SlideShare a Scribd company logo
1 of 34
Networking Hardware
Requirements
The topics on this module will focus on
Networking Hardware Requirements. In this
module you will be able to:
• a. differentiate the various networking hardware
requirements according to minimum and
recommended standards,
• b. perform a critical review on market study on
network hardware equipment
• c. make a diagram on a computer shop network layout
Please be guided accordingly and ask for the guidance
of your teacher. Enjoy learning!
To connect to your network from afar
Activity 1. ENUMERATION
• Directions: Enumerate the different hardware
requirements for networking based on the previous
modules that you read.
• 1. ____________________ 3.____________________
• 2. ____________________ 4. ____________________
DSL vs. Wi-Fi
•DSL or Cable modem- a service that
provides actual connection to the internet
•Wi-Fi –requires accompaniment by either
DSL or other internet service to provide
internet access.
Wired or Wireless Adapters
•Is the device that connects your computer
to your network
Ethernet Cabling
•Used to connect your wired network
adapters to a network switch or router .
Router Basics
•Your router is the glue that holds your home
network together. It connects all your
computers to one another, either through
Ethernet cables or a wireless connection. A
router is different than a modem: your modem
connects you to the internet, while your router
connects your computers to one another
clients
•Devices that connect to your router—
that is, the computers, tablets,
smartphones, DVRs, game systems, and
so on—are called
Wired Throughput
•The wired half of your router will come in
one of two speeds: 10/100 Mbps and
10/100/1000 Mbps (also known as
"gigabit"). 10/100 routers are cheaper, but
will not transfer data between computers as
quickly as gigabit routers will.
Range
•Wireless routers can only reach a limited
area of distance. If you have a big house and
have the router on one side, you might not
be able to access the network from the
other side of the house. Your range, like
your speed, is determined by the wireless
standard you use.
Number of Ports
• Routers have two types of ports in the back: LAN ports
and WAN ports. Your WAN port hooks up to your
modem (which, again, is what connects to the
internet), while the LAN ports hook up to your
computers and other clients. Most routers have one
WAN port, but you will need as many LAN ports as the
wired devices you have.
Wireless Security
•Unless you do not mind strangers eating your
bandwidth and potentially accessing your
networked files, you should always protect your
wireless network with a password. WPA2 is
currently the most secure type of wireless
encryption, so make sure you use WPA2 if you
can.
• Assessment 1. A 2. A 3. A 4. B 5. B 6. B 7. B 8. A 9. A 10. B
Maintenance of Computer System
•Objectives:
A. identify the different software that can be used in
performing this basic routine maintenance of
computer systems;
B. determine the correct processes of performing the
basic routine maintenance on computer systems;
C. discuss the reasons or purpose of performing the
basic routine maintenance on computer systems.
Pretest. WHAT DO YOU MEAN? Direction: Given
the following keywords in this module, write down
a one – sentence definition/description about it.
• 1. Data Back up Definition:
________________________________________________________
________________________________________________________
2. Malware Maintenance Definition:
________________________________________________________
________________________________________________________
3. File System Maintenance Definition:
________________________________________________________
________________________________________________________
Activity 1. FAMILIARITY TEST Directions: Do you
know what these software do? Can you identify
their function by choosing from the box on the
right.
FUNCTIONS
A. Archiver Utilities B. Anti-Virus and Anti malware C. Disk Maintenance
SOFTWARE
• 1. WinZip
• 2. Avast
• 3. Disk Clean Up
• 4. WinRAR
• 5. McAfee Live Safe
• 6. Disk Defragment
• 1. WinZip Utilities Anti Virus and - 2. Avast Anti malware Disk - Clean
Up 3. Disk Maintenance Archiver - 4. WinRAR Utilities Anti - 5.
McAfee Live Safe Virus and Anti malware Di
The basic routine maintenance comprises of
the 3 basic processes:
•1. Data Backup
•2. Malware Maintenance
•3. Disk or File System Maintenance
DATA BACKUP
•Backing up basically means creating
a redundant copy of a data so that
in case anything happens to the
original data, you have a spare copy.
MALWARE MAINTENANCE
refers to the process of maintaining computer by
scanning malwares --any kind of malicious codes,
objects or content that infiltrates your computer,
resulting in damage and causing your system to
act in an undesirable manner. Commonly, these
include viruses, spyware, worms, trojan horses,
spams and many more.
DISK MAINTENANCE
•The process of uninstalling any
unnecessary software and
defragmenting your disk due to decline
of performance when the amount of
data in your hard disk starts to grow.
• DOWN 1. basically means creating a redundant copy of a data
• 3. protect your file with encryption and a software password to
prevent any unauthorized access.
• 5. Your system performance will ______ when the amount of data in
your hard disk starts to grow.
• 7. refers to any kind of malicious codes, objects or content that
infiltrates your computer, resulting in damage and causing your
system to act in an undesirable manner.
• 9. The computers basic routine _______ are Data Backup, Malware
Maintenance, Disk or File System Maintenance
• ACROSS
• 2. _____ a document file from your desktop into a thumb drive to provide
spare
• 4. Loss of privacy, confidential data and access to your system when
software and hardware are damaged.
• 6. preventive measures you can take to protect the computer system from
malware.
• 8. _____ utilities such as WinZip which enables you to compact your files
into a single compressed file
• 10. Applying the basic maintenance routine in your system will extend its
______
• Activity 3. SUMMARIZE your LEARNING GAPS! Direction: Fill in with the important terms
that you had encountered on this module. 1. The basic routine maintenance comprises
of the 3 basic processes are __________________, _______________________,
_____________________. 2. _______________ means creating a redundant copy of a
data so that in case anything happens to the original data, you have a extra copy. 3.
Depending on your needs, you may choose to back up your _________, or your
___________, or even your ________________. 4. But when these files gradually
occupies a lot of disk space, you may need to seek help from _______________ such as
WinZip. 5. WinZip also allows you to protect your file with _____________ and a
software _____________ to prevent any unauthorized access. 6. Viruses, spyware,
worms, trojan horses, spams are examples of ______________. 7. A safe file can be
identified by scanning the file for any virus infection before you attempt to open it but if
it may be a new virus yet to be updated in your virus scan, it’s better to
________________. 8. The cause of the decline in performance of your computers is
________________. 9. _________________ is used to free space in Drive C: . 10. When
your system performance will decline when the amount of data in your hard disk starts
to grow, you need to ______________
Networking Hardware Requirements.pptx

More Related Content

Similar to Networking Hardware Requirements.pptx

The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptxJayLloyd8
 
Silicon Valley Code Camp 2015 - Advanced MongoDB - The Sequel
Silicon Valley Code Camp 2015 - Advanced MongoDB - The SequelSilicon Valley Code Camp 2015 - Advanced MongoDB - The Sequel
Silicon Valley Code Camp 2015 - Advanced MongoDB - The SequelDaniel Coupal
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptxaytenewbelay1
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptxMohamedSafeer14
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Security Weekly
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2ifrieshe
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgEric Vanderburg
 
B olivares ppt mgmt 306
B olivares ppt mgmt 306B olivares ppt mgmt 306
B olivares ppt mgmt 306olivarb10
 
Modern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and OptionsModern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and Optionslisaabe
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and designYeonki Choi
 
Linux.pptx
Linux.pptxLinux.pptx
Linux.pptxNitz18
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)ella dimaiwat
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Dinesh Kumar
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedNagamalleswararao Tadikonda
 
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...Eric Vanderburg
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptxMattMarino13
 

Similar to Networking Hardware Requirements.pptx (20)

The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
 
Silicon Valley Code Camp 2015 - Advanced MongoDB - The Sequel
Silicon Valley Code Camp 2015 - Advanced MongoDB - The SequelSilicon Valley Code Camp 2015 - Advanced MongoDB - The Sequel
Silicon Valley Code Camp 2015 - Advanced MongoDB - The Sequel
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Network Troubleshooting.pptx
Network Troubleshooting.pptxNetwork Troubleshooting.pptx
Network Troubleshooting.pptx
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
B olivares ppt mgmt 306
B olivares ppt mgmt 306B olivares ppt mgmt 306
B olivares ppt mgmt 306
 
Modern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and OptionsModern Software Licensing: New Trends and Options
Modern Software Licensing: New Trends and Options
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
Linux.pptx
Linux.pptxLinux.pptx
Linux.pptx
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
Computer Architecture - Software - Lesson 10 - Hard Drive Management / Logica...
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptx
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Networking Hardware Requirements.pptx

  • 2. The topics on this module will focus on Networking Hardware Requirements. In this module you will be able to: • a. differentiate the various networking hardware requirements according to minimum and recommended standards, • b. perform a critical review on market study on network hardware equipment • c. make a diagram on a computer shop network layout Please be guided accordingly and ask for the guidance of your teacher. Enjoy learning!
  • 3.
  • 4. To connect to your network from afar
  • 5. Activity 1. ENUMERATION • Directions: Enumerate the different hardware requirements for networking based on the previous modules that you read. • 1. ____________________ 3.____________________ • 2. ____________________ 4. ____________________
  • 6.
  • 7. DSL vs. Wi-Fi •DSL or Cable modem- a service that provides actual connection to the internet •Wi-Fi –requires accompaniment by either DSL or other internet service to provide internet access.
  • 8. Wired or Wireless Adapters •Is the device that connects your computer to your network
  • 9. Ethernet Cabling •Used to connect your wired network adapters to a network switch or router .
  • 10. Router Basics •Your router is the glue that holds your home network together. It connects all your computers to one another, either through Ethernet cables or a wireless connection. A router is different than a modem: your modem connects you to the internet, while your router connects your computers to one another
  • 11. clients •Devices that connect to your router— that is, the computers, tablets, smartphones, DVRs, game systems, and so on—are called
  • 12.
  • 13. Wired Throughput •The wired half of your router will come in one of two speeds: 10/100 Mbps and 10/100/1000 Mbps (also known as "gigabit"). 10/100 routers are cheaper, but will not transfer data between computers as quickly as gigabit routers will.
  • 14. Range •Wireless routers can only reach a limited area of distance. If you have a big house and have the router on one side, you might not be able to access the network from the other side of the house. Your range, like your speed, is determined by the wireless standard you use.
  • 15. Number of Ports • Routers have two types of ports in the back: LAN ports and WAN ports. Your WAN port hooks up to your modem (which, again, is what connects to the internet), while the LAN ports hook up to your computers and other clients. Most routers have one WAN port, but you will need as many LAN ports as the wired devices you have.
  • 16. Wireless Security •Unless you do not mind strangers eating your bandwidth and potentially accessing your networked files, you should always protect your wireless network with a password. WPA2 is currently the most secure type of wireless encryption, so make sure you use WPA2 if you can.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. • Assessment 1. A 2. A 3. A 4. B 5. B 6. B 7. B 8. A 9. A 10. B
  • 22. Maintenance of Computer System •Objectives: A. identify the different software that can be used in performing this basic routine maintenance of computer systems; B. determine the correct processes of performing the basic routine maintenance on computer systems; C. discuss the reasons or purpose of performing the basic routine maintenance on computer systems.
  • 23. Pretest. WHAT DO YOU MEAN? Direction: Given the following keywords in this module, write down a one – sentence definition/description about it. • 1. Data Back up Definition: ________________________________________________________ ________________________________________________________ 2. Malware Maintenance Definition: ________________________________________________________ ________________________________________________________ 3. File System Maintenance Definition: ________________________________________________________ ________________________________________________________
  • 24. Activity 1. FAMILIARITY TEST Directions: Do you know what these software do? Can you identify their function by choosing from the box on the right. FUNCTIONS A. Archiver Utilities B. Anti-Virus and Anti malware C. Disk Maintenance SOFTWARE • 1. WinZip • 2. Avast • 3. Disk Clean Up • 4. WinRAR • 5. McAfee Live Safe • 6. Disk Defragment
  • 25. • 1. WinZip Utilities Anti Virus and - 2. Avast Anti malware Disk - Clean Up 3. Disk Maintenance Archiver - 4. WinRAR Utilities Anti - 5. McAfee Live Safe Virus and Anti malware Di
  • 26. The basic routine maintenance comprises of the 3 basic processes: •1. Data Backup •2. Malware Maintenance •3. Disk or File System Maintenance
  • 27. DATA BACKUP •Backing up basically means creating a redundant copy of a data so that in case anything happens to the original data, you have a spare copy.
  • 28. MALWARE MAINTENANCE refers to the process of maintaining computer by scanning malwares --any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and many more.
  • 29. DISK MAINTENANCE •The process of uninstalling any unnecessary software and defragmenting your disk due to decline of performance when the amount of data in your hard disk starts to grow.
  • 30.
  • 31. • DOWN 1. basically means creating a redundant copy of a data • 3. protect your file with encryption and a software password to prevent any unauthorized access. • 5. Your system performance will ______ when the amount of data in your hard disk starts to grow. • 7. refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. • 9. The computers basic routine _______ are Data Backup, Malware Maintenance, Disk or File System Maintenance
  • 32. • ACROSS • 2. _____ a document file from your desktop into a thumb drive to provide spare • 4. Loss of privacy, confidential data and access to your system when software and hardware are damaged. • 6. preventive measures you can take to protect the computer system from malware. • 8. _____ utilities such as WinZip which enables you to compact your files into a single compressed file • 10. Applying the basic maintenance routine in your system will extend its ______
  • 33. • Activity 3. SUMMARIZE your LEARNING GAPS! Direction: Fill in with the important terms that you had encountered on this module. 1. The basic routine maintenance comprises of the 3 basic processes are __________________, _______________________, _____________________. 2. _______________ means creating a redundant copy of a data so that in case anything happens to the original data, you have a extra copy. 3. Depending on your needs, you may choose to back up your _________, or your ___________, or even your ________________. 4. But when these files gradually occupies a lot of disk space, you may need to seek help from _______________ such as WinZip. 5. WinZip also allows you to protect your file with _____________ and a software _____________ to prevent any unauthorized access. 6. Viruses, spyware, worms, trojan horses, spams are examples of ______________. 7. A safe file can be identified by scanning the file for any virus infection before you attempt to open it but if it may be a new virus yet to be updated in your virus scan, it’s better to ________________. 8. The cause of the decline in performance of your computers is ________________. 9. _________________ is used to free space in Drive C: . 10. When your system performance will decline when the amount of data in your hard disk starts to grow, you need to ______________

Editor's Notes

  1. Although setting up a home network is not necessarily an expensive or difficult project, you just need to have few basic pieces of hardware to connect your computers, printers, gaming consoles, and assorted gadgets to each other — and to the Internet. So what are the networking hardware requirements para maka set up tayo ng home network? What is a home network anyway? Yung connection between network and your devices in your house it is already called home network. Ok so ano bang mga requirements to make a home network yun yung pag uusapan natin on this lesson.
  2. Based sa mga napag aralan na natin nun about networking magbigay nga kayo ng mga hardware requirements for networking?
  3. So how do DSL and Cable modem work? They serve as digital translator they are the one that receive data signals from the internet then itatranslate nila into digital language. Para madistribute across your local area network via wired ethernet or wi-fi connection. Oh dito na papasok sila wired or wireless router. So sabi dito, meron ng mga DSL or cable modems na may built-in routers na. Eto na yung trend ngayon ganito na yung mga iniisntall nila nowadays. Kayo ba anong gamit niyo sa mga bahay niyo?
  4. Dsl or digital subscriber line. Parehas ba ang dsl at wifi? Syempre hindi. So what is the difference of dsl and wifi? Dsl ay nagpoprovide ng actual connection sa internet. Samantala kapag naman wifi, it can’t provide internet access alone. Dapat inaaccompany siya ng either dsl or other internet service.
  5. Wired- Ethernet yun yung idadirect mo yung ehernet cable sa may ethernet port ng iyong computer Wireless- yung antenna naman ng router ang connection ng network sa iyong device. So between wired and wireless adapers ano sa tingin niyo ang magpoprovide sainyo ng faster internet speed? Of course ethernet kasi solo mo siya.
  6. What if wireless yung router namin? Kailangan parin ng ethernet cabling para maconnect yung router sa dsl or modem.
  7. When you hook up your router to the modem, however, you are then able to share that internet connection with all of the computers on your network. Sometimes modems come with built-in routers. So ito na yung trend ngayon ung combination of router and modem.
  8. Each client on the network is given an IP address, which helps your router direct traffic. Clients within the network get a local IP address, while your modem gets a global IP address. Global IP addresses are like street addresses, while local IP addresses are like apartment numbers: one lets you find the building in relation to the rest of the world, while the other lets you find the specific location within the complex. These addresses make sure the right information from the outside world gets to the right computer on your network.
  9. Wifi-properties-protocol
  10. If you are only using your router to connect to the internet, 10/100 is fine, since your internet connection is probably slower than 100Mbps, meaning you will not be able to actually take advantage of the router's full speed. If you are transferring data between computers, however, you may want to go with a gigabit router, since it will transfer that data much faster than a 10/100 model
  11. Wireless N has a longer range than wireless G, so if range is important you will want to use wireless N. That said, there are many other ways to connect to your network from afar. Wireless extenders (also called wireless repeaters) are products you can buy that do exactly what the manuals say to extend your network further. Alternatively, you can buy a powerline adapter, which lets you use your home's electrical wiring to hook a distant device up to your router with an Ethernet cable (and thus get a faster connection than wireless would allow for).
  12. If you have more wired devices than can fit on a router, you can plug them all in using a wired switch. A switch is like a power strip for your router: it lets you plug in more devices than the router originally allowed.
  13. Is wifi and wpa2 the sam? Yes. Wpa- wfi protected access. Some old wireless devices do not support WPA, in which case you will have to use the less secure WEP instead. Basically, every devices made in the last four years supports WPA2 encryption.
  14. Perhaps you have handpicked the finest computer with the selected fastest processor and graphic card and with a few gigabytes of memory. So you thought to yourself that your machine is probably going to sustain you for the next five (5) years. But little did you discover that some six months down the road, your computer is behaving like a Pentium 2 computer, perpetually flustering you with its choppy images, frustrating pop-ups and tremendously slow disk access. Gradually, your computer crashes and all your data is lost on one fine afternoon.
  15. 1. WinZip Utilities Anti Virus and - 2. Avast Anti malware Disk - Clean Up 3. Disk Maintenance Archiver - 4. WinRAR Utilities Anti - 5. McAfee Live Safe Virus and Anti malware Di
  16. 1. WinZip Utilities Anti Virus and - 2. Avast Anti malware Disk - Clean Up 3. Disk Maintenance Archiver - 4. WinRAR Utilities Anti - 5. McAfee Live Safe Virus and Anti malware Di