill or review to help you link the current lesson with the
previous one.

Network configuration is the process of setting a network's controls,


flow and operation to support the network communication of an organization
and/or network owner. This broad term incorporates multiple configuration
and setup processes on network hardware, software and other supporting
devices and components.

A network connects computers, mobile phones, peripherals, and even


IoT devices. Switches, routers, and wireless access points are the essential
networking basics. Through them, devices connected to your network can
communicate with one another and with other networks, like the Internet.

What Is It
This section provides a brief discussion of the lesson. This aims to help you
discover and understand new concepts and skills.

How to Check Network Connectivity


You’ve set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare your
network finished: You must verify that the network works as expected.

Here are a few simple tests you can conduct to make sure your network
is functional.

• Check the physical connections.

Check that the Link light — the little red or green light next to the RJ-
45 port — is lit on every computer. You must check this light both on
the computer itself and on the switch or router the computer is plugged
into. If this light is not on, you have a connection problem — most likely
a bad cable.

• Verify that you can log on.

When you’re sure the physical connections are good, you should
attempt to log on to each of your network computers using a valid
domain user account.

• Check the network configuration.

Using ipconfig

TVL 12-Computer Systems Servicing 4 DepED-Division of Lapu-Lapu City


In Windows, ipconfig is a console application designed to run from the
Windows command prompt. This utility allows you to get the IP address
information of a Windows computer. It also allows some control over
active TCP/IP connections.

In execute the command, click the Start button, type cmd and press
Enter. From the command prompt, type ipconfig to run the utility with
default options. The output of the default command contains the IP
address, network mask, and gateway for all physical and
virtual network adapters.

This command will spit out numerous lines of information. The line
you’re looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 10.0.0.2(Preferred)

If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP
server is working.

• Verify that the computers can ping each other.


Another basic test you should perform is to use the ping command from
a command prompt to make sure that the computers on your network
can contact one another.

Ping is a network administration utility or tool used to test connectivity


on an Internet Protocol (IP) network. It also measures the latency or
delay between two computers.

TVL 12-Computer Systems Servicing 5 DepED-Division of Lapu-Lapu City


To test network connectivity with ping:

1. Open the Command Prompt. Click the Start button and


enter "cmd" into the Search field.

2. Type ping followed by an IP address or a website address then


press Enter key to execute the command.

Here are screenshots of a successful ping test:

Unsuccessful ping replies:


Request timed out

This message indicates that no Reply messages were received within the
default time of 1 second. This can be due to many different causes; the
most common include network congestion, failure of the ARP request,
packet filtering, routing error, or a silent discard. Most often, it means
that a route back to the sending host has failed. This might be because
the destination host does not know the route back to the sending host,
or one of the intermediary routers does not know the route back, or even
that the destination host's default gateway does not know the route
back. Check the routing table of the destination host to see whether it
has a route to the sending host before checking tables at the routers.

TVL 12-Computer Systems Servicing 6 DepED-Division of Lapu-Lapu City


Unknown host

This error message indicates that the requested host name cannot be
resolved to its IP address; check that the name is entered correctly and
that the DNS servers can resolve it.

Destination host unreachable

This message indicates one of two problems: either the local system has
no route to the desired destination, or a remote router reports that it has
no route to the destination. The two problems can be distinguished by
the form of the message. If the message is simply "Destination Host
Unreachable," then there is no route from the local system, and the
packets to be sent were never put on the wire. Use the Route utility to
check the local routing table.

If the message is "Reply From < IP address >: Destination Host


Unreachable," then the routing problem occurred at a remote router,
whose address is indicated by the "< IP address >" field. Use the
appropriate utility or facility to check the IP routing table of the router
assigned the IP address of < IP address >.

If you pinged using an IP address, retry it with a host name to ensure


that the IP address you tried is correct.

Do several ping tests. First, make sure that TCP/IP is up and running by having
the computer try to ping itself. Open a command prompt and type ping localhost.
The output from this command will indicate whether or not the ping was
successful.

Inspect & Diagnose Computer Network


When a user experiences a networking problem, NDF provides the
ability to diagnose and repair it by presenting the person with diagnostic
assessments and resolution steps. NDF simplifies and automates many of the
common troubleshooting steps and solution implementations for networking
troubles.

Network Troubleshooting from the Network Icon in the Notification Area

You can easily launch network troubleshooting by right-clicking on the


network icon in the notification area of the Windows 7 desktop and selecting
Troubleshoot problems. Windows Network Diagnostics will launch and
attempt to detect and correct what’s wrong.

Network Troubleshooting from Control Panel

With Windows 7, you don’t have to wait for an error to occur to use the
built-in diagnostics. You can launch a troubleshooting session anytime from

TVL 12-Computer Systems Servicing 7 DepED-Division of Lapu-Lapu City


the new Troubleshooting item in Control Panel. When you do, the screen
shown in Figure 1 appears. In this case, the tool has found that the computer
has no Internet connection. The page displays a boxed message that informs
you of the problem and offers a Try to connect again option.

Figure 1. Opening the Troubleshooting item in Control Panel produces this screen.

If you click on the Network and Internet selection, you’ll get the dialog
box shown in Figure 2. There you can choose from seven options that start
sessions for troubleshooting several types of issues: Internet-connection
difficulties, problems accessing files and folders on other computers, and
network-printing troubles.

Figure 2. Troubleshooting network and Internet problems.

Choosing any of the seven options launches a wizard that steps you
through diagnosis of the problem, and if possible, automated or manual
correction. The troubleshooter also records an Event Tracing Log (ETL). If the

TVL 12-Computer Systems Servicing 8 DepED-Division of Lapu-Lapu City


problem can’t be resolved, you can examine and even forward the log. Just
click on View History from the Troubleshooting dialog. Figure 3 shows an
example ETL.

Figure 3. An example of troubleshooting history.

Each item in the history list represents a separate troubleshoot ing session.
Double-clicking on a session displays the results for it.

Figure 4. Example of a troubleshooting report.

To view the details of the detection, click the Detection details link,
and you’ll see a window like the one in Figure 5.

TVL 12-Computer Systems Servicing 9 DepED-Division of Lapu-Lapu City


Figure 5. A typical Detection-details screen from a troubleshooting report.

Near the top of the dialog, you’ll see the name of the ETL file that
contains the information from the troubleshooting session. If you want to send
a copy to support staff or Microsoft for analysis, you can save the file by
clicking on its name, which will bring up the File Download dialog.

You can view and analyze ETL files with Network Monitor 3.3. You can
also view the files with Event Viewer and the Tracerpt.exe tool as well as by
converting them to XML or text files with the netsh trace convert command.
You can save the details of the troubleshooting session in a CAB file by right-
clicking the session in the Troubleshooting History window and then selecting
Save As. Just as with ETL files, you can send the CAB file to support staff for
analysis.

Network Tracing with Netsh.exe

Windows 7 includes a new Netsh.exe context, netsh trace, for network


tracing. Commands in the netsh trace context allow you to selectively enable
tracing for providers and scenarios. A provider represents an individual
component in the network protocol stack, such as Winsock, TCP/IP, wireless
LAN services, or NDIS. A tracing scenario is a predefined collection of
providers for a specific function, such as file sharing or wireless LAN access.
To exclude irrelevant details and reduce the size of the ETL file you can apply
filters.

Typically, to perform detailed troubleshooting of networking issues, you


have to supply your helpdesk staff or Microsoft’s Customer Service and
Support organization with both internal component tracing information and

TVL 12-Computer Systems Servicing 10 DepED-Division of Lapu-Lapu City


a capture of the network traffic at the time of the problem. Prior to Windows
7, you had to carry out two different procedures to obtain this information:
Use Netsh.exe commands to enable and disable tracing and a packet-sniffer
program, such as Network Monitor to capture the network traffic. And then
you faced the difficult task of tying together the information from these two
sources to determine when network traffic was sent relative to the events in
the tracing logs.

In Windows 7, when you perform network tracing with commands in


the netsh trace context, ETL files can contain both network traffic and
component tracing in sequence. And you can display the ETL files with
Network Monitor 3.3, which provides much more efficient way to analyze and
troubleshoot network problems. Figure 6 shows an example of an ETL file
being viewed in Network Monitor 3. 3.

Figure 6. Using Network Monitor 3.3 to view the network traffic recorded in an ETL file.

With this new capability, capturing network traffic requires neither end
users nor helpdesk staff to install and use Network Monitor on the computer
having the problem. Note that by default the ETL files generated for
troubleshooting sessions from Control Panel | Troubleshooting do not contain
network traffic information.

To capture both tracing and network traffic information sequentially for


multiple components in the network stack (such as Winsock, DNS, TCP,
NDIS, WFP and so forth), Windows uses an activity-ID-based correlation
known as grouping to collect and record the tracing and traffic information in
the ETL file. Grouping within the ETL file allows you to examine the entire
transaction as a single, correlated sequence of events. For more information
about the Netsh.exe commands for a tracing session, see the “Starting and
Stopping a Netsh.exe Trace” sidebar.

TVL 12-Computer Systems Servicing 11 DepED-Division of Lapu-Lapu City


When you enable tracing with Netsh.exe, Windows 7 can create two
files. An ETL file contains trace events for Windows components, and if
specified, network traffic. By default, the ETL file is named Nettrace.etl and
stored in the %TEMP%\NetTraces folder. You can specify a different name
and storage location with the trace file= parameter. An optional CAB file can
contain several types of files including text, Windows Registry, XML and
others that store additional troubleshooting information. The CAB file also
includes a copy of the ETL file. By default, the CAB file is named Nettrace.cab
and stored in the %TEMP%\NetTraces folder.

You can also use Netsh.exe tracing in conjunction with Control Panel |
Troubleshooting. First, use the appropriate Netsh.exe command to enable
tracing for the scenario. For example, use the netsh trace
scenario=internetclient report=yes command. Use Control Panel |
Troubleshooting to run the Connect to the Internet troubleshooting session.
When complete, run the netsh trace stop command. Now, when you view the
history of the troubleshooting session, you’ll be able to access the CAB file.

Sidebar: Starting and Stopping a Netsh.exe Trace

To start a network trace with Netsh.exe, first run an elevated command


prompt. To display the list of trace providers, type netsh trace show providers.
To produce the list of trace scenarios, type netsh trace show scenarios. To
show the list of trace providers within a scenario, type netsh trace show
scenario Name. You can start a trace for one or multiple providers or
scenarios. For example, to do so for the Internet Client scenario, type netsh
trace start scenario=internetclient.

To start tracing for more than one scenario, you can specify all of the
appropriate scenarios, such as netsh trace start scenario=File Sharing
scenario=Direct Access. You can create a CAB file with a formatted report by
including the report=yes parameter. Use trace file=parameter to specify a
name and location for the ETL and CAB files. If you want to record network
traffic in the ETL file, include the capture=yes parameter.

For example, here’s the command that will start a trace for the WLAN
scenario, create a CAB file with a formatted report, capture network traffic,
and store the files with the name WLAN Test in the C:\Tshoot folder: netsh
trace start scenario=WLAN capture=yes report=yes trace
file=c:\tshoot\WLANtest.etl. To stop tracing, use the netsh trace stop
command. For more information, see Netsh Commands for Network Trace in
Windows Server 2008 R2.

Sidebar: Using Network Monitor 3.3 to View ETL Files

Before Network Monitor 3.3 can fully display the ETL files generated by
Windows 7, you must configure full Windows parsers. By default, Network
Monitor 3.3 uses stub Windows parsers. To configure full Windows parsers,
click Tools | Options | Parsers. In the list of parsers, click Windows | Stubs
to disable stub parsers and enable full parsers, then click OK.

TVL 12-Computer Systems Servicing 12 DepED-Division of Lapu-Lapu City


Configure Computer Network

How to Configure a Static IP Address in Windows 7


Sometimes in order to gain connectivity in certain networks where a
DHCP server is not running, the configuration of a static IP address is
required.

The steps required to setup up a static IP address are rather


straightforward, but the process is a bit different from Windows Vista and XP.
Let’s go through the steps now and configure a static IPv4 address in Windows
7.

Static IPv4 Configuration in Windows 7

The first thing that must be done is to gain access to the Network and
Sharing Center in Windows 7. This can be done in one of two ways; the first
way to access it is via the control panel.

Select the Windows 7 or on the bottom left-hand corner and select the
control panel option as shown below:

TVL 12-Computer Systems Servicing 13 DepED-Division of Lapu-Lapu City


There are several views which are available for the control panel; by
default the category view is used. When using the category view the option
that you need to select is called View network status and Tasks, as highlighted
below. This will bring you to the Network and Sharing Center.

The second way to gain access to the Network and Sharing Center is to utilize
the network icon which is displayed in the system tray when a network
interface has been enabled.

When this icon is right-clicked the option to open the Network and
Sharing Center is given as shown below:

Once the Network and Sharing Center is open there is an option which
allows the change of adapter settings which is shown in the upper left hand
corner of the window. This is shown highlighted in the following figure (click
on the image to enlarge):

TVL 12-Computer Systems Servicing 14 DepED-Division of Lapu-Lapu City


Once in the Network Connections window, an interface must be
selected which is going to be configured with the static IP address. In the
following example, both a wired and wireless interface is shown as
examples.

For the purposes of this article the wired interface will be used as the
interface being given a static IP Address.

By right-clicking on the correct interface a sub-menu is shown; from


this menu select the properties option.

TVL 12-Computer Systems Servicing 15 DepED-Division of Lapu-Lapu City


Once the properties option is selected the interface properties windows
will be displayed. This screen gives the option to configure a number of
different network parameters. Since we want to change the interface IPv4 IP
address this option must be selected from the window. Once this option is
selected the properties button will be enabled; press the properties button.

Once the properties button is pressed the IPv4 properties window is


displayed which shows that the interface is currently configured to obtain
both its IP address and its DNS server information automatically.

TVL 12-Computer Systems Servicing 16 DepED-Division of Lapu-Lapu City


In order to change to a static IP address the option to Use the following
IP address must be selected; once this is done the option to enter the IP
address parameters is enabled and the Use the following DNS server
addresses option is selected.

For the purpose of this article the IP address 192.168.1.100 is used


with a subnet mask of 255.255.255.0 and a default gateway of 192.168.1.1.
The DNS server which will be configured is 4.2.2.2.

These options are shown in their correct locations in the following


figure:

TVL 12-Computer Systems Servicing 17 DepED-Division of Lapu-Lapu City


Once these options have been entered on the screen simply press Ok
on both property screens and the configuration of a static IP is complete.

The knowledge of static IP configuration is vital in modern


organizational environments as many do not completely utilize automatic IP
assignment; it is also vital knowledge when trying to troubleshoot IPv4.

HOMEGROUP Configuration in Windows 7

A new option which was introduced with Windows 7 is HomeGroup.


HomeGroup allows Windows 7 machines to be linked in an easier way which
makes the sharing of resources between machines much simpler to setup.
Each machine must become a member of a HomeGroup in order to utilize this
functionality.

The first thing that must be done on the first computer used is the
creation of a HomeGroup. This is done through the Choose HomeGroup and
Sharing Options in the Network and Sharing Center window.

Once this option is selected, the HomeGroup window is displayed. The


first computer to be configured with a HomeGroup will be given the option to
Create a homegroup. Once a HomeGroup is configured on a network it will
actively broadcast its existence to the other computers on the network
(HomeGroup requires IPv6 to be enabled), this option is shown in the following
figure:

TVL 12-Computer Systems Servicing 18 DepED-Division of Lapu-Lapu City


TVL 12-Computer Systems Servicing 19 DepED-Division of Lapu-Lapu City
Once a HomeGroup has been created on a network, all other
participating computers must join it. In order to join the HomeGroup, the
HomeGroup password shown in the figure above is required (this can also be
changed).

The following figure shows how the HomeGroup window will display
when there is an existing HomeGroup on the network. Once this is shown,
simply press theJoin now button and select the local shared options and enter
the HomeGroup password.

TVL 12-Computer Systems Servicing 20 DepED-Division of Lapu-Lapu City


Once this is complete the machine has become part of a HomeGroup.

Windows 7 Network Locations aka Profiles

Another feature which can be used with Windows 7 is network location.


Everytime a new network connection is established, a prompt will be given to
select what type of location the new network connection is. The three options
are Home, Work and Public.

When using the Home location, network discovery and HomeGroup are
enabled which allows the easy networking of Windows machines. The Work
location is similar to the Home location but disables the use of the
HomeGroup functionality. The Public location is the most secure and disables
the various sharing functionalities which are enabled then in the other
locations.

The current location which is selected is shown in the Network and


Sharing Center under View your active networks and can be changed by
selecting the current setting.

TVL 12-Computer Systems Servicing 21 DepED-Division of Lapu-Lapu City


Once the setting is selected the Set Network Location window is
opened which enables the configuration of a different network location. This
window is also the same window which will be used to prompt initial
network location selection.

Conclusion

There are a number of different advanced options which can be utilized


with Windows 7; this article shows how to configure some of the most used
options. Windows 7, as with newer operating systems, continues to make
better help systems. Take the time to utilize these systems and learn even
more about Windows 7 functionality.

How to Change the Name of Your Windows Computer

Changing this in XP was extremely simple, but in Windows 7, Windows


8, or Vista it’s buried behind a few more menus. Here are three routes you
can take to open up System Properties:

• Type sysdm.cpl into the start menu search box (quickest)


• Right-click on the Computer option on the start menu or in My
Computer.
• Open Control Panel, and go to System and Maintenance, and then
System.

If you chose one of the last two options, then you’ll need to click on
Advanced System Settings on the left menu:

TVL 12-Computer Systems Servicing 22 DepED-Division of Lapu-Lapu City


Now you’ll finally be on the right screen, which should say System Properties.

Click on the “Change” button to rename the computer, which will pop up this
dialog:

Now you can finally change the name of the computer. You could also change
the name of the workgroup to something more descriptive as well. You’ll have to
reboot after you make this change.

TVL 12-Computer Systems Servicing 23 DepED-Division of Lapu-Lapu City


Share Files and Folders over the Network

Sharing files with public folders

To share items in your Public folder and its subfolders with other users
of your computer, you don’t need to do a thing. By default, all users with an
account on your computer can log on and create, view, modify, and delete files
in the Public folders. The person who creates a file in a Public folder (or copies
an item to a Public folder) is the file’s Owner and has Full Control access. All
others who log on locally have Modify access. For more information on access
levels, see what are permissions?

To share items in your Public folder with network users, click the Start
button , click Network, and then click Network and Sharing Center. Turn on
Public Folder Sharing (for information on how to do this, see sharing files with
the Public folder). You can’t select which network users get access, nor can
you specify different access levels for different users. Sharing via the Public
folder is quick and easy—but it’s rigidly inflexible.

Sharing files and folders from any folder

Whether you plan to share files and folders with other people who share
your computer or with those who connect to your computer over the network
(or both), the process for setting up shared resources is the same as long as
the Sharing Wizard is enabled. We recommend that you use the Sharing
Wizard even if you normally disdain wizards. It’s quick, easy, and almost
certain to make all of the correct settings for network shares and NTFS
permissions—a sometimes daunting task if undertaken manually. Once
you’ve configured shares with the wizard, you can always dive in and make
changes manually if you want.

To make sure the Sharing Wizard is enabled, click the Start button ,
type “folder” in the Search box, and then click Folder Options. Click the View
tab. In the Advanced settings box, scroll down the list and make sure the Use
Sharing Wizard (Recommended) check box is selected.

TVL 12-Computer Systems Servicing 24 DepED-Division of Lapu-Lapu City


The process for setting up shared resources is the same as long as the
Sharing Wizard is enabled.

With the Sharing Wizard at the ready, follow these steps to share files or
folders:

1. In Windows Explorer, select the folders or files you want to share. (You
can select multiple objects.)

2. In the Command bar, click Share. (Alternatively, right-click, and then


click Share.)

3. With the Sharing Wizard, it’s quick and easy to share files or folders with
other people

4. In the file sharing box, enter the name of the user with whom you want to
share files or folders, and then click Add. You can type a name in the box or
click the arrow to display a list of available names. Repeat for each person
you want to add. The list includes all of the users who have an account on
your computer, plus everyone. If you want to grant access to someone who
doesn’t appear in the list, you need to create a user account for that person
(for information on how to do this, see Create a user account).

Note: If you select everyone, and you have password-protected sharing


enabled, the user must still have a valid account on your computer.
However, if you have turned off password-protected sharing, network users
can gain access only if you grant permission to everyone or to Guest.

For each user, select a permission level. Your choices are:

• Reader Users with this permission level can view shared files and
run shared programs but cannot change or delete files. Selecting
Reader in the Sharing Wizard is equivalent to setting NTFS
permissions to Read & Execute.

TVL 12-Computer Systems Servicing 25 DepED-Division of Lapu-Lapu City


• Contributor This permission level, which is available only for shared
folders (not shared files), allows the user to view all files, add files,
and change or delete files that the user adds. Selecting Contributor
sets NTFS permissions to Modify.
• Co-owner Users who are assigned the Co-owner permission have the
same privileges that you do as the Owner: They can view, change,
add, and delete files in a shared folder. Selecting Co-owner sets NTFS
permissions to Full Control for this user.

Note: You might see other permission levels if you return to the Sharing
Wizard after you set up sharing. The Custom permission level identifies
NTFS permissions other than Read & Execute, Modify, and Full Control.
The Mixed permission level appears if you select multiple items, and
those items have different sharing settings. Owner, of course, identifies
the owner of the item.

5. Click Share. After a few moments, the wizard displays a page similar to the page
shown in the following illustration.

The Sharing Wizard displays the network path for each item you’ve shared.

6. In the final step of the wizard, you can do any of the following:

• Send an e-mail message to the people with whom you’re sharing. The
message includes a link to the shared file or folder

TVL 12-Computer Systems Servicing 26 DepED-Division of Lapu-Lapu City


With the Sharing Wizard, you can send a message that includes a link
to the item you want to share.
• Copy the network path to the Clipboard. This is handy if you want to
send a link via instant messenger or another application.
• Double-click a share name to open the shared item.
• Open a search folder that shows all of the folders or files you’re sharing.

7. When you’re finished with these tasks, click done.

Creating a share requires privilege elevation. But, after a folder has been
shared, the shared folder is available to network users no matter who is logged
on to your computer—or even when nobody is logged on.

Using advanced sharing to create shorter network paths

Confusingly, when you share one of your profile folders (or any other
subfolder of %SystemDrive%\Users), Windows Vista creates a network share
for the Users folder—not for the folder you shared. This isn’t a security
problem; NTFS permissions prevent network users from seeing any folders or
files except the ones you explicitly share. But it does lead to some long UNC
paths to network shares. For example, if you share the My Received Files
subfolder of Documents (as shown after step 5 in the previous section), the
network path is \\CARLPC\Users\Carl\Documents\My Received Files. If
this same folder had been anywhere on your computer outside of the Users
folder, no matter how deeply nested, the network path would instead be
\\CARL-PC\My Received Files. Other people to whom you’ve granted access
wouldn’t need to click through a series of folders to find the files in the
intended target folder. Network users, of course, can map a network drive or
save a shortcut to your target folder to avoid this problem. But you can work
around it from the sharing side, too: Use advanced sharing to share the folder
directly. (Do this after you’ve used the Sharing Wizard to set up permissions.)

Note: Make sure the share name you create doesn’t have spaces. Eliminating
spaces makes it easier to type a share path that works as a link.

TVL 12-Computer Systems Servicing 27 DepED-Division of Lapu-Lapu City


Stopping or changing sharing of a file or folder

If you want to stop sharing a particular shared file or folder, select it in


Windows Explorer, and then click Share. The Sharing Wizard appears, as
shown in the following illustration.

Use the Sharing Wizard to change sharing permissions or to stop


sharing a file or folder.

If you click Change sharing permissions, the wizard continues as when


you created the share, except that all existing permissions are shown. You
can add or remove names and change permissions.

The Stop sharing option removes access control entries that are not
inherited. In addition, the network share is removed; the folder will no longer
be visible in another user’s Network folder

Setting advanced sharing properties

If you disable the Sharing Wizard, Windows Vista reverts to a process


similar to that employed by earlier versions of Windows (except the aberration
in Windows XP called Simple File Sharing—nothing before or after is similar
to that). Without the Sharing Wizard, you configure network shares
independently of NTFS permissions. (For more information about this
distinction, see How share permissions and NTFS permissions work together
at the end of this section.) With the Sharing Wizard disabled, when you select
a folder, and then click Share, rather than the wizard appearing, Windows
opens the folder’s properties dialog box and displays the Sharing tab, as
shown in the next illustration. Even with the Sharing Wizard enabled, you
can get to the same place; right-click the folder, and then choose Properties.

Note: The Sharing tab is part of the properties dialog box for a folder, but
not for files. Also, when the Sharing Wizard is disabled, the Share button

TVL 12-Computer Systems Servicing 28 DepED-Division of Lapu-Lapu City


appears on the Command bar only when you select a single folder. Only the
Sharing Wizard is capable of making share settings for files and for multiple
objects simultaneously.

The Share button summons the Sharing Wizard, but it’s available only
when the Sharing Wizard is enabled.

To create or modify a network share using advanced settings, follow


these steps:

1. On the Sharing tab, click Advanced Sharing.


2. Select the Share this Folder check box.

TVL 12-Computer Systems Servicing 29 DepED-Division of Lapu-Lapu City


Use advanced settings to create or modify a network share.

3. Accept or change the proposed share name

Note:

If the folder is already shared, and you want to add another share
name (perhaps with different permissions), click Add, and then type the
name for the new share. The share name is the name that other users will
see in their own Network folders. Windows initially proposes to use the
folder’s name as its share name. That’s usually a good choice, but you’re not
obligated to accept it. If you already have a shared folder with that name,
you’ll need to pick a different name.

4. Type a description of the folder’s contents in the Comments box.


Other users will see this description when they inspect the folder’s
properties dialog box in their Network folder (or when they use the
Details view).
5. To limit the number of users who can connect to the shared folder
concurrently, specify a number in the Limit the number of
simultaneous users to box. Windows Vista permits up to 10
concurrent users. (If you need to share a folder with more than 10
users at once, you must use a server version of Windows.)
6. Click Permissions.

The default share permission associated with a new share is Read


access to everyone.

TVL 12-Computer Systems Servicing 30 DepED-Division of Lapu-Lapu City


Caution:

When you share a folder, you also make that folder’s subfolders
available on the network. If the access permissions you set for the folder aren’t
appropriate for any of its subfolders, either reconsider your choice of access
permissions or restructure your folders to avoid the problem

7. In the Group or user names box, select the name of the user or
group you
want to manage. The share permissions for the selected user or
group appear in the permissions box.

8.
• Full Control Allows users to create, read, write, rename,
and delete files in the folder and its subfolders. In addition,
users can change permissions and take ownership of files
on NTFS volumes.
• Change Allows users to read, write, rename, and delete files
in the folder and its subfolders, but not create new files.
• Read Allows users to read files but not write to them or
delete them. If you select neither. allow nor Deny, it is still
possible that the user or group can inherit the permission
through membership in another group that has the
permission. If the user or group doesn’t belong to another
such group, the user or group is implicitly denied
permission.
Note:

To remove a name from the Group or user names box, select the name, and
then click Remove. To add a name to the list, click Add. Enter the names of
the users and groups you want to add.

9. Click OK in each dialog box.

How share permissions and NTFS permissions work together

The implementation of share permissions and NTFS permissions is


confusingly similar, but it’s important to recognize that these are two separate
levels of access control. Only connections that successfully pass through both
gates are granted access.

Share permissions control network access to a particular resource.


Share permissions do not affect users who log on locally. You set share
permissions in the Advanced Sharing dialog box, which you access from the
Sharing tab of a folder’s properties dialog box.

NTFS permissions apply to folders and files on an NTFS-formatted


drive. They provide extremely granular control over an object. For each user
to whom you want to grant access, you can specify exactly what they’re
allowed to do: run programs, view folder contents, create new files, change

TVL 12-Computer Systems Servicing 31 DepED-Division of Lapu-Lapu City


existing files, and so on. You set NTFS permissions on the Security tab of the
properties dialog box for a folder or file.

It’s important to recognize that the two types of permissions are


combined in the most restrictive way. If, for example, a user is granted Read
permission on the network share, it doesn’t matter whether or not the account
has Full Control NTFS permissions on the same folder; the user gets only
Read access when connecting over the network.

In effect, the two sets of permissions act in tandem as gatekeepers that


winnow out incoming network connections. An account that attempts to
connect over the network is examined first by the share permissions
gatekeeper. The account is either bounced out on its caboodle or allowed to
enter with certain permissions. It’s then confronted by the NTFS permissions
gatekeeper, which might strip away (but not add to) some or all of the
permissions granted at the first doorway.

In determining the effective permission for a particular account, you


must also consider the effect of group membership. Permissions are
cumulative; an account that is a member of one or more groups is granted all
of the permissions that are granted explicitly to the account as well as all of
the permissions that are granted to each group of which it’s a member. The
only exception to this rule is Deny permissions, which take precedence over
any conflicting Allow permissions.

Common Network Issues


Networks are networks. Despite best efforts to keep things smooth all
the time every day, things happen. Here’s a look at some common network
issues, some tips for quickly resolving them, and even better, how to prevent
them from occurring again.

1. Duplicate IP Addresses

When two devices attempt to share a single IP, you see the dreaded
“Address Already in Use” error — with no ability to access the network.

The Quick Fix: The blame for this often rests with your router’s default
DHCP configuration. DHCP is probably trying to assign your new device an
address at the beginning of your subnet, and another device may already
occupy these low-numbered addresses with static IPs. If you’ve just
introduced a new device or server to your network, it may have its own DHCP
server. Simply disable the DHCP server on that device to restore sanity to your
network.

The Preventive Measure: You can take one simple step to avoid IP
conflicts by modifying your router’s configuration to begin assigning DHCP

TVL 12-Computer Systems Servicing 32 DepED-Division of Lapu-Lapu City


addresses near the top end of your subnet, leaving the lower addresses
available for devices that require static IPs.

2. IP Address Exhaustion

To troubleshoot this issue, use the ipconfig command. If the


workstation has assigned itself an IP address that begins with 169.x.x.x, it
means that no IP address was available from the DHCP server.

The Quick Fix: Some users on cable internet might not have a local
router, in which case IP addresses are assigned on a limited basis directly
from your ISP. You have probably run out of allowed IP addresses from your
ISP. The solution to this is to purchase either a standalone router or WiFi
access point with an integrated router. This creates your own local pool of
internal addresses, ensuring you won’t run out.

If you already have a local router with DHCP, the default address pool
might be too small for your network. By accessing the DHCP settings on the
router, you can adjust the size of the address pool to meet your network’s
needs.

The Preventive Measure: It’s important that any internet-connected


network have a local router in operation with NAT and DHCP, both for security
reasons and to prevent IP address exhaustion. The router needs to be the only
device connected to the modem, with all other devices connecting through the
router.

3. DNS Problems

Errors such as The Network Path Cannot Be Found, IP Address Could


Not Be Found, or DNS Name Does Not Exist, can usually be traced to a DNS
configuration issue. The command line utility nslookup can be used to quickly
show a workstation’s DNS settings.

The Quick Fix: Workstations and other network devices can be


configured to use their own DNS servers, ignoring the server assigned by
DHCP. Checking the ‘Internet Protocol Version 4 (TCP/IP)’ settings for your
adapter will show if an incorrect DNS server is specified, so just select “Obtain
DNS server address automatically” instead.

The Prevention Measure: Your local router might be configured to


operate as a DNS Server, creating a DNS pass-through to your ISPs servers.
On busy networks, this may overload the capabilities of the router. Change
your network’s DHCP settings to directly access your DNS servers.

4. Single Workstation Unable to Connect to the Network

If only a single workstation is displaying the “No internet” message


when opening a web browser, we can usually assume that the rest of the
network is healthy and turn our attention to any hardware and software that
is particular to this system.

TVL 12-Computer Systems Servicing 33 DepED-Division of Lapu-Lapu City


The Quick Fix: To resolve this network issue, start by eliminating the
obvious communication barriers such as a bad cable, poor WiFi signal, failing
network card or incorrect drivers. Ensure that the workstation’s network
adapter is configured with the correct IP, subnet, and DNS servers.

If that doesn’t solve the problem, check any firewall software on the
device to ensure that necessary ports are open to the external network.
Common ports include 80 and 443 for web traffic, plus 25, 587, 465, 110,
and 995 for email.

The Preventive Measure: It’s usually best to leave all workstation TCP/IP
settings to “Automatically assigned.” Use a DHCP server to hand out a
uniform configuration to all devices on the network. If a static IP is needed on
a particular workstation or server, most DHCP servers allow the ability to
create static IP mappings.

5. Unable to Connect to Local File or Printer Shares

Sharing problems are among the most difficult network problems to


solve, due to the number of components that need to be configured properly.

Most commonly, sharing problems arise due to conflicts between mixed


security environments. Even different versions of the same operating system
sometimes use slightly different security models, which can make
interconnection of workstations difficult.

The Quick Fix: We can cure sharing problems most efficiently by drilling down
through the possibilities in this order:

1. Ensure that the required services are running. On Windows systems,


the server, TCP/IP NetBIOS Helper, workstation, and computer browser
services all need to be running. On Linux machines, Samba is the
primary component required to share with Windows systems.

2. Check your firewall(s). It’s very common for a workstation’s firewall to


be configured to block file and printer sharing traffic, especially if a new
antivirus package is installed that introduces its own firewall. Firewall
issues can also exist at the hardware level, so ensure that routers or
managed switches are passing share traffic within the subnet. Speaking
of subnet….

3. Ensure all workstations are on the same subnet. This problem typically
only appears on complex networks, however, even simple networks
sometimes have static-IP equipment with an improperly configured
subnet. The result is that external traffic will move about just fine, while
internal traffic will hit unexpected roadblocks.

4. All Windows network adapters will need File and Printer Sharing for
Microsoft Networks, Client for Microsoft Networks, and NetBIOS over
TCP/IP enabled.

TVL 12-Computer Systems Servicing 34 DepED-Division of Lapu-Lapu City


5. Once the above checks have passed, it’s finally time to check the most
likely culprit, permissions. There are multiple layers of access required,
each with their own interface within the OS. Check for:

• Systems configured with the wrong workgroup or domain.


• Incorrectly configured HomeGroup.
• Network type set to Public.
• Incorrect NTFS permissions.

6. Local Network is Unable to Connect to the internet

This situation can either be intermittent or persistent. Often times, the


most difficult aspect of dealing with any external network problem is finding
the company responsible. And then tasking them to solve the issue,
particularly with intermittent failures that are difficult to trace. It can
sometimes be such a problem that organizations will have to switch internet
providers in order to solve the issue.

The Quick Fix: A router and modem reboot is the first order of business.
The tracert then utility can be used to identify communication breaks. It will
clearly hiccup on the particular router hop that is causing the problem.
Contact your ISP with your findings, providing screenshots as necessary.

The Preventive Measure: To avoid the finger-pointing that can prevent


rapid resolution of external issues, do some research to ensure that you
procure connectivity only from local Tier 1 providers. Other ISPs are more
than happy to sell you service, however, they are simply piggybacking the Tier
1 connection, since they don’t actually own the infrastructure in your area.

The goal is to remove as many middle-men as possible, so that when


(not if) you experience a problem, one phone call is all that is required to
identify the issue and get technicians to work on it.

7. Slow Internet Performance

Slow performance is typically due to congestion, or sometimes poor


quality connections that have corroded or otherwise deteriorated. Congestion
may not be directly related to bandwidth exhaustion, as a single overloaded
port on a switch or router can diminish network performance.

This can be especially true on leased lines where dedicated bandwidth


is to be expected, but speed tests indicate the network is not reaching it’s
rated potential.

The Quick Fix: Use speed test websites, conducting tests from
geographically remote servers. This can pinpoint areas of congestion on the
ISP’s network. In the case of cable internet, the local network is shared
amongst your neighbors, committing your ISP to a costly bandwidth upgrade
when saturation occurs. Report your findings to your ISP so that they can
take steps to resolve the issue.

TVL 12-Computer Systems Servicing 35 DepED-Division of Lapu-Lapu City


DNS servers are an often overlooked aspect of internet performance.
Using incorrect DNS servers can result in routing congestion or load balancing
problems. While you should typically use your ISP’s DNS settings whenever
possible, they may actually be routing traffic through overloaded web caches.
You can temporarily adjust your DNS settings to use OpenDNS instead.

The Preventive Measure: if internet performance is critical, you’ll need


to procure adequate connectivity. While cable internet may be inexpensive,
you could be setting yourself up for frequent jeers from employees. A local
DSL operator may offer improved reliability for a slightly higher cost, but for
the most consistent performance, you may find that an expensive leased line
is a requirement for your organization. There’s plenty of help out there — use
it!

What I Have Learned


This includes questions or blank sentence/paragraph to be filled in to
process what you learned from the lesson.

Answer the following:

1. What is network configuration?

2. Give simple tests you can conduct to make sure your network is
functional.

3. Enumerate the steps on how to change the name of windows


computer.

Assessment
This is a task which aims to evaluate your level of mastery in
achieving the learning competency.

Self-Check 3.1
A. TRUE OR FALSE
Direction: Write True if the statement is correct and False if it is wrong.

1. Ipconfig utility allows you to get the IP address information of a


Windows computer. It also allows some control over
active TCP/IP connections.

TVL 12-Computer Systems Servicing 36 DepED-Division of Lapu-Lapu City


2. Ping is a network administration utility or tool used to test connectivity
on an Internet Protocol (IP) network.

3. Unknown host message indicates that no reply messages were received


within the default time of 1 second.

4. Destination host unreachable message indicates one of two problems:


either the local system has no route to the desired destination, or a
remote router reports that it has no route to the destination.

5. Request timed out message indicates that the requested host name
cannot be resolved to its IP address.

6. NDF simplifies and automates many of the common troubleshooting


steps and solution implementations for networking troubles.

7. Commands in the netsh trace context allow you to selectively enable


tracing for providers and scenarios.

8. A sharing scenario is a predefined collection of providers for a specific


function, such as file sharing or wireless LAN access.

9. To show the list of trace providers within a scenario, type netsh trace
show scenario Name.

10. When a user experiences a networking problem, NTFS provides the


ability to diagnose and repair it by presenting the person with
diagnostic assessments and resolution steps.

B. Multiple Choice
Direction: Read the statements carefully. Encircle the letter of the correct
answer.

1. What permission level can view shared files and run shared programs,
but cannot change or delete files?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users

2. What permission level that is available only for shared folders (not shared
files), allows the user to view all files, add files, and change or delete files that
the user adds?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users

3. Which permission level that has the same privileges that you do as the
Owner: They can view, change, add, and delete files in a shared folder?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users

TVL 12-Computer Systems Servicing 37 DepED-Division of Lapu-Lapu City


4. What option removes access control entries that are not inherited, removes
network share, and folder will no longer be visible in another user’s Network
folder?
A. Advanced Sharing C. Default Sharing
B. Change Sharing permission D. Stop sharing

5. Which access permission allows users to create, read, write, rename, and
delete files in the folder and its subfolders?
A. Change C. Read
B. Full Control D. Write

6. Which access permission allows users to read, write, rename, and delete
files in the folder and its subfolders, but not create new files.
A. Change C. Read
B. Full Control D. Write

7. It allows users to read files but not write to them or delete them.
A. Change C. Read
B. Full Control D. Write

8. What are you going to use in for you to change sharing permissions or to
stop sharing a file or folder?
A. Customize wizard C. Security wizard
B. General wizard D. Sharing wizard

9. It’s a permission that prevent network users from seeing any folders or
files except the ones you explicitly share.
A. CMD C. FAT
B. DOC D. NTFS

10. Which of the following is NOT the steps on how to create or modify a
network share using advanced settings?
A. Click on the “Change” button to rename the computer
B. Select the Share this Folder check box.
C. Accept or change the proposed share name
D. On the Sharing tab, click Advanced Sharing

TVL 12-Computer Systems Servicing 38 DepED-Division of Lapu-Lapu City


C. Matching Type
Direction: Match Column A which states on how to quick fix to a certain
network issues as listed in Column B.

Column A Column B

__________1. Disable the DHCP server on that A. Slow Internet Performance


device to restore sanity to your network.
B. IP Address Exhaustion
__________2. Ensure all workstations are on
the same subnet. C. Single Workstation Unable
to Connect to the Network
__________3. The solution to this is to
purchase either a standalone router or WiFi D. Unable to Connect to Local
access point with an integrated router. File or Printer Shares

__________4. Use speed test websites, E. Local Network is Unable to


conducting Tests from geographically remote Connect to the internet
servers.
F. Duplicate IP Addresses
__________5. Workstations and other network
devices can be configured to use their own G. DNS Problems
DNS servers, ignoring the server assigned by
DHCP.

__________6. The tracert then utility can be


used to identify communication breaks.

__________7. To resolve this network issue,


start by eliminating the obvious
communication barriers such as a bad
cable, poor signal, failing network card or
incorrect drivers.

__________8. Ensure that the required services


are running.

__________9. Ensure that the workstation’s


network adapter is configured with the correct
IP, subnet, and DNS servers.

__________10. You can temporarily adjust your


DNS settings to use OpenDNS instead.

TVL 12-Computer Systems Servicing 39 DepED-Division of Lapu-Lapu City


Additional Activities
In this portion, another activity will be given to you to enrich your
knowledge or skill of the lesson learned. This also tends retention of
learned concepts.

I. Arrange the image according to its correct order on how to troubleshoot a


network from a control panel. Put number on the space provided.

A._______________ B._______________

C._______________ D._______________

E._______________

DepED-Division of Lapu-Lapu City 40 TLE/TVE/TVL


II. Arrange the image according to its correct order on how to configure a
static IP Address in Windows 7. Put number on the space provided .

A.__________________ B.__________________

C.__________________ D.__________________

E.__________________ F.__________________

G.__________________

TVL 12-Computer Systems Servicing 41 DepED-Division of Lapu-Lapu City


DepED-Division of Lapu-Lapu City 42 TVL 12-Computer Systems Servicing
What I have Learned? Pre-Test 3.0
1. Network configuration is the process
of setting a network's controls, flow and True or False
operation to support the network
communication of an organization 1. True
and/or network owner. 2. False
3. False
2. 4. True
1. Check the physical connections. 5. False
2. Verify that you can log on.
3. Check the network configuration. Multiple Choice
4. Verify that the computers can ping
each other. 1. C
2. A
3. 3. B
1. Right-click on the computer option on 4. D
the start menu or in My Computer. 5. B
2. Click Advanced System Settings. 6. A
3. In the System Properties window 7. D
choose Computer Name tab. 8. C
4. Click on Change button. 9. B
5. In the computer name/domain 10.C
changes window, you can now change
your computer name.
Answer Key
DepED-Division of Lapu-Lapu City 43 TVL 12-Computer Systems Servicing
Self Check 3.1
A. True or False
1. True
2. True
3. False
4. True
5. False
6.True
7. True
8. False
9. True
10. False
B. Multiple Choice
1. C
2. A
Additional Activities 3. B
4. D
I. 5. B
A. 2 6. A
B. 4 7. C
C. 5 8. D
D. 1 9. D
E. 3 10.A
C. Matching Type
II.
A. 7 1. F
B. 2 2. D
C. 1 3. B
D. 3 4. A
E. 6 5. G
F. 4 6. E
G. 5 7. C
8. D
9. C
10.A
References

Module
Module for SET-UP COMPUTER NETWORKS
https://www.slideshare.net/mobile/RoseMaryGaniban/2-
setupcomputernetworks?qid=db730e32-6c89-4f67-be3f-
dba3adffdcc6&v=&b=&from_search=5

Internet
https://www.lifewire.com/ip-config-818377
https://kb.netgear.com/989/Testing-network-connectivity-with-ping
https://www.dummies.com/programming/networking/testing-your-computer-
network/
https://www.cisco.com/c/en_ph/solutions/small-business/resource-
center/networking/networking-basics.html
https://www.cbtnuggets.com/blog/technology/networking/7-common-network-
issues-and-how-to-resolve-them-fast
https://www.techopedia.com/definition/25766/network-
configuration#:~:text=Network%20configuration%20is%20the%20process,other%20
supporting%20devices%20and%20components.
http://tutorial.wmlcloud.com/windows_7/sharing-resources-with-older-windows-
versions-(part-2)---sharing-files-with-public-folders---sharing-files-and-folders-from-
any-folder.aspx
http://tutorial.wmlcloud.com/windows_7/Sharing-Resources-with-Older-Windows-
Versions-(part-3)---Setting-Advanced-Sharing-Properties.aspx
http://www.littlepenang.com.my/
https://beckybeach.net/business/change-your-computer-name-in-windows-7-or-
vista-by-computer-aid/
https://brickmaxx.web.fc2.com/web-acappella-serial-number-mac.html
https://flexdms.zendesk.com/hc/en-us/articles/115009101167-Allowing-Access-to-
the-Accounting-Passwords-Menu-for-Non-Accounting-Users
https://h30434.www3.hp.com/t5/Desktop-Wireless-and-Networking/Network-
adapter-won-t-work/td-p/6752655
https://haftomdesbele.wordpress.com/2015/08/
https://haftomdesbele.wordpress.com/2015/08/26/course-that-should-read-by-
student-of-computer-science/
https://ntrkb.wordpress.com/2014/05/07/using-netsh-trace/
https://ntrkb.wordpress.com/category/tools/
https://quizlet.com/199405024/70-680-windows-7-config-flash-cards/

DepED-Division of Lapu-Lapu City 44 TLE/TVE/TVL


https://serverfault.com/questions/723178/how-to-prevent-users-from-scanning-
the-network
https://stackoverflow.com/questions/16832832/get-a-list-of-all-the-files-in-a-folder-
and-its-subfolders-with-extension
https://support.hp.com/wps/portal/pps/Home/ConcentraWrapper/!ut/p/z1/04_Sj
9CPykssy0xPLMnMz0vMAfIjo8zifQ08DYy83A283YODjQ0cnUMsfAPcjQwM3A31w8EK
nN0dPUzMfYAigSZOBp7mvv7erkEWxgaeZvpRxOg3wAEcDYjTj0dBFH7jw_WjwErw-
YCQGQW5oaERBpmOACHlE_o!/dz/d5/L2dBISEvZ0FBIS9nQSEh/
https://techavengers.blogspot.com/
https://www.depedcarifugao.com/ENG4_Q1_MOD7_ENRICHING%20YOUR%20VOCA
BULARY_FINAL08032020.pdf
https://www.depedcarifugao.com/english8_q1_mod1_NotingContextClues_FINAL072
82020.pdf
https://www.depedcarifugao.com/english8_q1_mod4_TransitionSignals_FINAL07282
020.pdf
https://www.depedcarifugao.com/english8_q1_mod5_ExpressingEmotionalResponse
s_FINAL07282020.pdf
https://www.depedcarifugao.com/math3_q1_mod1_Visualizing-Numbers-up-to-10-
000_v308092020.pdf
https://www.dummies.com/computers/operating-systems/windows-7/how-to-
customize-the-notification-area-of-the-windows-7-taskbar/
https://www.facebook.com/ssisbcd/videos/326352091747272/
https://www.hindawi.com/journals/scn/2020/2408792/
https://www.howtogeek.com/school/windows-network-sharing/lesson7/
https://www.online-tech-tips.com/windows-7/network-and-sharing-center-
overview/
https://www.pluralsight.com/blog/it-ops/windows-7-advanced-network-
configuration
https://www.pluralsight.com/blog/it-ops/windows-7-ip-addressing
https://www.slideshare.net/dionesioable/biology-m1-nature-of-biology-25631578
https://www.slideshare.net/RoseMaryGaniban/2-setupcomputernetworks
https://www.slideshare.net/RoseMaryGaniban/2-
setupcomputernetworks?qid=db730e32-6c89-4f67-be3f-
dba3adffdcc6&v=&b=&from_search=5
https://www.slideshare.net/RoseMaryGaniban/2-
setupcomputernetworks?qid=db730e32-6c89-4f67-be3f-
dba3adffdcc6&v=&b=&from_search=5Internet
https://zoneshigh-power.weebly.com/network-diagnostic-tool-windows.html

TVL 12-Computer Systems Servicing 45 DepED-Division of Lapu-Lapu City

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy