Вы находитесь на странице: 1из 135

1 | P age

QUALIFICATIONTITLE:COMPUTERNETWORKINGTECHNOLOGY
UNITOFCOMPETENCY: INTRODUCEINFORMATIONTECHNOLOGY
MODULETITLE: INTRODUCINGINFORMATIONTECHNOLOGY

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNINGCOMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Explain
Information
Technology
industry.

1.1Theimportance
ofinformation
technologyin
variousindustriesis
identified.

1.2Thenames,
purpose,
characteristicsof
differentIT
technicianare
defined.

1.Identifyingthe
scopeand
limitationsof
Information
Technology

2.Identifyingthe
importanceof
Information
Technologytothe
economyand
industries

3.Identifyingthe
functionofa
technicianinanIT
industry

Giveexamples
ofscienceand
technology
activitiesand/or
productsthat
affectoneslife.
Y1
Classifyalgebraic
expressionsas
polynomialsand
nonpolynomials

Y2
Demonstrate
knowledgeandskill
insolvingquadratic
equationsand
abilitytoapplyin
solvingproblems.
Readintensivelyto
selectappropriate
detailsfora
specificpurpose
fromagiventext

Science
Givingexamplesof
technological
advancementandits
impacttothe
society.
Giveexamplesof
currentinformation
technologythat
changethelivesto
thepeople.

Math1:Compareand
Contrast
Browseinthe
internetorelectronic
booksandsearchin
thebooksaboutthe
classificationof
polynomials
accordingtothe
numberoftermsand
Technology
WhatisInformation
TechnologyIndustry?

Science
Whatarethecurrent
Information
Technologiesthat
changethelivesof
thepeople?

Math
Whatarethe
changesmadeby
technologyin
mathematics?


2 | P age

numberofvariables.
Differentiatethe
conceptsgathered
electronicallyand
printedbasedon
theircontent.

English
Explainingkeypoints
fromagiventext
Studentsaregiven
differentconcepts
fromthetextthat
theyreadandexplain

English
Whyisitnecessaryto
readintensively?

LO2.
Determinethe
different
hardware
components

1.1 Thedifferent
hardware
componentsare
identified.

1.Identifying
thedifferent
hardware
components

2.Describingthe
functionofeach
hardware


Y1
Demonstrate
knowledgeandskill
inmeasurement
andtheuseof
measuringdevices,
conversionofunits
ofmeasurement
andsolvingreallife
problems

Y2
Usesystemsof
Explaininformation
obtainedfromthe
internetandother
sourcesthrough
variousreading
techniques

Math1
Comparingand
Contrasting
Usingweighing
scale,ruler,
thermometer,and
stopwatch
comparethetwo
Technology
Howdoweverifythe
differenthardware
components?What
arethese?

MathI:Whyisthere
aneedtoknowthe
performanceof
computer
componentswith
regardstoitsweight,
spaceoccupied,and
runningconditions?

3 | P age

linearequationsto
solveproblems
(e.g.number
relations,uniform
motion,geometric
relations,mixture,
investment,work)

Y3
Describetheideas
ofpoint,line,and
plane

Y4
Differentiatea
functionfroma
mererelation
setsofcomputer
(different
brands/component
s)withrespectto
theirweight,space
occupied(width,
height,length),
temperature
readingwhenin
usedfor15
minutes,andtime
tobootand
runningprogram,
timetobrowsethe
internet.

Math2:Problem
Solving
Answerthegiven
wordproblemsusing
linearequations
involvingperipherals
andinstallation,e.g.
price,workrate,
numberrelations.

Math3:Answering
ActivityWorksheet
Identifywhichof
thesepartsofthe
peripheralswill
representpoint,line,
andplane.

Math2:Whatisthe
importanceof
acknowledgingthe
price,system
requirements,and
rateofperformance
ofperipheralsin
computers?

Math3:What
propertiesofpoints,
lines,andplanes
needtoconsiderin
preparingperipheral
devicesofPC?


4 | P age

Math4:Answering
ActivityWorksheet
Identifywhichofthe
PCperipheralscanbe
usedbysingle
(function)computer
andwhichofthese
canbeshared
(relation).

English
Comparingand
contrasting

Compareand
contrastdifferent
informationgathered
fromatextthrough
Venndiagram

Math4:Whatisthe
significanceof
knowingthedifferent
devicesofPCthat
canbesharedorcan
notbesharedin
networking?

English
Whyonemusthave
toacquirereading
techniques?

LO3.
Determinethe
different
software.

1.1Thedifferent
applicationsand
computersoftware
areidentified.

1.Identifyingthe
different
computer
softwares

2.Determinethe
functionofeach
computer
application

Useideasand
informationgained
fromprevious
readingsand
personal
experiencesto
betterunderstand
atext

Math
Graphing
Amongthe
applicationinstalled
Technology
Whataresoftwares?
Howdowe
determinethem?

Math
Howdowegraph
usinglinear
relationsina

5 | P age

incomputer,
determinewhat
applicationcanbe
usedtographlinear
equation.Graphthe
givenlinearequation
usingthesoftware
identified.

English
Conjecturingand
hypothesizing
Conjectureand
hypothesizeusing
background
knowledgeor
schemawhile
readingatext
spreadsheet?

English
Whyareour
schemataimportant?


6 | P age

QUALIFICATIONTITLE:COMPUTERNETWORKINGTECHNOLOGY
UNITOFCOMPETENCY: INTRODUCINGBASICNETWORKING
MODULETITLE: INTRODUCINGBASICNETWORKING

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNINGCOMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Explain
theconceptsof
networkingand
thebenefitsof
networking.

1.1Communication
devicesina
network
environmentare
identified.

1.2Communication
betweenHostand
clientdevicesis
explained.

1.3Localand
network
applicationsare
identified.

1.Describing
howandwhere
computersare
used

2.Classifying
localand
network
applications

3.Identifying
classesof
computers

Proposepossible
solutionsto
energyproblem
Y1
Illustratethe
developmentof
measurement
fromtheprimitive
tothepresent
international
systemofunits.
Explainvisual
verbal
relationships
illustratedin
tables,graphs,
information
mapscommonly
usedincontext
areatexts

Science
Practicingwise
useofenergy
Explainhow
sharingof
resourcescan
minimizetheuse
ofenergy

Math:Paper
Work
Usetheinternet
tomakeatimeline
ofdevelopmentof
calculatingdevices
fromtheprimitive
tothepresent.
Emphasizethe
highlightsinthe
timeline.Basedon
thetimelinewho
Technology
Whatarethebenefits
thatwecangetfrom
networking?

Science
Howcanthe
consumptionofenergy
beminimizedwhen
resourcesareshared?

Math
Whatcanwelearnfrom
thepastthatwecan
applytoday?


7 | P age

identifythe
individualswho
contributedinthe
modern
computer.

English
Explainingthe
mainpointofan
informativetext
Students
elucidate
thoroughlywith
theaidof
illustrationsand
schematic
diagrams

English
Whatisthesignificance
inusingillustrationsand
schematicdiagrams?

LO2. Identify
thecomponents
neededto
connecttothe
Internet.

1.1Devicesneeded
foraninternet
connectionare
identified.

1.2Physicaland
logicalconnections
areidentified.

1.3Purposeofan
ISPisdescribed.

1.Identifyingthe
physical
connection

2.Defining
logical
connections

3.Usingnetwork
applications

Convey
informationusing
technological
aidslikethe
projectors,LCD,
Computerand
theinternet.

MathApplication
Makearecordof
theperformance
oftwodifferent
(intermsof
components)
computers.
Differentiatethe
Technology
Howdoweconnectto
theinternet?

Math
Howcanrelativeerror
existinmeasuring?


8 | P age

4.Comparing
andcontrasting
speedwith
bandwidth

5.Identifying
networkdevices

twointermsof
theirspeedof
processor(Ghz),
timetoboot,time
toloadan
application.
Identifytherate
ofperformancein
termsof
downloading(DL)
perfileand
uploading(UL).
Make
generalization
aboutthedata
obtained.

English
Presentinga
report
Studentspresent
areportclearly
andspecificallyin
theclassusing
theirlearnedskills
inComputer

English
Whatistheadvantage
ofpresentingareport
utilizingtechnological
aids?

LO3. Examine
thedifferent
network
topologiesand
itsapplication.

1.1Physicallayout
ofalocalarea
networkisplanned.

1.2Networking
topologiesare
described.

1.Illustrating
physical
topologiesofa
network

2.Identifying
logical
Elicitandgive
informationusing
differenttypeof
questionstoseek
clarificationand
verificationto
responsesmade

Technology
Whyisnecessaryto
considertopologiesin
planninganetwork


9 | P age

topologiesofa
network

MathApplication
Makeadiagramof
computersfor
themtobe
connectedtoa
routerorswitch.
Arrangethe
computersin
circular,star,and
straightlineform
andhavingthe
sameangle
measurefromthe
router/switch
usingonlya
minimumlength
ofUTPcable.

English
Paneldiscussion:
Studentssingle
outpointto
persuadeby
clarifyingand
verifying

Math
Howdoyouuse
measurementin
computing?

English
Whydoweneedto
clarifyandverifythings
beforebelievingit?


10 | P age

QUALIFICATIONTITLE:COMPUTERNETWORKINGTECHNOLOGY
UNITOFCOMPETENCY: CONVERTNUMBERSYSTEMS
MODULETITLE: CONVERTINGNUMBERSYSTEMS

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNINGCOMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Convert
binarynumberto
decimalnumber.

1.1Decimaland
binarynumbersare
identified.

1.2Decimalnumber
tobinarynumberis
converted.

1.Converting
Decimalto
Binary
Representation
ofData

2.Representing
Information
Digitally

Y1
Perform
fundamental
operationson
integersand
exponentiation
Readcloselyto
getkeypointsin
technologyfor
specificpurposes.

Math:Completion
Completethetable
ofvaluesforthe
powerof2(from2
0

to2
20
).
Application
TranslateBinaryto
ASCIIText(ALTon
keyboard).
e.g.:
01001000=72=H
01100101=101=e
01101100=108=l
01101100=108=l
01101111=111=o
Makeseriesofbinary
toformawordor
phrase.

Technology
Howdoweconvert
binarynumberto
decimalnumber?

Math
Howdothe
integersrelateto
eachotherand
howaretheyused
inbinarysystem?


11 | P age

English
ProblemSolution
Frame:
Fillinthetablewith
problemsbasedon
thegivenreading
materialandidentify
possiblesolutions.

English
Whydoweneedto
readclosely?

LO2. Convert
hexadecimal
numbertobinary
number.

1.1Thestepsin
convertingbinary
numberto
hexadecimal
numberare
performed.

1.2Converting
Hexadecimal
numberto
Binary
representation
ofData

Y1
Defineexponent
Readcloselyto
getkeypointsin
technologyfor
specificpurposes.

Math:Completion
Completethetable
ofvaluesforthe
powerof16(from
16
0
to16
12
).
Fromtheproduct
makealistof
combinationsofthis
numberif:
A=10
B=11
C=12
D=13
E=14
F=15
e.g.:( 1048576=
100000)
Technology
Whydoweneedto
convert
hexadecimal
numbertobinary
number?

Math
Howdothe
integersrelateto
eachotherand
howaretheyused
inbinarysystem?


12 | P age

English
ProblemSolution
Frame:
Fillinthetablewith
problemsbasedon
thegivenreading
materialandidentify
possiblesolutions.

English
Whydoweneedto
readclosely?


1 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:INTRODUCEITCERTIFICATIONANDTHECOMPUTERSYSTEM
MODULETITLE:INTRODUCINGITCERTIFICATIONANDTHECOMPUTERSYSTEM

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS
/CONTENT
LEARNINGCOMPETENCIES LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH

ENG/COMM

LO1.
Explainthe
valueofIT
Certification

LO2.
Determinethe
different
components
ofcomputer.

1.1 ITCertifications
(localand
International)
areexplored.

1.2 Theeffectiveness
ofbeinganIT
CertifiedintheIT
industryis
identified.

2.1Devicesare
checkedaccordingto
specificationsand
tasks.

Exploringlocal
and
internationalIT
certifications

Identifyingthe
effectivenessof
beingcertifiedin
theITindustry

Checkingthe
devices
accordingto
specifications
andtasks.

Y1
Make
qualitative
observations
givena
situationor
material

Y2
Givena
function,
describedby
atableof
ordered
pairs,
constructthe

Y4
Write
compositionson
thedifferent
componentsof
thecomputer
usingappropriate
modesof
Technology
IntroducingITCertifications
ClassIntroduction,Ciscosite
demonstrationforstudents.
Havethestudentslogonto:
www.cisco.com/web/learning/
netacad/indexHtml

Technology
Determiningthedifferent
componentsofcomputer
Researchcomputer
components.Usingthe
internet,reviewacomputer
advertisementordiscuss
Technology
HowvaluableisIT
Certification?

Technology
Whatarethedifferent
componentsofa
computer?


2 | P age

graphand
viceversa
paragraph
development

terminologyusedbyanonline
computerpartsstore.

English
WritingActivity
Writecompositionsbasedon
thegivenmodeof
development

Science
PreparingAFactsChart
Presentingtotheclassa
disassembledcomputer
system.Thestudentsobserved
anddescribethedifferent
componentsofthecomputer.
Then,thestudentspresent
theirobservationsthrough
factschart.

Math
StudyingData
Presentingdatausingtables
andgraphs

English
Whatarethedifferent
modesofparagraph
development?

Science
Identifythedifferent
componentsof
computer.

Math
Whatarethe
advantagesand
disadvantagesof
presentingdatausing
tablesandgraphsin
determiningdifferent
componentsof
computer?

Science

3 | P age

LO3.
Prepare
computer
specifications

2.2Appropriate
hardwarecomponents
arecheckedaccording
tothetask
requirements.

3.1Thenames,
purposesand
functionsofcomputer
partsareidentified.

Identifyingthe
appropriate
hardware
components
accordingtotask
requirements

Identifyingthe
names,purposes
andfunctionsof
computerparts

Y4
Relatepower
tovoltage
andcurrent

Y4
Usedifferent
computer
modelsasaidin
thepreparation
ofresearch
work

Y3
Classify
computers
accordingto
their
specifications

Science
PerformingGroupActivity
Performagroupactivityon
howtodeterminethe
appropriatecomputerpower
supplyusingtheknowledgeon
Power(P),Voltage(V)and
current(I)

Technology
BuildingTeamWork
Havestudents,withdifferent
skillslevel,workinpairs,if
possible.Studentswill
determinethedifferent
componentsandprepare
computerspecificationsusing
apaperandpencilactivity.
Theywilldrawadiagram,label
andspecifythedifferent
computerparts.

Explainthe
importanceof
knowingtheconcepts
onPower(P),Voltage
(V)andCurrent(I)in
selectingcomputer
powersupply.
Whyisitimportantto
choosethe
appropriatepower
supplyforacomputer
system?

Technology
Giveexamplesofthe
differentcomputer
specifications.


4 | P age

3.2System
resourcesandtheir
purpose,IRQ,I/O
Address,andDMAare
explained.

Explainingthe
system
resourcesand
theirpurpose,
IRQ,I/OAddress,
andDMA

English
OutliningandClassifying
Preparingapreliminaryoutline
ontheIntroductionof
researchwork

English
Whyareoutliningand
classifyingimportant?


5 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:APPLYSAFETYLABORATORYANDUSINGOFTOOLS
MODULETITLE:APPLYINGSAFETYLABORATORYANDUSINGOFTOOLS

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS
/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Explainthe
purposeof
safeworking
conditionsand
procedures

1.1 Proper
proceduresfor
handlingcomputer
equipmentto
reducetheriskof
personalinjury,
damageto
property,andloss
ofdataare
followed.

Followingthe
properprocedures
forhandling
computer
equipmentto
reducetheriskof
personalinjury,
damageto
property,andloss
ofdata.

Y3
Explainthe
safety
precautions
tobe
observedin
the
laboratory

Y2
Demonstrate
understanding
ofsequences

Y2
Use
appropriate
expressionsin
expressing
warningsand
prohibitions

Technology
Demonstratingsafe
workingconditionsand
procedures
Assignlabgroups.
Demonstrateandexplain
thesafeworking
conditionsand
proceduresthroughrole
playing.

English
Expressingwarnings
cohabitations
Useappropriate
expressionsin
communicatingwarnings
andprohibitionswhen
handlingcomputer
equipment.

Technology
Identifysafeworking
conditions.

Whatisthe
importanceofensuring
safetyinworking
conditions?

English
Whatarethe
appropriate
expressionsin
communicating
warningsand
prohibitions?


6 | P age

1.2Properdisposalor
recyclingofhazardous
computercomponents
isobservedand
recognizedasaglobal
issue.

Makingpostersor
illustrationsongiving
warningsorprohibitionsin
handlingcomputer
equipment.

Science
PresentingRolePlaying
Presentaroleplayonthe
dosanddontsinthe
workarea.

Math
Searchingforpattern
Listthenextfewtermsof
thesequencebypattern
searching

Math
Studyingdata

Give somewarnings
andprohibitionsthat
youarefamiliarwith?
Whyisitimportantto
followwarningsand
prohibitions?

Science
Whatarethesafety
measurestobe
observedinthework
area?
Whydowepractice
safetyproceduresin
theworkarea?

Math
Whatarethethingsto
considerin
determiningthenext
proceduresforasafer
workingcondition?
Math
Whatarethe
procedurestoprotect
equipmentsfrom
damageandlost?


7 | P age

LO2.
Identifytools
andsoftware
usedwith
personal
computer
components
andtheir
purposes

2.1Correctuseofeach
toolinrequiredin
currenttaskis
emphasizedand
checked.

2.2Diagnosing
problems,maintaining
hardwareand
protectingstoreddata
throughtheuseofa
rangeofsoftwareis
applied.

Y3
Givetheuses
ofsome
important
apparatus
usedin
laboratory

Y4
Collectstatistical
dataand
arrangeina
tableaccording
tosome
systematic
consideration

Y1
Demonstrate
understanding
ofaddition,
subtraction,
multiplication
anddivisionof
integers.

Y1
Determinethe
information
mapsuitedto
differenttext
types.

Technology
Identifyingtoolsand
software
Bymeansofagame,let
thedifferentlabgroups
competewitheachother
onhowwelltheycan
name/identifytoolsand
softwareusedwith
personalcomputer
componentandtheir
purposes.
English
PreparingATreeDiagram
Preparingatreediagram
toclassifynouns

Science
ViewingVideoLesson
Viewvideopresentation
onthecorrectuseof
tools/apparatus

Math
SolvingProblem
Performthegivensetsof
problemsusingthefour
fundamentaloperations

Technology
Enumeratethe
differenttoolsand
softwareusedwith
personalcomputer
componentsandgive
thepurposeforeach.

English
Whatisatree
diagram?

Science
Whyisfamiliarization
withcorrectuseof
tools/apparatuses
important?

Math
Doesyourknowledge
inperformingthefour
fundamentalsof
operationshelpyouin
choosingthecorrect
toolsforagiventask?

8 | P age

LO3.
Useproper
tool

3.1Appropriatehand
toolsareidentified
accordingtotheir
purpose.

3.2Selectionoftools
accordingtothetask
requirementsis
observed.
Y3
Identify/give
examplesof
planeandsolid
figures.

Y3
Apply
knowledgeand
skillstosolve
problems
involvingplane
andsolid
figures.

Y2
Usestress,
intonation,
andjuncture
tosignal
changesin
meaning.
English
Oralspeaking
Deliveringashort
informativespeech.

Science
PerformingHandson
Activity
Performingahandson
activitythatwilldevelop
theproperuseoftools

Math
Handsonactivity
Givenaconcreteexample
ofsolidfiguredescribeits
properties.

Math
Problemsolving
English
Whyarestress,
intonationand
junctureimportantin
conveyingideas?

Science
Howdoweusetools
properly?

Whyisthereaneedto
usethecorrecttoolfor
aeachtask
requirement?
Math
Afteridentifyingthe
propertiesofsolid
figure,whatarethe
propertoolsneededto
completeagiventask?

Math
Whyitisimportantto
selectproper
laboratorytoolsin
solvingproblems?

9 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:ASSEMBLECOMPUTER
MODULETITLE:ASSEMBLINGCOMPUTER

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT
LEARNINGCOMPETENCIES LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM

LO1.
Disassemble
computer
parts

1.2 Safelyremoving
Screwsandlock
knotsareensured.

1.3 Removingdata
andpowercables
withoutbreaking
anypinis
observed.

Removingthe
screwsandlock
knotssafely.

Removingdataand
powercables
withoutbreaking
anypin.

Y1
Applythe
scientific
methodin
conductinga
simple
scientific
investigation
Y3
Findthe
distance
betweentwo
givenpoints

Y4
Logically
arrangedthe
giveneventsor
sentencesinthe
orderof
occurrenceina
story.

Technology
Performingandaccrual
assemblyofcomputers
Divide students into
groups. One group will
perform actual computer
hardware assembly and
disassembly while the
other group will practice
using the virtual tools
(Virtual Desktop). Each
group will take turns in
performingthelabs.

English
SequencingEvents

Technology
Writethestepbystep
procedureonhowto
disassemblethe
computerunit.

Writethestepbystep
procedureonhowto
assemblethe
computerunit.

English
Howareevents
sequenced?


10 | P age

LO2.
Assemble
computer
parts

2.1Assemblyofthe
devices/systemsis
carriedoutin
consonancewiththe
specifications
2.2Standard
proceduresin
installing
devices/systemsare
followed.

Carryingout
assemblyofthe
devices/systemsin
accordancewith
thespecifications.
Followingthe
standard
proceduresin
installing
devices/systems.

Y2
Determineof
solutionof
simple
mathematical
equationsby
algebraic
procedures.

Y2
Convey
information
fromlinearto
nonlinearand
viceversa

Science
CreatingAFlowChart
Followingthescientific
method,createaflow
charttoillustratethe
properwayofassembling
anddisassemblingthe
computerunit

Math
Plotting of Points on the
CartesianPlane
Plot points on the
Cartesianplane.

English
Drawingaflowchart
Useaflowchartto
presentsaprocess

Using cohesive markers,


write a paragraph with
coherent and unified
sentences.

Science
Applyingthescientific
method,howshould
youassembleand
disassemblea
computerunit?
Whyisitimportantto
besystematicin
assemblingand
disassemblingthe
computerunit?
Math
Citethetechnical
definitionofthe
terms:point,lines,and
parallellinesin
computer
maintenance.

English
Whatisthe
importanceofusinga
flowchart?

Howdocohesive
markershelpachieve
coherenceandunityin
aparagraph?


11 | P age

LO3.
Configuring
CMOSutility

3.1Useofbeepcodes
inidentifying
computererrorsis
applied.

3.2Modificationsare
doneusingtheBIOS
utilitysetup.

3.3Configurationplan
isorganizedand
preparedbasedonjob
requirements.

Familiarizingself
onthebeepcodes
anderrors
computerproduce.

Modifyingthe
configurationof
theBIOSsetup.
Organizingand

Preparingthe
configurationplan
basedonthejob
requirements
Y4
Usecohesive
markersor
connectorsto
achieve
coherenceand
unity

Math
ProblemSolving
Solve the problems using
themethods:
Guessandcheck
Elimination
Comparison

Technology
ConfiguringBIOS
Most students have
never configured BIOS.
Navigation, terms, and
making changes can be
confusing for them.
Placestudentsingroups
with different skill levels
orhavethemtakenotes
as you demonstrate the
inner workings of the
BIOS.
Math
Istheguessandcheck
methodapplicablein
assembling
computers?

Technology
Howdoyouconfigure
aCMOS
Utility?

12 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:TROUBLESHOOTANDBASICPREVENTIVEMAINTENANCE
MODULETITLE:TROUBLESHOOTINGANDBASICPREVENTIVEMAINTENANCE

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNINGCONCEPTS/CONTENT
LEARNING
ACTIVITIES
GUIDE
QUESTIONS TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Explainthe
purposeof
preventive
maintenanceto
theclient

1.1 Thepurposeof
preventive
maintenanceis
wellexplained
totheclient.

Explainingthe
purposeofproper
preventive
maintenancetothe
client.
Y1
Give
examplesof
scienceand
technology
activities
and/or
productsthat
affectones
dailylife.
Y2
Use
appropriate
toolsin
speakingto
convey
message
effectively
Technology
RolePlaying
Throughdramatizationput
anemphasisonthe
purposeofpreventive
maintenancetotheclient.

English
PresentingBeforeAn
Audience
Deliveringashort
informativetalkonthe
purposeofpreventive
maintenanceusing
appropriatetechniquesto
suittheaudienceand
applyingvariationin
intonationandstressfor
emphasisandcontrast.

Technology
Whatarethepurposes
ofpreventing
maintenance?

English
Whatisthe
importanceof
intonationandstress
inconveyingones
message?


13 | P age

Science
PerformingBrainstorming
Sessions
Performbrainstorming
sessionswhereinstudents
discussvariousScience
andTechnologyactivities
andtheeffectsofthese
activitiestotheirlives.
NOTE:Theteachers
examplesofaScienceand
Technologyactivitiesare
basedonperforming
preventivemaintenance
onthecomputerunit.

Science
CiteScienceand
Technologyactivities.
Explaintheeffectsof
theseactivitiestoyour
dailylife.
Explaintheeffectof
doingpreventive
maintenancetoyour
computer.

Whatarethebenefits
ofdoingpreventive
maintenancetoyouas
acomputeruser?
LO2.
Perform
troubleshooting
process

2.1 Systematic
inspectionof
hardwareis
observed.

Inspectingthe
hardware
systematically.

Y2
Findthesolution
oftheproblem
algebraically
usingtheff
methods:
Eliminate
Compare
Substitute

Y4
Distinguish
whattodoand
nottodoinan
emergency
situation.

Technology
RolePlaying
Bymeansofa
demonstration,perform
anactualtroubleshooting
process.Havethestudents
putintowritingeverything
thattheyobserve.

Technology
How do you perform
the troubleshooting
process?


14 | P age

2.2 Computer
hardware
problemsand
errorsare
identified.

Identifying
computer
hardwareproblems
anderrors.

Y1toY4
Apply
mathematical
knowledgeand
problemsolving
skillsinsolving
mathematical
andreallife
problems.

English
Followinginstructions
ApplyingtheDosand
Dontswhen
troubleshooting.

Math
SolvingProblem
Accuratelyanswerthe
givenproblem.

Math
GroupDiscussionorPeer
Teaching
Thestudentswillworkin
groupsorinpairstosolve
agivenproblem.
English
Whatisthe
importanceof
followinginstructions
correctlywhen
performingan
activity?

Math
Whatarethe
guidelinestohelpyou
solvecomputer
problems?

Math
Citecommon
problemsyou
encounterandthe
possiblesolutionsto
them?

15 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:MAINTAINLAPTOPANDPORTABLEDEVICES
MODULETITLE:MAINTAININGLAPTOPSANDPORTABLEDEVICES

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Describethe
componentsofa
laptopandother
portabledevices
1.1Components
foundoutsideand
insideofthelaptop
areproperly
described.

Describingproperly
thecomponents
foundoutsideand
insideofthelaptop.

Y3
Identify
elementsand
compounds
usedin
industries.

Identify
elementsand
compounds
usedin
laptopsand
other
portable
devicesand
batteries.

Y1
Translateverbal
phrasesto
mathematical
phrasesand
viceversa.
Y3
Usevarious
waysof
organizing
information
fromlinearto
nonlinearand
viceversa.
Technology
Describingthe
Component
Laydownthedifferent
componentsofthe
computerunitonatable.
Usingthefishbowl
method,thestudentswill
berequiredtopick
questionswheretheywill
beaskedtodescribea
specificlaptoporportable
devicecomponent.

English
Illustration/
Representation
Illustrateapictureof
laptopandanother
portabledeviceandtheir
components.
Technology
Givethedescriptionof
thedifferent
componentsofa
laptopandother
portabledevices.

English
Givetheimportance
ofusinggraphic
representation.


16 | P age

1.2Taskstobe
undertakenare
properlyidentified.

Identifyingproperly
thetaskstobe
undertaken.

Science
Performing
Library/InternetResearch
Performlibraryand/or
internetresearchonthe
elementsandcompounds
useinlaptopandother
portabledevicesbatteries.

Presentthedatacollected
throughPowerPoint
presentationorother
formsofpresentation.

Math
ProblemSolving
Translatesomeverbal
phrasestomathematical
phrasesandviceversa.

Science
Whataretheelements
andcompoundsused
inlaptopandother
portabledevices
batteries?Describe
each.

Whyisitimportantto
usecorrectbattery
typesforlaptopand
otherportable
devices?

Math
Howwillyoudescribe
thecomponentsof
laptopandother
portabledevicesusing
wordssuchas:
Equal
Unequal
Parallel
Opposite


17 | P age

LO2.
Configure
desktopand
laptop
components
2.1Instructional
manualisfollowed
fornormalsystem
operations.

2.2Safeinstallation
andremovalof
laptopcomponents
isassuredand
guaranteed.

Followingthe
InstructionalManual
fornormalsystem
operations.

Assuringand
guaranteeingthe
safeinstallationand
removaloflaptop
components.

Y2
Givenasimple
mathematical
sentence
involvingone
variable,
determineits
solution.

Technology
Demonstratingtothe
Class
Invitearesourceperson,
possiblyalicensed
technicianwhocan
demonstratetotheclass
howadesktopanda
laptopisconfigured.After
thedemo,thestudents
arefreetoasktheir
questionstotheresource
person.

Math
ProblemSolving
Determinethesolutionof
anequationwithone
variablebyusingguess
andcheckmethodand
replacementset.

Technology
Howdoyouconfigure
desktopandlaptop
components?

Math
Istheguessandcheck
methodapplicablein
configuringlaptop
components?

18 | P age

LO3.
Perform
preventive
maintenance
techniquesfor
laptopsand
portabledevices
3.1Correctcleaning
procedureis
observed.

3.2Allworkisin
accordancewiththe
workplaceand
standard
procedures.

3.3Safety
proceduresin
handlingthelaptop
areproperly
observedatall
times.

Applyingcorrect
cleaningprocedure
followingset
standards..

Accordingwiththe
workplaceandthe
standardprocedures
allworkwasdone.

Observingproper
safetyproceduresin
handlingalaptop.

Y2
Plana
systematic
listinginsolving
problem.

Y4
Constructa
flowchart
depictinga
sequenceora
process.
Technology
PerforminganActual
Demonstration
Assignastudentto
performactual
demonstrationon
preventivemaintenance
techniquesforlaptopsand
otherportabledevices.
Therestofthestudents
willobserveandgive
feedbackonthe
demonstrationand
procedures.
English
Flowcharting
Constructaflowchart
illustratingthecleaning
procedureforlaptopsand
portabledevices.

Math
GroupDiscussions
List all possible problems
to watch for before or
duringsolvingaproblem.
Technology
Whatarethedifferent
preventive
maintenance
techniquesforlaptop
andotherportable
devices?

English
Whyisitimportantto
followaproper
procedurein
completingatask?

Math
Issystematiclistingof
greathelpin
performingpreventive
maintenance
techniqueforlaptop
andportabledevices?

19 | P age

LO4.
Troubleshoot
laptopand
portabledevices

4.1Standard
troubleshooting
procedureis
followed.

4.2Safety
proceduresin
propermaintenance
oflaptopsandother
portabledevicesare
observedatall
times.
Followingthecorrect
sequencein
troubleshooting

Observingproperly
thesafety
proceduresin
handlinglaptopsand
otherportable
devices.
Y1
Discussthe
importance
ofscientific
valuesin
decision
makingand
problem
solving.
Y2
Apply
knowledgeset
involving
arithmetic
sequences.
Y2
Listento
explanationsof
specific
processes
noting
sequenceand
causeand
effect.
Technology
ResearchingLaptop
Problemsand
Troubleshooting
Researchlaptopproblems,
troubleshootingresources
andsolutions.
English
WritingActivity
Writeaprocedurein
troubleshootinglaptop
andportabledevices.
Science
WritingCriticalEssay
Writeacriticalessayon
theimportanceofapplying
scientificvaluesin
problemsolvinge.g.
troubleshootingalaptop
andportabledevices.
Math
ProblemSolving
Givenanarithmetic
sequence,findthesumof
thespecifiednumberof
consecutivetermsbyusing
aformula.
Technology
Citethestepsin
troubleshootinglaptop
andotherportable
devices.

English
Istheprocedurein
troubleshootinglaptop
andportabledevices
correct?
Science
Whatarethescientific
values?Describeeach.

Whyisitsignificantto
applyscientificvalues
indecisionmakingand
problemsolving?
Math
Howimportantis
organizingandusinga
logicalapproachin
solvingproblems?

20 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:INSTALLAPRINTERANDA SCANNER
MODULETITLE:INSTALLINGAPRINTERANDASCANNER

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Installand
configure
printerand
scanner
1.1Installingand
configuringprinters
correctlyis
practiced.

1.2Assigninga
defaultprinteris
performedcorrectly.

Ensuringcorrect
configurationswhen
theprinterisadded
orinstalled.

Assigningthedefault
printercorrectly.

Y1
Distinguish
solids,liquids
andgasses
basedon
observables
properties.

Technology
DiscussingaDiagram
Finddiagramsoflaser
printersandscanners.
Discusseachdiagramin
detail.

Science
PreparingConcept
Prepareaconceptmap
showingtheobservable
propertiesandexamples
(typesofprinteri.e.Ink
Jet,Impact,Solidink)of
thedifferentstatesof
matter.

Technology
Givetheprocedurein
installingand
configuringprinters
andscanners.

Science
Howaresolids,liquids,
andgassesdescribed?

Howdoweclassifythe
typesofprinter
accordingtothestates
ofmatter?


21 | P age

1.3Performing
printertesting
correctlyis
completed.

Testingifprinteris
workingefficiently.
Y2
Evaluatethe
given
mathematical
phrasesorsets
ofvalues.
Math
ProblemSolving
Evaluationthealgebraic
expressionbyreplacing
eachvariablewiththe
givenvalueandperform
theorderofoperations.

Math
Statetheadvantages
ofevaluatingthe
processes.

LO2.
Applycommon
preventive
maintenance
techniquesfor
printersand
scanners.

2.1Properhandling
ofprintersand
scannerstoavoid
damagingthe
equipmentis
practiced.

Handlingprinters
andscanners
properlytoavoid
damagingthe
equipment.


Technology
ListingoftheCorrect
PreventiveMaintenance
Techniques
Havethelistofthecorrect
preventivemaintenance
techniquesforprinterand
scannerpastedonthewall
ofthecomputerlab.Itwill
serveasareminderforthe
studentstopracticethese
preventivemeasuresatall
times.

Technology
Whatarethecorrect
preventive
maintenance
techniquesforprinters
andscanners?


22 | P age

2.2Routine
maintenanceof
printersand
scannersare
undertaken
accordingto
standardoperational
procedures,
principlesand
techniqueswhich
canbefoundinthe
manualoronthe
manufacturers
website.

2.3Guidelinesfrom
themanufacturer
forcleaningthe
printersand
scannersare
observed.

Undertakingroutine
maintenanceofthe
printersand
scanners.

Findingtheprinteror
scannermanualon
themanufacturers
website.

Followingthe
guidelinesfromthe
manufacturerfor
cleaningtheprinters
andscanners.

Identifyingthe
problemandcause
oferrorofprinters
andscanners.

Y4
Demonstrate
understanding
oftheskillsin
theuseof
graphsand
tablesof
statisticaldata.
Math
Groupwork
Findthemode,median
andmeanofagiven
ungroupdata.
Math
Whatspecifictypeof
graphisusedto
presentdata?

23 | P age

LO3.
Troubleshoot
printersand
scanners

3.1Correct
identificationof
printer/scanner
errorsandproblems
isobserved.

Diagnosingand
repairingprinters
andscanners.

Y1
Applythe
scientific
methodin
conducting
an
investigation.
Y2
Givenalinear
equationwith
twovariables,
determinethe
solution.
Y4
Illustrate
understanding
ofthethought
relationshipof
agiven
flowchart.
Technology
FocusingonOpenand
ClosedendedQuestion
Techniques
Giveashortlecturethat
focusesonopenand
closedendedquestion
techniqueswith
troubleshootingprinters
andscannersastopic.

English
ConvertingLineartoNon
linearText
Drawtheflowcharton
howtotroubleshoot
printersandscanners
correctly.

Science
DemonstratingMock
Exercises
Performamockexercise
ontroubleshootinga
printerandascanner
applyingthescientific
method.

Technology
Citethecorrect
sequenceofstepsin
troubleshooting
printersandscanners.

English
Howwillyoucheckif
yourflowchartdepicts
thecorrectsequence
orprocedure?

Science
Whatisthe
significanceof
followingastepby
stepprocedurein
troubleshootinga
printerandascanner?


24 | P age

3.2Printersand
scannersproblems
arerepaired.

3.3Problemand
causeoferrorofthe
printerandscanners
andthe
corresponding
solutionarewell
documented

Practicingproper
documentationin
troubleshooting
printersand
scanners.

Math
Games
Playagamecalled
NumberPlacing.

Math
Isreplacementofeach
parttheimmediate
solutionin
troubleshooting?

25 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:INSTALLOPERATINGSYSTEM
MODULETITLE:INSTALLINGOPERATINGSYSTEM

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Planand
preparefor
Operating
System
installation

1.1Installationof
operatingsystemis
wellplannedand
executed.

Carefulplanningand
executionof
OperatingSystem
installation.

Y3
Demonstrate
imaginationin
writing
differenttext
types.
Technology
OperatingSystem
Installation
Explaintheroleof
operatingsystemsand
demonstrateinstallation.

English
Writingactivity
Writeaparagraphusing
descriptionanddefinition
onplanningapreparing
foranoperatingsystem
installation.

Technology
Howdoyouplanand
prepareforan
OperatingSystem
installation?

English
Whyisimagination
importantinwriting
differenttexttypes?


26 | P age

LO2.
Installan
application.

2.1Install,navigate
anduninstallan
application.

2.2Correctlyadding
orremovinga
programappletand
configuringhard
drivesetis
observed.

2.3Useofdefault
settingtoinstallan
operatingsystemis
observed.

2.4Identificationof
bootsequencefiles
andregistryfilesis
evident.

Installing,navigating
anduninstallingan
application.

Identifyinghard
drivesetupand
correctlyaddingor
removingaprogram
applet.

Usingadefault
settingtoinstallan
operatingsystem.

Identifyingand
followingtheboot
sequencefilesand
registryfiles.

Y2
Perform
fundamental
operationson
signednumbers.

Technology
Listingsofcommon
preventivemaintenance
techniquesforOperating
SystemsandApplications
Havealistofthecommon
preventivemaintenance
techniquesofOperating
Systempastedintheir
workstationsforconstant
reminders.
Math
ResearchWork
Citereallifequantities
thathaveoppositesenses,
andusesignednumbersto
indicatethem.
Technology
Whatarethecommon
preventive
maintenance
techniquesfor
OperatingSystemsand
applications?

Math
Whatshouldbedone
beforeandafter
installingany
applicationina
computersystem?

27 | P age

2.5Easein
navigatingoperating
systemsisobserved.

2.6Abilityto
describedirectory
structuresis
displayed.

Navigatingoperating
systemsand
describingits
structures.

LO3.
NavigateaGUI
(GraphicalUser
Interface)

3.1Easein
navigatingGUIsis
observed.

NavigatingGUIs
easily.
.
Technology
UsingtheKeyboard
Allowthestudentstowork
infrontofthePCandlet
themplaywithkeyboards
usingtheirimagination.

Technology
Citeexamplesonhow
onecannavigatethe
GUIofanapplication.

LO4.
Applycommon
preventive
maintenance
techniquefor
Operating
System

4.1Identification
andapplicationof
correctpreventive
maintenance
techniquesfor
operatingsystemis
practiced.
Identifyingand
applyingcommon
preventive
maintenance
techniquesforan
operatingsystem.
Y3
Identifythe
valuesand
traitsofa
scientist.
Y2
Usethe
shortcut
methodto
obtainthe
productsoftwo
binomialsand
thesquareof
thebinomials.
Y2
Notepertinent
detailsafter
listeningtoa
lecture.
Technology
Interviewingaworker
Interviewapersonwhose
workrequireshimtobein
frontofaPC.Askhimof
thepreventive
maintenancetechniques
heappliesinhiswork.
Takedownnotes.

Technology
Enumeratethecorrect
preventive
maintenance
techniquesfor
OperatingSystems.


28 | P age

English
Summarizing
Givethesummaryof
commonlypracticed
maintenancetechniques
foroperatingsystems.

Science
CreatingaComparison
Matrix
Createacomparison
matrixnotingthevalues
andtraitsofascientist
applyingpreventive
maintenancetohis
OperatingSystem.

Math
ManipulativeSkills
Usethemagictilesto
performtheproductof
twobinomials.
English
Howdoes
summarizinghelpin
gettingthemainidea
ofatext?

Science
Whyisitessentialfor
onetoimbibethe
valuesandtraitsofa
scientist?

Math
Afteryouhavesolved
theproblem,listthe
steps(incorrect
sequence)requiredto
completethetask.

29 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:CONFIGURENETWORK
MODULETITLE: CONFIGURINGNETWORK

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Explainand
describe
network
1.1Networking
principlesare
identifiedand
applied.

Identifyingand
applyingthe
principlesof
networking.

Y4
Explainhow
electromagnetic
wavesare
produced.

Y4
Discussthe
differentregions
of
electromagnetic
spectrum,their
propertiesand
uses.
Y1
Comparethings
orobjectsusing
descriptive
words.
Technology
DescribingtheIPAddress
Alectureon:
IPaddressingandtheir
functions.
whatDHCPisandhow
itworks?
quiz

Technology
WhatisanIPaddress?
Howarethey
computedand
assigned?
WhatisDHCP?
HowdoesDHCP
works?


30 | P age

1.2Thedifferent
typesofnetworks
arecompared.

1.3Appropriate
networktopology
andarchitectureare
determinedbased
onclientsneeds.

Comparingthe
differenttypesof
network.

Determiningthe
appropriate
networktopology
andarchitecture
basedonclients
needs.

English
MakingComparisons
Enumeratethesimilarities
anddifferencesof
networks.

Science
Doinglibrary/internet
researchandpresenting
reportthrough
PowerPoint/otherforms
ofpresentation
Assignthestudentstodo
library/internetresearch
onhowdataare
transmittedinanetwork.
Requirethestudentsto
presenttheirreportsusing
PowerPointorotherforms
ofpresentation.
Drawings/animationmay
beincluded.

English
Whatarethe
descriptivewordsor
adjectivesthatare
usedincomparing
objects?

Science
Explainhowdataare
transmittedina
network.

31 | P age

LO2.
Identify
network
standardand
model

2.1Usingequipment
anddevicesthat
conformtothe
acceptedstandards
forrequired
networkingtasksare
used.

2.2Relationships
anddifferences
betweentheOSIand
TCP/IPmodelsare
determined.

2.3CabledEthernet
standardsand
wirelessEthernet
standardsare
differentiated.

Usingequipment
anddevicesthat
conformtothe
acceptedstandards
forrequired
networkingtasks.
.

Determiningthe
relationshipand
differences
betweenOSIand
TCP/IPmodels.

Differentiating
cabledEthernet
standardsand
wirelessEthernet
standards.
Y1
Measurement
Length
Conversio
n
Reading
and
writing
decimals
Y3
Notetheform
andfunctions
ofdifferent
typesof
literarytext.
Technology
MemorizingtheProtocols
Makesurethestudents
memorizetheprotocols,
havethemrecitethemin
class.
Demonstratetheping
commandanditsswitches.
Passaroundorshow
studentsthevarious
networkingdevicesand
cablesasyoudiscuss
them.

English
PreparingaTable
Classifythedifferent
networksaccordingto
standardsandmodels.

Math
ProblemSolving
Findthelengthofawire
usingthecorrect
measuringinstrument.
Ensureaccuracyin
computation.

Technology
Citethedifferent
networkstandards
andmodels.

English
Howdoeseachliterary
textdiffer?

Math
Doesyourknowledge
onmeasurementhelp
youindesigningand
installinga
client/servernetwork?

32 | P age

LO3.
Describe
network
technologies

3.1System
configurationbased
onrequired
specificationsis
performed.

3.2Therelationship
betweenaNICand
modemin
transmittingsignals.

Configuringa
systembasedon
required
specifications.

Identifyingthe
relationship
betweenaNICand
modemin
transmittingsignals.

Y4
Differentiate
digitaland
analogmethods
ofsending
information.

Y3
Readingand
understanding
mathematical
expressions
andterms.

Technology
Observingaregular
applicationof
maintenanceprocedure
Requirestudentsto
performroutine
maintenanceprocedures
foranetwork.

Science
Analyzingpictures
Analyze different pictures
of analogue and digital
technologies which
establish connectivity to
develop the knowledge
about the rapid
transmission of
information
Math
GroupDiscussion
Comparethe
mathematicaland
technicaldefinitionsofthe
following:words,size,
length,areanetwork,
accesspoint,equal,and
area.

Technology
Describeatleastthree
networktechnologies.

Science
Howdoyou
differentiateanalogue
anddigital
technologies?

Math
Whatisthemost
commonlyused
network?

33 | P age

LO4.
Troubleshoota
network

4.1Inspectionand
testingfollowingthe
specified
instructionsare
carriedout.

4.2Safeandefficient
operationsofthe
computernetworkis
assuredand
guaranteed.
Carryingout
inspectionand
testing,following
thespecified
instructions.

Assuringand
guaranteeingthe
safeandefficient
operationsofthe
computernetwork.


34 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:IMPLEMENTSECURITYPROCEDURE
MODULETITLE: IMPLEMENTINGSECURITYPROCEDURE

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1.
Describe
securitythreats

1.1Securitythreats
areextensively
described.

Describingsecurity
threatsextensively.

Y1
Organize
qualitative
and
quantitative
datainthe
formof
chart,tables,
and/or
graphs.

Y4
Employ
concept
mappingasan
aidintaking
downnotes
andorganizing
ideas.
Technology
SurfingtheInternet
Studentsshouldhave
experiencesearchingfrom
variouswebsites.By
surfingtheInternet,they
becomevulnerableto
commonsecuritythreats.

English
Conceptmapping
Groupactivity.Discuss
withyourgrouphowthe
differentsecuritythreats
maybeorganizedusing
conceptmaps.

Technology
Describeasituation
whichmaypose
possiblesecurity
threatstocomputer
systems?

English
Howdoesconcept
mappinghelporganize
ideasorinformation?


35 | P age

1.2Effectsofspam
andpopupwindows
areidentified.

1.3Thedifference
betweenweb
securityandTCP/IP
attackarewell
explained.

Identifyingthe
effectsofspamand
popupwindows.

Explainingwellthe
differencebetween
websecurityand
TCP/IPattack.

Y4
Countthe
numberofways
anobjectcanbe
selectedoutofa
setnobject.
Science
PreparingaPieChart
Makeapiechartshowing
thedifferentsecurity
threatsandtheir
descriptions.

Math
ProblemSolving
Findthenumberof
combinationofnobject
takerattime
Science
Whatisthe
importanceof
organizingqualitative
andquantitativedata?

Math
Whatarethepossible
waysathreattoa
computersystemmay
occur?
LO2.
Determine
securitytreats

2.1Networksettings
tominimizeor
eliminatenetwork
trafficareidentified.

2.2Automatic
securitysoftware
updatingis
configured.

2.3Identifyingand
documentingsocial
engineeringattacks
andoperationsare
conducted.
Identifyingthe
desirednetwork
settingstominimize
oreliminatenetwork
traffic.

Configuring
automaticupdating
ofthesecurity
software.

Identifyingand
documentingsocial
engineeringattacks
andoperations.

Y1
Identifythe
problem
Technology
Clearingup
Misconception
Focusthelectureon
clarifyingany
misconceptionsonthe
differentvirusesand
securitythreats.

Science
ViewingVideoLesson
Viewvideolessononhow
todeterminesecurity
threats.
Technology
Howdoyoudetermine
securitythreats?

Science
Whydoweneedto
identifysecurity
threats?

36 | P age

LO3.
Performsecurity
procedures

3.1Implementation
ofpropersecurity
proceduresfordata
andequipmentare
done.

3.2Antivirusand
antispywareare
installed.

Implementingproper
securityprocedures
fordataand
equipment.

Installingantivirus
andantispyware
applications.

Y1
Designa
procedureto
testthe
hypothesis.
Y4
Usecohesive
markersto
show
sequence.

Y4
Actouta
particular
situation.
Technology
Memorizing the Security
Procedures
Havethestudents
memorizethesecurity
proceduresfordataand
equipment.Testtheir
recallthroughdaily
exercisesordrills.

English
OralRecitation
Recitethestepson
performingsecurity
proceduresfordataand
equipmentusingcohesive
markers.

English
Roleplaying/simulation
activity
Thestudentspresentin
theclasshowtoperform
securityprocedures.

Technology
Citethestepsin
implementingsecurity
proceduresfordata
andequipment.

English
Whatisthe
importanceof
cohesivemarkersina
paragraph?

English
Ratethestudents
performance.


37 | P age

Science
PerformingMock
Exercises
Performmockexercise
wherestudentsdesign
securityprocedureto
protectthephysical
equipmentanddataina
computersystem.
Science
Whatisthe
significanceof
designingand
implementingsecurity
procedures?
LO4.
Apply
preventive
maintenance
techniquesfor
security

4.1Common
preventive
maintenance
techniquesfor
securityisapplied.

4.2Updatingof
signaturefilesfor
antivirus,
antispywareand
newpatchestofix
flawsand
vulnerabilityare
regularlyconducted.

4.3Regularbacking
upofdatatoprotect
themagainstdata
lossisexecuted.
Applyingcommon
preventive
maintenance
techniquesrelated
tosecurity.

Updatingsignature
filesforantivirus,
antispywareandnew
patchesregularlyto
fixflawsand
vulnerability.

Backingupdata
regularlytoprotect
againstdataloss.
Y1toY4
Apply
knowledgeon
problemsolving
strategiesin
solvingroutine
andnonroutine
wordproblems.
Technology
ListingPreventive
MaintenanceTechniques
Havealistofthe
preventivemaintenance
techniquesforsecurity
pastedonthewallsto
serveasconstant
remindersforstudents.

Math
Cooperativelearning
Makethestudents
brainstormontechniques
ofsolvingproblems.
Technology
Howdoyouapply
preventive
maintenance
techniquesrelatedto
security?

Math
Citewaysandmeans
insolvingproblems
relatedtocomputer
viruses.

38 | P age

QUALIFICATIONTITLE:ITESSENTIALS
UNITOFCOMPETENCY:APPLYCOMMUNICATIONSKILLS
MODULETITLE: APPLYINGCOMMUNICATIONSKILLS

LEARNING
OUTCOMES

ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONTENT
LEARNINGCOMPETENCIES
LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY SCIENCE MATH ENG/COMM
LO1
Describegood
communication
skillsand
profession
behavior
1.1 Identificationof
good
communication
skillsand
professional
behavioris
determined.

1.2 Proper
etiquetteand
customercare
areidentified.
Identifyinggood
communicationskills
andprofessional
behavior.

Identifyingproper
etiquetteand
customercare.
Technology
FilmShowing
Makethestudentsviewa
movieshowinggood
communicationskillsand
professionalbehavior.
Technology
Basedonthemovie,
enumeratethe
characteristicsofa
personhavingagood
communicationskills
andprofessional
behavior.
LO2.
Applygood
communication
skillsand
profession
behavior
2.1Professional
behaviorinthe
workplaceis
monitoredand
followed.

Observingand
monitoringof
professional
behaviorinthe
workplace.

Y2
Speakinclear,
correctEnglish
appropriateto
agiven
situation.

Technology
Displayinggood
communicationskills
Giveascenariodisplaying
theapplicationofgood
communicationskillsand
professionalbehavior.
Assignthestudentsto
performthisinclass.

Technology
Citeexamples
depictinggood
communicationskills.

Citethecharacteristics
ofapersonemulating
professionalbehavior.


39 | P age

2.2Useofproper
communication
toolsandtechniques
whendealingwitha
customeris
observed.

Y2
Share
information
whichexpress
feelingsand
attitudeby
usingproper
stressand
variationin
tone.
English
RolePlaying
Atechniciantransacting
businesswithacustomer.
English
TelephoneEtiquette
Usethetelephoneto
maketransactionswitha
client.
English
Whyisitimportantto
speakinclearand
correctEnglish?
English
Whatshouldbe
rememberedand
observedina
telephone
conversation?

1 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : ASSEMBLE PERSONAL COMPUTER HARDWARE COMPONENTS AND PERIPHERALS
MODULE TITLE : ASSEMBLING PERSONAL COMPUTER HARDWARE COMPONENTS AND PERIPHERALS

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS
TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Evaluate
the different
types of
computers and
the types of
applications
used.

1.1 Common uses
of computers in
different
environments are
identified.



1.2 Local
applications with
network
applications are
compared.



1.3 The industry
standard type of
computing device
to use for a given
scenario is
determined.



1. Explaining how
and where
computers are
used.





2. Local and
Network
Applications.





3. Identifying and
describing classes
of computers.




Y-1
Give examples
of Science &
Technology
activities or
products that
affect ones life.

Y-4
Understand how
logic gates are
used in common
electronic
devices.

Y-4
Differentiate
between digital
and analog
methods in
sending
information.
Y-1 Demonstrate
knowledge and
skill related to
simplifying and
performing
operations on
polynomials

Y-4
Identify certain
relationships in
real life
exponential (e.g.
population
growth over
time, growth of
bacteria over
time, etc.)
Get information
from different
electronic media,
the internet and
audio-video
recording



























Science
Evaluating the
effect of
Technology to
society

Give examples of
Science &
Technology
products that affect
ones daily life.

Applying digital
technology

1.Explain how logic
gates are used in
Technology
Why is there a
need to evaluate
the type of
computers and its
application?

Science
How do the latest
computer/gadgets
affect your daily
life activities?

In what way do
computers affect
your way of life?

Why do logic gates
considered as
essential elements
of any digital
electronics circuit?

What are the risk
and benefits 0f

2 | P a g e


4. Categorized
servers, desktops
and workstations.

5. Classifying and
differentiating
portable devices.



Convey information
using the schema in
computer


Use verbal
(paraphrase,
translation,
circumlocution) as
well as non-verbal
communication
strategies in
extended oral
reports/discourse


common electronic
devices

2.Differentiate
between digital
methods in sending
information












Math
Discussion
Discuss the
relationship of
different types of
computing devices
and applications
that are capable of
manipulating
algebraic
expressions (e.g.
finding the product,
values, and
factoring).

Math Exemplifying
sending
information in
digital form?












Math
What would be
the advantages
and disadvantages
of having different
types of
computing devices
and applications in
solving difficult
polynomial
problems?


Math
What are the
capabilities and
limitations of
computer with
regards to
exponential

3 | P a g e

Showcase the
capabilities of
computing devices
to hold large
numbers and
predict possible
outcome of a
certain problem.

English
Gathering
information
Get an information
to a given topic
using Reading Skills


relationship
among organisms
and materials?

English
How does one
benefit from
electronic media,
the internet and
audio-video
recording?

ENGLISH
Why must one
acquire the
reading skills in
gathering
information?






LO2.
Determine
standard
computer
components
and
peripheral
devices to
meet
requirements.


1.1 Common
storage capacities
are described and
determined.

1.2 Speed,
resolution, and
frequency as it
relates to PCs are
differentiated and
current PC

1. Representing
information
digitally.

2. Measuring data
storage capacity.

3. Measuring
Speed, Resolution
and Frequency.












Math Recognizing
Technology
What is the
significance of
determining the
components and
peripheral devices
of a computer



Math
Why is there a

4 | P a g e

resolution is
determined.

1.3 The standard
internal computer
components to use
in a given scenario
are determined.

1.4 The purpose of
common PC
adapters is
described.

1.5 The purpose of
storage devices is
described and
storage
requirements are
determined.


1.6 Current PC
storage capacities
are determined.

1.7 The appropriate
computer
peripheral to use
given a scenario is
determined.

1.8 The appropriate
power protection to
be used in a given
4. Defining and
determining
Computer System.

5. Defining and
determining
Motherboard,
CPU, and RAM.

6. Defining and
determining
adapter cards.

7. Defining and
determining
storage devices.

8. Defining and
determining
peripheral devices.

9. Defining and
determining the
cases and power
supplies.

Pattern
Identify the parallel
lines, transversal
lines, and skew lines
from the installed
components of PC
and show these by
locating, with
precautions, these
lines in the PC
components.












English
Constructing a
paragraph
Write a paragraph
following a flow
chart to show
sequence in
installing computer
components
need to know the
performance of
computer
components with
regards to its
weight, space
occupied, and
running
conditions?



























5 | P a g e

scenario is
determined.

1.9 Computer ports
and peripherals
being attached to
the ports are
identified.


Math
What is the
importance of
acknowledging the
price, system
requirements, and
rate of
performance of
peripherals in
computers?


Math
What properties of
points, lines, and
planes need to
consider in
preparing
peripheral devices
of PC?


Math
What is the
significance of
knowing the
different devices
of PC that can be
shared or can not
be shared in
networking?

English
Why do we need

6 | P a g e



to listen/read
carefully?

English
Why one must
have good
communication
skills in advertising
products?

LO 3. Install,
verify, and
upgrade
computer
components and
peripherals.

1.1 Computer
support and safety
best practices are
described.

1.2 Computer
components are
installed and
operation is
verified.



1.3 Safety
precautions are
observed at all
times

1. Recognizing
Safety and Best
Practices.

2. Installing
Components and
Verifying
Operation.

3. Installing
Peripherals and
Verifying
Operation.

Produce a unified
text by using
cohesive devices,
coordination and
subordination to
enhance clarity of
ideas, and the
appropriate micro-
discourse signals to
establish meaning
relationships


Math
Why is it
important to know
concrete examples
of lines in real life?










English
What is the
importance of
following the steps
in doing things

5 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : INSTALL AN OPERATING SYSTEM
MODULE TITLE : INSTALLING AN OPERATING SYSTEM

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
the function of
an operating
system and the
operating system
used.


1.1 Modes of an
operating system
are identified.

1.2 Common
operating systems
are identified.

1.3 The general
requirements for
selecting an
operating system
are identified.

1.4 An installation
method for an
operating system
are described and
selected.



1. Identifying the
Purposes of an
Operating System.

2. Identifying the
requirements of
an Operating
System.

3. Describing the
Operating System
Selection.

Y-1
Make qualitative
observations
given a situation
or material or
when watching
events.
Y-1
Describe the real
number system:
integers, rational
numbers,
irrational
numbers, real
numbers
Activate
background
knowledge to
better understand
the text











Science
Matching ratings
and task of
common devices.


Match the
capabilities and
ratings of devices to
the corresponding
task.




Math
Answer Activity
Technology
What is the
function of OS?






Science
How do you
match the specific
task with
appropriate
device?










Math

6 | P a g e

Worksheet
Identify what group
does each given
number belonging
to.



English
Activating the
schema
Relate ideas from
previous readings to
a given text


What are the
importance of
grouping
individuals
according to their
needs, properties,
and purpose?


English
Why are our
schemata essential
in understanding a
text?


LO2. Prepare
an operating
system for
participation in a
network


1.1 Pre-installation
steps for an
operating system is
described.

1.2 Requirements
for a computer to
participate in the
network are
described.




1. Describing OS
Installation
Methods

2. Preparing for OS
Installation

3. Configuring a
Computer for the
Network

4. Configuring
Computer Name.

5. Planning the
Network Name
and Network
Address.
Y-2
Use systems of
linear equations to
solve problems
(e.g. number
relations, uniform
motion, geometric
relations, mixture,
investment, work)
Produce a unified
text by using
cohesive devices,
coordination and
subordination to
enhance clarity of
ideas, and the
appropriate micro-
discourse signals
to establish
meaning
relationships








Math
Discussion
Give emphasis on
naming variables in
the problem relate
this to the naming
of computer when
connecting to a
network.

English
Flow chart making
Technology
Why do we need
to prepared an OS
in a network


Math
Why do we need
to use different
variables in
representing
quantities?





English
What is the

7 | P a g e



Construct a flow
chart to show
steps/sequence in
installing computer
components
importance of
following the steps
in doing things?

LO 3. Explain
the purpose of
operating system
patches.

1.1 The methods of
downloading and
installing updating
operating systems
are described.

1.2 The purpose of
an operating
system/application
patch/update is
described.
1.3 Current
operating system or
application version
is identified and
updated.



1. Explaining Why
and When to
Apply Patches.

2. Applying OS
Patches

3. Applying
Application
Patches and
Updates

Y-3
Manifest
knowledge and
skills in identifying
and measuring
plane and solid
figures and
applying these in
solving real life
problems
Adjust reading
speed based on
ones purpose for
reading and the
type of materials
read








Math Application
Identify the shortest
distance for a set of
computers to be
situated/placed in
the different
location of the
school.



English
Reading closely
Read to select
appropriate details
from a selection for
specific purposes
Technology
Why is it
important to
know the purpose
of OS patches?


Math
What is the
relationship of
the distance of
two persons in
communication?






English
Why do we need
to read closely?

8 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : CONNECT TO THE NETWORK
MODULE TITLE : CONNECTING TO THE NETWORK

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Explain
the basic
concepts of
networking.


1.1 The roles of the
basic components
in an information
network are
described.

1.2 The roles of
computers on a
network are
described.

1.3 The
characteristics of a
peer-to-peer
network are
described.

1.4 Topologies
between logical and
physical are
differentiated.




1. Defining what is
a Network.






2. Enumerating
the Benefits of
Networking.







3. Describing and
characterizing the
Basic Network
Components




Y-4
Discuss hour LASER
and fiber optics
had improved
telecommunication
.

Y-4
Explain and cite
application of
internal reflection,
diffraction,
interference and
polarization
Properties.











Y-1
Describe the real
number system:
integers, rational
numbers,
irrational
numbers, real
numbers.

Explain visual
verbal
relationships
illustrated in
tables, graphs,
information maps
commonly used in
context area texts










Science
Discussing the use
of LASER and fiber
optics in
communication

2. Discuss how
LASER and fiber
optics had
improved the
connectivity
between
computers.

3. Explain how total
internal reflections
are applied in fiber

Technology
What is
networking?





Science
1.What do you
think is the
reason why
fibers optics is
preferred as the
best medium in
connecting
communication
devices?


2.What property
of light is use in
fiber optic
technology


9 | P a g e





4. Explaining
Computer Roles in
a Network.

5. Describing and
differentiating
Network
Topologies





optics cable.

3. Explain how
diffraction and
interference of
signal were
eliminated in LASER
and fiber optics
telecommunication.

4 Explain how an
electronic device
transmitting and
receiving
information.






Math
Answer Activity
Worksheet
Identify what group
does each given
number belonging
to.


English
Elucidating
concepts
Explain topics
clearly and























Math
What are the
importance of
grouping
individuals
according to their
needs,
properties, and
purpose?

English
What is the

10 | P a g e

specifically with
illustrations and
schematic diagrams
in technology texts







benefit we get
when one is
aided with
tables,
illustrations or
schematic
diagrams in
explaining texts
in different
areas?


LO2. Describe
how
communication
occurs across an
ethernet
Network.



1.1 The source,
destination and
channel in an
Ethernet network
are identified.

1.2 Basic
characteristics of
Ethernet
communications are
described.

1.3 The purpose of
a logical network
address is
explained.

1.4 The function of
a hub and switch
and how it affects
collision domains
described.


1. Recognizing the
Source, Channel,
and Destination as
elements of
Communication.

2. Identifying the
Rules of
Communication.

3. Describing
Message
Encoding.

4. Illustrating
Message
Formatting.

5. Describing
Message Size.

6. Describing
Message Timing.
Y-4
Explain how
electronic
communication
devices work

Y-3
solve routine and
non-routine
problems
Explain visual
verbal
relationships
illustrated in
tables, graphs,
information maps
commonly used in
context area texts
























Science
1Transmitting and
receiving
information
through electronic
communication
devices.

2. Explain how
electronic
communication
devices work.

Technology
How does
communication
occur in an
Ethernet
network?





Science
How is
information
process in each
element of
communication
devices?







11 | P a g e

1.5 The operation of
a hub is described.

1.6 Switch that
forwards a frame
given a specific
source MAC
address, destination
MAC address, and
switch table is
determined.

1.7 The function
ARP is described.

1.8 The function of
a router described.

1.9 The concept of
the default gateway
is explained.




7. Comparing
Message Patterns.

8. Describing
Protocol Use in
Communication.

9. Emphasizing
Importance of
Protocols.

10. Understanding
the
Standardization of
Protocols.

11. Determining
Physical
Addressing.

12. Understanding
Ethernet
Communication.

13. Understanding
Identifying
Hierarchical
Design of Ethernet
Networks.

14. Identifying
Logical Addresses.









Math
Answer Activity
Worksheet
Decipher the given
puzzle by solving
routine and non-
routine problems in
geometry (use
different font
format and share
this codes through
network

English
Describing
illustrations
Explain illustrations
specifically through
schematic diagrams
in technology texts








Math
How do we
communicate
using numbers
and symbols in
math?








English
What is the
benefit we get
when one is
aided with
tables,
illustrations or
schematic
diagrams in
explaining texts
in different
areas?



12 | P a g e

15. Differentiating
Access and
Distribution Layers
and Devices.


16. Identifying
Access Layer.

17. Enumerate the
Function of Hubs.

18. Enumerate the
Function of
Switches.

19. Describing
Broadcast
Messaging.

20. Determining
Switch Behavior.

21. Comparing
MAC and IP
Addresses.

22. Describing
Address
Resolution
Protocol (ARP).

23. Identifying
Distribution Layer.




13 | P a g e

24. Enumerate
Function of
Routers.

25. Identifying
Default Gateway.

26. Analyzing
Tables Maintained
by Routers.


LO 3. Describe
the planning and
implementation
of a local
Network.


1.1 A prototype of a
small home or small
business network
using Packet Tracer
is build.

1.2 Linksys
connection is
described.

1.3 A PC host is
connected, an IP
address is
configured, NetBIOS
named and
configuration
verified.

1.4 A shared
network resource is
described; a
network drive to
share files is

1. Describing Local
Area Network
(LAN).

2. Adding Hosts to
Local and Remote
Networks.

3. Using the
Packet Tracer.

4. Planning and
Documenting an
Ethernet network.


Creating
Prototypes.

5. Identifying
Multi-function
Device.


Y- 3
Manifest
knowledge and
skills in
identifying and
measuring plane
and solid figures
and applying
these in solving
real life problems


Produce a unified
text by using
cohesive devices,
coordination and
subordination to
enhance clarity of
ideas, and the
appropriate micro-
discourse signals
to establish
meaning
relationships











Math Application
Identify the shortest
distance for a set of
computers to be
situated/placed in
the different
location of the
school.

English
Pictochart making
Construct a picto
flow chart to show
steps in installing

Technology
What is the
essence in
knowing the
planning and
implementation
of a local
network?

Math
What is the
relationship of
the distance of
two persons in
communication?




English
What is the
importance of
following the

14 | P a g e



mapped.

1.5 A computer's
MAC and IP address
are identify.


1.6 A default
gateway to a
network device is
assigned.

6. Connecting the
Linksys Router.

7. Sharing
Resources.

computer
components
steps in planning
things?

14 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : CONNECT TO THE INTERNET THROUGH AN ISP
MODULE TITLE : CONNECTING TO THE INTERNET THROUGH AN ISP

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Explain
how information
is sent to and
through an ISP.


1.1 Different ISP
connection options
are identified and
described.


1.2 Levels of
services offered by
an ISP are identified
and described.


1.3 Common
utilities to identify
data travel across
the Internet are
used.


1. Explain what the
Internet is.





2. Internet Service
Providers (ISPs)


3. The ISPs
Relationship with
the Internet




4. Options for
Connecting to the
ISP

5. ISP Levels of
Service

Y-4
Discuss how the
information
superhighway has
influenced the
affairs of daily
living.


Y-4
Differentiate
between digital
and analog
methods in
sending
information.
Y-3
Apply the
definition of
similar triangles to
derive the
Pythagorean
Theorem
Explain visual verbal
relationships
illustrated in tables,
graphs, information
maps commonly
used in context area
texts










Science
Discussing the
impact of the
internet to daily
living.

1. Discuss how
internet or
information
superhighway
affects our daily
life activities.

Differentiating
digital and analog
methods of
sending
Technology
How is
information sent
to and through
an ISP?



Science
What are the
uses of internet
in everyday life?


How did the
internet work to
facilitate those
activities?


What is the
difference
between sending
information
through analog
and digital

15 | P a g e

6. Importance of
the Internet
Protocol (IP)

7. How ISPs Handle
Packets


8. Forwarding
Packets Across the
Internet

information.


Differentiate the
two functions of
the modem in
internet
connection in
receiving digital
and analog
information.



English
Expounding ideas
Explain the main
point of an
informative text
thoroughly with
the aid of
illustrations and
schematic
diagrams

means?












English
What is the
significance in
using illustrations
and schematic
diagrams?

LO2. Compare
the components
and environment
of an ISP with
those of a home
network.



1.1 Devices in a
home network are
described.

1.2 Devices in an ISP
environment are
described.

1.3 Factors that

1. Internet Cloud

2. Devices in
Internet Cloud

3. Physical and
Environmental
Requirements

Arrive at a
consensus by
evaluating the
advantages and
disadvantages of a
shared information
in Technology










Technology
How do we
differentiate the
components and
environment of
an ISP with those
of a home
network?

English

16 | P a g e

should be
considered when
setting up an ISP or
business network
are described.

1.4 Cabling
requirements of
home and ISP
networks are
described.







English
Debate
Agreeing/disagreei
ng with assertions
and observations
made in radio
broadcast and
when sharing
information on
topics dealing in
Technology
What is the
significance of
knowing the pros
and cons of a
topic not known
to you?




LO 3.
Terminate and
implement
appropriately
twisted pair
cables in an
Ethernet LAN.


1.1 Principle types
of cables used in
networks are
described.

1.2 Categories of
UTP cables used in
Ethernet networks
are described.

1.3 Common uses
of coax cable and
the types common
terminations it uses
used are described.

1.4 Optical fiber
cables, their
common
terminations, and
its preferred usage
as compared to

1. Common
Network Cables

2. Twisted Pair
Cables

3. Coaxial Cable

4. Fiber Optic
Cables

5. Cabling
Standards

6. UTP Cables

7. UTP Cable
Termination

8. Terminating UTP
at Patch Panels and
Wall Jacks

Y-3
Derive the
equation of a line
given two points
of the line.

Convey information
using technological
aids like the
projectors, LCD,
Computer and the
internet



















Math
Discussion
Derive the
equation of a line
Technology
Why do we need
to terminate and
implement
appropriately
Twisted pair
cables in an
Ethernet LAN?










Math
To do a task,
why is it
important to
know where to

17 | P a g e

copper are
described.

1.5 Cable pinouts
and color codes for
Ethernet UTP cross-
over and straight
through cables are
identified.

1.6 UTP cabling best
practices and
installation
procedures are
described.

1.7 Straight through
and crossover UTP
cables
demonstrated.

1.8 Punch down
wires and terminate
at the patch panel
and wall jacks are
properly
demonstrated and
terminated.

1.9 Ethernet UTP
cables are tested
and common
cabling faults are
identified.


9. Cable Testing



10. Cabling Best
Practices

given two points
of the line using
terminal of a UTP
cables and assign
points on them





English
Role playing
Present a report
clearly and
specifically in the
class using their
learned skills in
Computer

start and where
to end for an
individual? Or
how will you
know if you are
about to finish
your task?


English
What is the
advantage of
presenting a
report utilizing
technological
aids?

18 | P a g e





18 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : IMPLEMENT IP ADDRESS IN NETWORK
MODULE TITLE : IMPLEMENTING NETWORK ADDRESSES IN NETWORK

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONT
ENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Apply the
hierarchical
addressing of
devices to support
communication
between
networks.



1.1 Structure of an
IPv4 address is
described.

1.2 Bits to decimal
and decimal to
binary are
converted.

1.3 Parts of the IP
address and their
purpose are
described.

1.4 Subnet mask
and its purpose
are described.

1.5 Number of
hosts from a given
IP address and
subnet mask is
calculated.

1.6 Private and

- Examining the
purposes of IP
Address

- Describing IP
Address Structure

- Investigating
parts of an IP
Address

- Relating how IP
Address and Subnet
Mask Interact

- Differentiating IP
Address Classes and
Default Subnet
Masks

- Classifying Public
and Private IP
Addresses



Y-4
Understand how
logic gates are
used in common
electronic
devices

Y-3
Solve problems
using
Pythagorean
Theorem.

Convey
information using
technological aids
like the projectors,
LCD, Computer
and the internet.











Science
Using logic gates

1. Explain how AND
gates are used in
computers.

2. Determine the
output signal of the
AND gate from the
given inputs signal.


Math
Group Work
Find Pythagorean
Technology
How is hierarchical
addressing of
devices related to
communication
between
networks?

Science
When can an AND
gate give on
output of 1 and 0?










Math
How can we say
that a particular
number is

19 | P a g e

public addressing
is being used and
described.

1.7 Unicast,
broadcast,
multicast
addresses and
messaging are
differentiated.


- Identifying
Unicast , Broadcast
and Multicast
Address







numbers between 0
to 255



English
Role playing
Present a report
clearly in the class
using learned skills
in Computer

especial?




English
What is the
advantage of
presenting a
report utilizing
technological aids?

LO2. Configure,
and verify the
methods of
obtaining an IP
address.



1.1 Methods of
assigning an IP
address are
described.

1.2 DHCP services
are located and
described.

1.3 DHCP
operation on the
GUI-based home
multi-function
device is
described,
configured and
verified.




- Assigning Static
and Dynamic
Addresses

- Configuring
DHCP and DHCP
Servers

- Identifying
Network
Boundaries and
Address Space

- Assigning
Addresses


Elicit and give
information using
different type of
questions to seek
clarification and
verification to
responses made













English
Panel discussion:
Single out point to
persuade by
clarifying and
verifying

Technology
How do we
configure?

What are the
methods of
obtaining an IP
address?



English
Why do we need
to clarify and
verify things
before believing
it?




LO 3. Examine

1.1 Purpose and

- Translating
Y-1
Translate verbal

Explain how things


Technology
Why do we need

20 | P a g e



NAT settings on a
home or small
business network.
function of NAT
are described.

1.2 Scenarios
where NAT is
required are
identified.

1.3 Settings for a
router to
configure NAT are
applied.


Network Addresses

phrases to
mathematical
expressions and
vice versa.
are done using
transitional
devices









Math
Individual Work
Translate the given
mathematical
expression in verbal
phrases or vice
versa and send the
answers through
email.

English
Flow chart making
Sequence an event
or a process using
flow charts
to examine NAT
setting on a home
or small business
settings?


Math
Do we really need
to understand
other culture and
language?






English
Why are
flowcharts
important?

21 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : USE NETWORK SERVICES TO SHARE RESOURSES BETWEEN SERVER AND CLIENT
MODULE TITLE : USING NETWORK SERVICES TO SHARE RESOURCES BETWEEN SERVER AND CLIENT

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CONT
ENT

LEARNING COMPETENCIES

LEARNING
COMPETENCIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Establish
client server
network
relationship

1.1 The services
provided by a
server are
described.

1.2 Common
services provided in
the client/server
environment are
identified.

1.3
Request/response
processes in client
server transactions
are described


- Describing
Client/Servers and
their Interactions

- Creating Client
Server Relationship

Y-4
Describe
communication in
terms of energy
transfer and
transformation

Interpret and
transcode
information from
linear to non-
linear text and vice
versa








Science
Describing and
Tracing energy
transfer and
transformation

1.Describe the
energy transfer and
transformation
from one computer
device to another as
communication is
processed.

2. Trace the energy
transformation
from a computer to
printer.
Technology
What is the
significance of
establishing
client server
network
relationship?

Science
What are the
energy
transformations
that took place
as information is
passed from one
computer to
another?



What devices are
involved in
transforming and
transferring
energy from a
computer to a

22 | P a g e



English
Writing a
descriptive
paragraph
Write a descriptive
paragraph to
explain clearly an
information from a
graphic text to non-
linear text
printer?



English
How important is
a graphic text
(table, flow
chart) to you?

LO2. Examine
the role of
protocols in
supporting
communication
between server
and client
processes.


1.1 Protocols as
they relate to
network services
provided are
described.

1.2 Operation of
communications
using TCP and
communication
using UDP is
compared.

1.3 Function of a
port is described.

1.4 Well-known
port numbers are
identified.

1.5 Purpose and
operation of

1. Describing the
Role of Protocols in
Client Server
Communication

2. Using TCP and
UDP Transport
Protocols

3. Using TCP/IP
Port Numbers

4. Using Domain
Name Services
(DNS)

5. Configuring Web
Clients and Servers

6. Configuring FTP
Client and Servers


Y- 3
Manifest ability to
solve practical
problems involving
types of
quadrilaterals and
their properties
and the conditions
that guarantee
that a
quadrilateral is a
parallelogram.

Convey
information using
interactive media
as aid








Math
Compare and
Contrast
Use the domain of
Ask Dr. Math and
other mathematics
domain in gathering
information about
types of
quadrilateral.
Compare the data
you gather from the
domain in quality of
data,
comprehension,
Technology
Why is there a
need to examine
the protocol of
the client and the
server?

Math
How you will
know if the given
domain will give
you ideas about
quadrilaterals?











23 | P a g e

Internet
applications are
described.



7. Configuring
Email Clients and
Servers

8. Configuring IM
Clients and Servers

9. Configuring
Voice Clients and
Servers

10. Using assigned
Port Numbers

examples given, and
diagram given.

English
Expounding an Idea
Explain different
kinds of protocol to
get information in
the internet






English
Why are
protocols
important?

LO 3. Apply
the purpose of
the layered
model.

1.1 Different
protocols that
define the
processes
interacting on a
host are described.

1.2
Encapsulation/de-
encapsulation
processes in
network
communication are
described.

1.3 Structure and
purpose of the OSI
model are
described.


1. Explaining the
Layered model and
Protocols

2. Relating Protocol
Interaction


3. Simulating
Protocol Operation
of Sending and
Receiving a
Message

4. Applying the
Open Systems
Interconnect Model




Y- 3
Apply inductive
and deductive
skills to derive the
properties of the
diagonals of
special
quadrilaterals.


Make a write up of
ideas presented in
tables











Math
Group Activity
Make a proof
among diagonals of
special
quadrilaterals,
reasons and
statements are
written in the strips
of paper. Scan these
pieces of paper
Technology
Why do we need
to know the
purpose of the
layered model?




Math
Why do we need
to following
instructions
correctly and
carefully in doing
task?






24 | P a g e



1.4 Purpose and
structure of
addressing at the
different OSI layers
are delineated.

1.5 The OSI model is
used to describe
network
communication.






















from one computer
and send to another
computer for them
to be arranged in
the correct
sequence.

English
Writing a paragraph
to explain a topic in
Computer with the
aid of tables









English
Why are tables
or diagrams
essential in
writing a
paragraph?

24 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : PLAN, DESIGN AND INSTALL A WIRELESS NETWORK
MODULE TITLE : PLANNING, DESIGNING AND INSTALLING WIRELESS TECHONOLGY

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Evaluate
characteristics of
wireless
networks.

1.1 Benefits and
shortcomings of
wireless networks
are described.

1.2 Major
categories of
wireless networks
are described.



- Classifying
Wireless
Technology Devices


- Analyzing the
Benefits and
Limitations of
Wireless
Technology

- Identifying the
types of Wireless
Networks and Their
Boundaries

Y-4
Discuss the
different regions of
electromagnetic
spectrum, their
properties and
uses.

Y-4
Explain how radio
communication
devices work
Y-1
Solve problems
involving
measurement.
Y- 4
From a given
statistical data
draw conclusions.








Explain and
analyze
information used
in context area
texts









Science
Using
electromagnetic
waves in wireless
communication

1. Discuss the
characteristics of
the different
regions of the
electromagnetic
spectrum

2. Explain the
elements of a Radio
Communication
System.


Technology
When do we say
that a wireless
network is more
important?

Science
How do
electromagnetic
waves facilitate
wireless
communication
among computer
in a network.

In what way does
communication in
wireless computer
network similar to
radio
communication

Math
Why is there a
need to know the
distance and

25 | P a g e

Math
Data Gathering
Measure distance
from a wireless
router the speed, in
kbps/mbps, to
different place in
the school. Convert
this distance in
centimeters and/or
decimeters. Find
out the effect of
some
infrastructures to
the bandwidth
receive by the
device used.


English
Outlining
Organize
information
through outlining as
illustrated in
different context
area texts




infrastructures
around you when
connecting from a
wireless router?











English
What benefit can
we get in
outlining?


LO2. Design
setup of devices
and operation of

1.1 Common
wireless LAN
components are

- Applying
Wireless LAN
Standards

Y-4
Describe how radio
signals are

Use cohesive
devices to
describe the

Science
Using
electromagnetic

Technology
Why do we need
to differentiate

26 | P a g e

WLANs.

identified and
described.

1.2 Infrastructure
and ad-hoc modes
are compared.

1.3 SSID in WLANs is
used.


- Identifying
Wireless LAN
Components

- Authenticating
WLANS and the
SSID

- Setting the
Wireless Channels

- Configuring the
Access Point

- Configuring the
Wireless Client

- Setting security
considerations why
people attack
WLANs

- Limiting Access
to WLAN

- Encrypting on a
WLAN

- Filtering Traffic
on a WLAN

generated
transmitted and
received.
steps in
performing a
work to be done.
waves in wireless
communication





Science
Describe how radio
signals are
generated
transmitted and
received, in a
wireless computer
network.


English
Flow chart making
Create a flow chart
to show the steps
and order of doing
things










infrastructure and
ad-hoc modes?



Science
How do network
devices generate,
transmit and
received radio
wave in wireless
computer
network.

English
Why are flow
charts and
cohesive devices
important in giving
steps?


LO 3. Solve

1.1 Wireless LAN

- Planning the

Y- 2

Use previous


Technology
Why do we need

27 | P a g e

wireless security
issues and apply
mitigation
strategies.
attacker and how
they attack is
described.

1.2 General
methods used to
secure a WLAN are
described.

1.3 Methods of
authentication used
to secure a WLAN
are compared.

1.4 Methods of
encryption, used to
secure a WLAN are
compared.

WLAN



- Installing and
Securing the
AP



- Backing Up and
Restoring
Configuration
Files

- Updating the
Firmware







Solve linear
equations in two
variables.
Y-4
Find the roots of a
quadratic
equation.
texts as scaffold
for processing
information in a
given text









Math
Answer Activity
Worksheet
Solve given set of
linear equations in
two variables using
two methods (Y-2:
substitution,
elimination,
graphing, or
determinants; Y-4:
graphing,
completing square,
factoring, or
quadratic formula).
Verify the answer
by showing the
other method.
Discuss: Relate this
activity in
securing/authentica
tion in wireless LAN.

English
Problem solving
Filling out problem-
solution frames to
show the solutions
to know wireless
security issues?




Math
What is the
importance of
using other
method in solving
problems?





















English
What is the

28 | P a g e



of problem in a
given situation
significance of
identifying the
problem in a given
situation?








27 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : SECURE THE NETWORK ENVIRONMENT
MODULE TITLE : SECURING THE NETWORK ENVIRONMENT

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CON
TENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Identify
various
networking
threats and
attacks.

1.1 Risks and
sources of network
intrusion are
described and
identified.

1.2 Social
engineering and
phishing are
described.

1.3 Virus, worms,
and Trojan horses
are compared and
contrasted.

1.4 Denial of Service
and brute force
attacks are
described.

1.5 Spyware,
tracking cookies,
adware, pop-ups,
pop-unders, and

- Determining
the risks of
Network
Intrusion

- Locating the
sources of
Network
Intrusions

- Describing
Social
Engineering
and Phishing

- Identifying
Virus, Worms,
and Trojan
Horses

- Protecting
against Denial
of Service and
Brute Force
Attacks

Y-4
Discuss how the
information
superhighway
has influenced
the affairs of
daily living.
Read closely to
derive information
from various text
types and sources
using DVD-ROM,
Internet etc











Science
Securing and
Protecting
Technology

Discuss the impact
of security lapses in
computer network.









Technology
Why is it
important to know
different
networking
threats and
attacks?


Science
What are the
effect of security
lapses in internet
connection to
mans daily life?












28 | P a g e

spam are described.




- Eliminating
Spyware,
Tracking
Cookies,
Adware and
Pop-ups

- 7. Avoiding
Spam






English

Getting the main
idea
Extract accurately
the required
information from
sources read and
rejecting irrelevant
details




English
Why do we need
to read closely?




LO2. Apply/use
common security
applications and
products.


1.1 Common
network security
procedures and
symptoms are
defined.

1.2 Software
commonly used to
prevent spam,
spyware, and
adware is
described.

1.3 Types of
firewalls and how
they are used are
described.

1.4 Firewalls where

- Applying
common
security
measures

- Using Updates
and Patches

- Using Anti-virus
software

- Using Anti-
Spam

- Using Firewall





Y-2
Demonstrate
knowledge and
skill in simplifying
and performing
operations on
rational algebraic
expressions and
apply these in
solving problems

Use past
experiences as
scaffold to solve
problems







Math
Puzzle
Decipher a word
from performing
operations on
rational algebraic
expressions so that
this word can be
entered in the
password field for
the computer
opens. To make it
more exciting,
Technology
What are the
common security
applications and
products?

Math
How we will use
algebraic
expressions in
making our
computer security
complex?








29 | P a g e

they are normally
placed are
described.

answer the problem
in a given time.

English
Activating the
schema
Relate, identify and
solve problems in
different areas
especially in
technology




English
What are the
benefits that we
can get in
activating our
priori in solving
problems





LO3.
Implement
attack mitigation
strategies.


1.1 A network
security
vulnerability
analysis is
performed.

1.2 Wired and
wireless security
best practices are
implemented.

1.3 Firewall
functions on a
router are
configured.



- Performing
vulnerability
analysis

- Testing/
applying best
practices












Y- 4
Find the measures
of central
tendency using
ungrouped data.



Utilizing past
experiences as
scaffold to solve
problems








Math
Discussion
Create situations in
where measures of
central tendencies
can be used.
Explain using the
concept in firewall
functions where
some situations can
be accepted by at
least two measures
or some situations
Technology
Why one must
implement attack
mitigation
strategies?

Math
Why do we need
to validate
information that
we gather?










30 | P a g e



are not applicable
by any of them.

English
Utilizing the
Schema
Use the schema as
scaffold in
Identifying and
solving problems in
different areas
especially in
technology






English
What are the
benefits that we
can get in
activating our
priori in solving
problems?



30 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : TROUBLESHOOT NETWORK RELATED ISSUES
MODULE TITLE : TROUBLESHOOTING NETWORK RELATED ISSUES

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Apply
troubleshooting
process
standards

1.1 Information
about a problem is
gathered.

1.2 Troubleshooting
methodologies are
compared and
contrasted.

1.3 Use of human
senses in the
network
troubleshooting
process is
described.



- Troubleshootin
g using
network
utilities

- Gathering
Information

Applying varied
approaches to
troubleshooting

Y-1
Discuss the
importance of
scientific values in
decision making
and problem-
solving in daily
life.

Y-1 to 4
Solve routine and
non-routine
problems.

Adjust and vary
reading speed and
style to suit the
text, ones
background
knowledge and
purpose in
reading, and the
content of the
material read.













Science
Problem solving
and
troubleshooting

Discuss the
importance of
scientific values in
troubleshooting
problems with
computers in a
network.

Math
Technology
How do we
apply
troubleshooting
process
standards?






Science
How do the
steps in
troubleshooting
computers
similar with the
problem solving
steps in
science?




Math

31 | P a g e

Listing
List down all
conditions of the
word problem that
will lead to the
answer what is
being asked in the
problem.
Eliminate those
condition not
necessarily can be
used in the
problem.

English
Reading closely
Read to get
explicitly and
implicitly stated
information

What is the
consequence of
identifying
needed
conditions in
solving
problems







English
Why do we
need to read
closely?


LO2. Identify,
describe, and
correct common
network
problems.


1.1 Common
software utilities
and use in
troubleshooting
network problems
are described.

1.2 Common
physical problems
and recommended
solution are
identified.


- Detecting
physical problems

- Using software
utilities for
troubleshooting
connectivity

- Troubleshooting
using IPconfig




Y-4
From a given
statistical data
make
recommendations/
decisions.

Transcode
information from
linear to non-
linear texts and
vice-versa












Math
Making
Technology
How do we
correct
common
problems?







Math
Why do we

32 | P a g e

1.3 Cabling and
connection issues
are described and
troubleshot.

1.4 Reasons why a
wireless hosts
cannot connect to
the AP are
described.

1.5 Association and
authentication
issues within a
wireless network
are identified.

1.6 DHCP issues on
a wired or wireless
network are
identified.

1.7 Connectivity
between the home-
based network
router and the ISP
are tested.

1.8 Importance of
having and creating
network
documentation
as a part of the
troubleshooting
process is


- Troubleshooting
using Ping

- Troubleshooting
using Tracert

- Troubleshooting
using Netstat

- Troubleshooting
using Nslookup .

Decisions/Compar
e and Contrast
Differentiate the
use of instant
messaging (pure
text), Bluetooth,
Infrared, and
wireless network
sharing in
answering set of
problems.
Compare the
factors through
their distances,
time of transfer,
and rate of
transfer.

English
Making an outline
to sum up ideas
taken from or to
be expanded into
texts
need to gather
sufficient data
before making
decisions?















English
When do we
use outlines?


33 | P a g e

described.


LO3.
Investigate
common
practices when
interacting with a
helpdesk.


1.1 Benefits and
common contents
of documentation
and preparation for
dealing with a
helpdesk are
described.

1.2 Common
sources of help are
described.



- Addressing
Common Issues

- Identifying
Connectivity Issues

- Understanding
LED indicators

- Solving
Connectivity
problems

-
Troubleshootin
g Radio Problems
in WLAN
-
Troubleshootin
g Association &
Authentication on
a WLAN

- Analyzing DHCP
issues

- Troubleshooting
the ISR to ISP
Connection

-
Troubleshootin

Y-1
Measure length,
time, and other
units.
Y-4
From a given
statistical data
make
recommendations/
decisions.

Speak clearly and
spontaneously
adapting ones
speech to
situations,
circumstances and
people addressed













Math
Making
Decisions/Compar
e and Contrast

Differentiate the
use of instant
messaging (pure
text), Bluetooth,
Infrared, and
wireless network
sharing in
answering set of
problems.
Compare the
factors through
their distances,
time of transfer,
and rate of
transfer.
Technology
Why do we
need to know
common
practices when
interacting with
a helpdesk?

Math
Why do we
need to gather
sufficient data
before making
decisions?


34 | P a g e



g and the
Helpdesk




- Performing the
documentation

- Using Outside
Sources for Help

- Using the
Helpdesk


1 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : EXPLORE THE INTERNET
MODULE TITLE : EXPLORING THE INTERNET

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
the Internet and
the means by
which it serves
the needs of
individuals and
organizations.

1.1 Detailed
examples of ways in
which individuals
and organizations
utilize the Internet
are provided.

1.2 The internet
standard" is
defined.

1.3 Examples of
how standards
facilitate Internet
communication are
provided.

1.4 The use of
standards that
enable individuals
and organizations
to share
information,
resources, and
service is explained.

1. What is the
internet?

2. The Internet
and Standards

3. ISP and ISP
Services

Y4
Discuss how
information
superhighway
has
influenced
the affairs of
daily living
Y-4
Collect
statistical data
and organize in
a table/chart
Use appropriate
language,
idioms,
figurative
language,
analogy to
express ones
ideas clearly











Science
Discussing how the
internet is use in physics

Discuss how to utilize the
internet in accessing
information in physics
research.


Math
Gathering and
Presenting of Data
Collect and record
aspects of the daily
weather from Internet
weather sources (PAG-
Technology
Why is there a need to
provide means of
connection between
individuals and
organizations?

Science
How could you be
assured that the web
site on physics
research gives you a
reliable and valid
information?





Math
How do individuals
and organization
utilize the internet to
gather data? How
these data help them
in decision making?

2 | P a g e

ASA). Also investigate
regional weather and use
a spreadsheet to record
and make chart of data.


English
Conveying message
Give information clearly
and specifically from the
internet









English
Why is it necessary to
use appropriate
language, analogy to
express ones idea?


LO2. Describe
the basic
structure of the
Internet and the
way in which
Internet users
gain access to
Internet services.


1.1 The ISP and the
services it provides
to Internet users
are described.

1.2 Common ways
in which home
users, small offices,
and large
organizations
connect to an ISP
are explained.

1.3 The Internet
hierarchy, its major
components, and its
interconnections
are described.

1.4 Ping and trace

1. ISPs

2. Delivering
Internet Services
to End Users

3. Internet
Hierarchy

4. Using Tools to
Map the Internet

Y-1
Perform
fundamental
operations on
integers.

Read intensively
to select
appropriate
details for a
specific purpose
from a given
text






Math
Answer Activity
worksheet
Answer given worksheet
on numerical expressions
and the follow the
hierarchy of operation
(PEMDAS). Explain that
the hierarchy of internet
is the same pattern with
operation, from the inner
going to outer.


English
Technology
Why is there a need
to know the basic
structure of an
Internet?

Math
Which of the following
operation is the least
easy to perform?












3 | P a g e

route commands
are used to reveal
the structure of the
Internet given a
series of destination
URLs.

Highlighting points
Explain key points from a
given text
English
Why is it necessary to
read intensively?





LO 3. Describe
the technological
resources, roles,
and
responsibilities
of the ISP.


1.1 The
fundamental
technologies
essential to a
functioning ISP are
described.

1.2 The importance
of scalability to an
ISP and simple
strategy for
achieving it is
explained.

1.3 The common
roles an ISP may
perform in
providing Internet
access to customers
are described.





1.4 The
responsibilities

1. ISP Connectivity

2. ISP
Requirements

3. Roles and
Responsibilities
within an ISP

Y-3
Apply
geometric
constructions.
Activate
background
knowledge to
better
understand the
text



















Math
Constructions
Use the requirements in
constructions (ruler and
compass) in geometry,
draw what is being
asked to construct
following the basic steps
in making angles and
arcs.

Technology
Why is network
management,
including planning and
provisioning of new
equipment and
circuits, adding new
subscribers, network
repair and
maintenance, and or
network connectivity
are the main focus of
ISP services?


Math
Is it essential to follow
the procedure in
geometry
constructions?







English

4 | P a g e



associated with
each role of an ISP
are explained.

English
Activating priori
Relate ideas from
previous readings to a
given text

Explain concepts
highlighting its
significance to ones life.

Why are our sch
emata essential in
understanding a text?

What is the
significance in
explaining essential
concepts?

4 | P a g e



QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : Perform Help Desk Duties
MODULE TITLE : Performing Help Desk Duties

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING ACTIVITIES


LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
the various roles
of help desk and
installation
technicians.


1.1 The functions of
the help desk
technician and the
way in which these
functions are
organized at the ISP
are described.

1.2 Sound
interpersonal,
customer service,
and incident
management
procedures
performed by help
desk technicians are
described.

1.3 Help desk
records and
incident
management tools
and the process of
problem escalation
are described.

1. Help Desk
Technicians

2. ISP Help Desk
Organization

3. Roles of ISP
Technicians

4. Interacting with
Customers

Y1
Identify the
problem collect
data and
present them in
appropriate
format.

Make
generalization/c
onclusion
Y-4
Demonstrate
ability to apply
trigonometric
functions, laws of
sine and cosine to
solve problems
Speak clearly and
spontaneously
adapting ones
speech to
situations,
circumstances and
people addressed












Science
Applying scientific
method

Identify a problem
through a data
obtained by means
of interview and
conversation.

Making conclusion
on the information
obtained and
implementing
solution.

Technology
How does a
helpdesk
technician
determine if
solutions are
provided to the
satisfaction of the
customer?

Science
What type of
questions should
be asked the
customer so that
the problem could
be identified and
solution be
implemented?








5 | P a g e



1.4 The steps
required to
complete a
successful onsite
customer service
visit are listed.


Math
Gathering
Information
Explore bridges and
the various forces
that affect their
stability by
interviewing
organizations or
professionals
inclined in bridges.
Investigate different
kinds of bridges and
present
computations using
trigonometric
functions. Finally,
create a model of a
cost-effective
bridge under
certain constraints.




English
Role playing
Student is expected
to role play
situation in a call
center where he
assists the customer
on-line


Math
What is the
importance of
querying the right
person in asking
for help?
























English
Why do we need
to speak clearly in

6 | P a g e


a conversation?



LO2. Use the
OSI model to
troubleshoot
basic network
issues .

1.1 The purpose
and structure of the
OSI model as it
relates to
networking are
described.

1.2 Devices,
protocols and
applications are
placed at the
appropriate layer of
the model.

1.3 The process of
encapsulation
including the PDU
at each layer is
explained.

1.4 Common
network problems
are troubleshoot.

1.5 Common
network user
problems
encountered by ISP
help desk
technicians, their
common causes,

1. OSI Model

2. Using the OSI
Model

3. OSI Model
Protocols and
Technologies

4. Troubleshooting
using the OSI Model

5. ISP
Troubleshooting

6. Help Desk
Troubleshooting
Scenarios

7.Creating and
Using Help Desk
Records

8.Customer Site
Procedures

Y-4
Find the zeros of
polynomial
functions of
degree greater
than 2 by factor
theorem, factoring
and synthetic
division
Read closely to get
key points in
technology for
specific purposes.












Math
Problem Solving
Solve the roots of
polynomial function
using factor
theorem , factoring
or synthetic
division, check the
answer using
graphing calculator
capable of solving
polynomials (e.g.
Casio G-Plus and TI
calculators). Use
also the Descartes
Rules of Sign to
verify if the answers
are correct.

English
Problem Solving
Fill in the table with
Technology
How is the OSI
model related to
the basic problem-
solving procedure
used in
networking?


Math
What information
and strategies
would you use to
solve a multi-step
problem?
















English

7 | P a g e
















and potential
solutions are
named.
problems based on
the given reading
material and
identify possible
solutions
Why do we need
to read closely?



7 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : PLAN A NETWORK UPGRADE
MODULE TITLE : PLANNING A NETWORK UPGRADE

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING ACTIVITIES


LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
the role of the
ISP or managed
service provider
in planning and
designing the
upgrade of a
client's network.


1.1 The
information that
should be
gathered during
a site survey of a
customer
network is listed.

1.2 Physical and
logical network
topologies are
compared and
contrasted.

1.3 Network
inventory and
logical diagram
are created.

1.4 The
importance of
planning when
beginning a
network upgrade
is described.

1. Documenting
the Existing
Network

2. Site Survey

3. Physical and
Logical Topologies


4. Network
Requirements
Documentation

Y4
Tracing Electrical
Connection

Trace electrical
connections from
the meter to
appliances.
Explain
information
obtained from the
internet and other
sources through
various reading
techniques








Science
Tracing electrical
connections

Trace electrical
connections in
documenting
existing network.


English
Comparing and
contrasting
Differentiate
different
information
gathered from a
text
Technology
What are the
factors to consider
before an upgrade
can be properly
designed?

Science
Why is it important
to trace the
electrical
connections of
computers before
upgrading a
network?

English
Why one must have
to acquire reading
techniques?



8 | P a g e



LO2. Evaluate
cabling and
facilities for
network
upgrades.


1.1 Four common
types of network
cabling are
described.

1.2 Three types
of twisted pair
cables are
described.

1.3 The
components of
structured
cabling are
described.

1.4
Telecommunicati
on distribution
facilities, or
wiring closets are
described


1. Planning

2. Network
Upgrade Planning
Phases

3. Physical
Environment

4. Cabling
Considerations

5. Structured
Cable

Y-4
Analyze the effects
on the graph of
changes in a, h
and k in f(x) = a(x-
h)
2
+ k
Get information
from different
electronic media,
the internet and
audio-video
recording

Math
Graphing
Write the steps in
graphing quadratic
functions and make
a plan so that the
effects of the
parameters of the
function are visible
in the graph. Check
the graph using a
spreadsheet or
graphing calculator.

English
Data gathering
Congregate
information in a
given topic using
Reading Skills

Math
What are the tools
needed to graph
quadratic
functions?













English
How does one
benefit from
electronic media,
the internet and
audio-video
recording?

English
Why must one
acquire the reading
skills in gathering
information?




9 | P a g e


LO 3.
Recommend
networking
equipment to
fulfill customer
requirements.


1.1 Managed and
in-house network
services and
maintenance
arrangements
are compared
and contrasted.

1.2 LAN switches
are evaluated to
fulfill user
requirements.

1.3 Routers are
evaluated to
fulfill user
requirements.

1.4 Catalyst 2960
family of network
switches is
described.

1.5 Reliability in
the context of
networking is
defined.

1.6 Availability in
the context of
networking is
defined.

1.7 Methods of

1. Purchasing and
Maintaining
Equipment

2. Purchasing
Equipment

3. Selecting
Network Devices
4. Selecting LAN
Devices

5. Selecting
Internetworking
Devices

6. Networking
Equipment
Upgrades

7. Design
Considerations

Observe
conversation
strategies in face
to face extended
oral
communications











English
Conveying message
Forestall and repair
communication
breakdown using
verbal and non-
verbal strategies
Technology
How does the
maximum
performance of
each of the
networking device
be achieved?

English
Why are strategies
in communication
essential?


10 | P a g e















providing fault
tolerance to a
network are
described.

1.8 Examples of
network devices
that require IP
addresses are
given.


11 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : PLAN THE ADDRESSING STRUCTURE
MODULE TITLE : PLANNING THE ADDRESSING STRUCTURE

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES


LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1.
Implement an
IPv4 addressing
scheme to meet
network
requirements.


1.1 Custom classful
subnet masks given
a network address
and user
requirements are
created.

1.2 Requirements
for enabling hosts
on different subnets
to communicate are
explained.

1.3 Addressing
design is created
and applied.

1.4 Common
problems
associated with IP
addressing and host
configurations are
identified and
corrected.


1. IP Addressing in
the LAN

2. Review of IP
Addresses

3. Subnetting a
Network

4. Custom Subnet
Masks

5. VLSM and
Classless Inter-
Domain Routing
(CIDR)

6. Communicating
Between Subnets

Y4
Explain how radio
communication
devices work
Y-1
Describe the real
number system:
integers, rational
numbers, irrational
numbers, real
numbers.
Y-3
Solve problems
using Pythagorean
Theorem.
Express thoughts
and feeling
effectively in
writing a process
for specific
purposes












Science
Using
Communication
technology in
Physics

Explain how
computers with
specified IP
address, able to
communicate with
each other
through radio
communication.
Math
Answer Activity
Technology
What aspects of
communications
on an internet
work are the IP
addressing scheme
most important?

Science
What is the
significance of
assigning IP
address to
computers in a
network so that
they can
communicate with
each other?





Math
What are the
importance of

12 | P a g e

Worksheet
Identify what
group does each
given number
belonging to.


Math
Group Work
Find Pythagorean
numbers between
0 to 255








English
Procedure writing
Write a procedure
to show how
things are done
using cohesive
devices

grouping
individuals
according to their
needs, properties,
and purpose?

Math
How can I use
what I know about
number
relationships to
develop efficient
strategies for
finding
Pythagorean
triples?


English
Why are cohesive
devices
important?







LO2. Explain
how Network
Address
Translation (NAT
and PAT) are
used in a

1.1 Advantages and
disadvantages of
NAT are explained.

1.2 NAT address
types are identified.

1. NAT and PAT

2. Basic Network
Address
Translation (NAT)

Give details or
examples to
further strengthen
the points given






English
Technology
How does the
router accomplish
NAT?

English
What can details

13 | P a g e










network.


1.3 Operation of
NAT and PAT is
explained.

1.4 IPv6 addresses
and how they solve
issues involving NAT
are described.

3. IP NAT Terms

4. Static and
Dynamic NAT

5. Port-based
Network Address
Translation (PAT)

6. IP NAT Issues

Brainstorming:
List scaffolds to
elucidate
important points
and examples do
in clarifying a
point?




13 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : CONFIGURE NETWORK DEVICES
MODULE TITLE : CONFIGURING NETWORK DEVICES

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES


LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Install a
Cisco Integrated
Services Router
(ISR).


1.1 ISR is defined.

1.2 Major external
features of an ISR
are described.

1.3 Cisco IOS
software and
optional features
are defined.

1.4 Items that are
included with a new
ISR are described.

1.5 The resources
required to install
new ISR are
described.

1.6 Cisco ISR is
physically set up
and powered up.

1.7 The boot up of a

1. Initial ISR
Router
Configuration

2. ISR

3. Physical Setup
of the ISR

4. Bootup Process

5. Cisco IOS
Programs

Y-4
Understand how
logic circuits are
used in common
electronic devices
Y-4
Differentiate a
function from a
mere relation

Use cohesive
devices to show a
method or a
process














Science
Using logic gates

Explain how logic
circuits are used in
electronic devices
which are detectors
and transmitters of
radio waves


Math
Gathering
Information
Technology
What ISR routing
function/feature
makes it ideal for
small to medium-
sized businesses
and for ISP-
managed
customers?

Science
How do logic gates
are used in
electronic devices
which are
detectors and
transmitter of
radio waves





Math
What are the
different ways of

14 | P a g e

Cisco ISR are
monitored and
checked for errors.

Differentiate the
purpose of hub,
switch, and router.
Using mapping and
function notation
show that these
devices follows the
one-to-one and
onto relation.



English
Picto flowchart
making
Making a picture
flow chart to
show/sequence a
process

representing
patterns and
relationships?












English
Why are flow
charts and
cohesive devices
important?


LO2. Explain
different
methods of
configuring Cisco
devices.


1.1 In-band and
out-of-band device
managements are
compared and
contrasted.

1.2 Cisco IOS and
Cisco SDM are
compared and
contrasted.

1.3 Device
configuration files

1. Using Cisco SDM
Express and SDM

2. Cisco SDM
Express

3. SDM Express
Configuration
Options

4. Configuring
WAN Connections
Using SDM Express
Y-4
Solve problems
involving linear
functions.
Employ alternative
ways(description,
comparison and
contrast etc.) in
expressing speech
acts and functions









Math
Evaluation
Use different
methods in solving
given linear system.
Technology
How do CLI and
GUI affect the
level of
configuration of
Cisco devices?



Math
What is the most
appropriate
mathematical
method to be used

15 | P a g e

are displayed,
described and
erased.

1.4 Importance of
documenting device
configurations is
explained.


5. Configuring NAT
Using Cisco SDM











English
Mini talk show:
Explain the different
methods of
configuring Cisco
devices with the aid
of power point
in a particular
problem?

English
Why do we need
to use alternative
ways to express
our points?





LO 3. Configure
an ISR using SDM
Express and
SDM.


1.1 Compare and
contrast SDM and
SDM Express.

1.2 Explain the
configuration
functions available
with SDM Express.

1.3 Start SDM
Express.

1.4 Complete basic
configuration tasks
using SDM Express.

1.5 Configure a LAN
interface with SDM
Express.

1.6 Configure a
WAN interface with

1. Configuring a
Router Using IOS
CLI

2. Command Line
Interface Modes

3. Using the Cisco
IOS CLI

4. Using Show
Commands

5. Basic
Configuration

6. Configuring An
Interface

7. Configuring a
Default Route

Differentiate the
antagonist and the
protagonist of the
story through
comparison and
contrast












English
Characterizing
Differentiate the
characters in a story
using the Venn
diagram

Technology
What are the
advantages of
using Security
Device Manager
(SDM) as a web-
based GUI device
management tool?

English
Why is it
important to use
the
Venn diagram?

16 | P a g e

SDM Express.

1.7 Create a default
route using SDM
Express.

1.8 Enable NAT
using SDM Express.

1.9 Configure basic
security options
using SDM Express.

2.0 Review and
deliver the SDM
Express
configuration to the
router.

2.1 Connect to a
router and start
SDM.

2.2 Navigate the
SDM interface.

2.3 Make basic
dynamic NAT
configuration
choices using SDM.

2.4 Review the SDM
developed
configuration prior
to delivery.
8. Configuring
DHCP Services

9. Configuring
Static NAT using
Cisco IOS CL

10. Backing up a
Cisco Router
Configuration


17 | P a g e


2.5 Compare and
contrast Telnet and
SSH.

2.6 Configure a
route to accept
terminal sessions
over SSH, using
SDM


LO 4.
Complete an
initial router
configuration
using Cisco IOS.

1.1 Operation of
Cisco routers
(router bootup
process, POST,
router components)
is described.

1.2 Router modes
and how to move
between them are
explained.

1.3 IOS help and ?
commands are used
to learn about
router commands.

1.4 Command
history, shortcut
keys, and shorthand
commands are
used.


1. Connecting the
CPE to the ISP

2. Installing the
CPE
Customer

3. Connections
over a WAN

4. Choosing a
WAN Connection

5. Configuring
WAN Connections

Read closely to
find answers to
specific questions,
note sequence of
events etc.








English
Sequencing
Show the steps in
completing the
initial router
configuration using
Cisco IOS in a
picture flow chart








Technology
To what extent
can be determined
that a router
configuration is
needed?

English
Why is a flow
chart essential?

18 | P a g e

1.5 Basic show
commands to check
router status are
used.

1.6 Initial router
configuration
using Cisco IOS
is created and
saved.


















LO 5.
Configure a Cisco
router for LAN
connectivity,
Internet
connectivity and
NAT using the
Cisco IOS CLI of
the Cisco IOS
software.


1.1 WAN DCE and
DTE devices and the
role of the CSU/DSU
are described.

1.2 Three common
types of WAN
connections are
described.

1.3 LAN and WAN
interfaces for basic
connectivity are
configured and
verified.

1.4 Default route is
defined, configured

1. Initial Cisco
2960 Switch
Configuration

1.2 Standalone
Switches

1.3 Power Up the
Cisco 2960 Switch


1.4 Initial Switch
Configuration

1.5 Connecting the
LAN Switch to the
Router

Y-I
Solve problems
involving
measurement.

Y-4
From a given
statistical data
draw conclusions.



Explain the
important points
in an informative
text












Math
Data Gathering
Measure distance
from a wireless
router the speed, in
kbps/mbps, to
different place in
the school. Convert
Technology
What are the
advantages and
disadvantages of
using CLI or to GUI
method of
configuration?


Math

Why is there a
need to know the
distance and
infrastructures
around you when
connecting from a
wireless router?


19 | P a g e




and verified.

1.5 A router as a
DHCP server using
IOS CLI and verify
DHCP functionality
is configured.

1.6 Static NAT on a
router using IOS CLI
is configured and
verified.

1.7 PAT on a router
using IOS CLI is
configured and
verified.

1.8 Configuration to
a TFTP server is
backed up and
restored.

1.9 Router using
SSH is configured.

1.6 Cisco
Discovery Protocol

this distance in
centimeters and/or
decimeters. Find
out the effect of
some
infrastructures to
the bandwidth
receive by the
device used.





English
Highlighting key
points
underscore the
procedure in
configuring a Cisco
router for LAN
connectivity
through note taking












English
What is the
importance of
note taking?

20 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : CONFIGURE STATIC AND DYNAMIC ROUTING
MODULE TITLE : CONFIGURING STATIC AND DYNAMIC ROUTING

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES


LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
the purpose and
function of
routing and the
protocols used to
implement it.



1.1 Routing is
defined.

1.2 Routing process
is described.

1.3 Four general
types of routes are
defined.

1.4 Purpose of
dynamic routing
protocols is
described.

1.5 Distance vector
and link state
routing algorithms
are compared and
described.

1.6 Common
interior routing
protocols are
compared and

1. Enabling
Routing Protocols

2. Routing Basics

3. Routing
Protocols

4. Common
Interior Routing
Protocols

5. Routing Within
an Organization

6. Configuring and
Verifying RIP


Y4
Discuss how the
information
superhighways
has influenced
the affairs of
daily living
Activate
background
knowledge to
better understand
the text










Science
Discussing how
internet
communication
works.

Discuss how
communication
between computers
in the internet
made possible
through a digital
electronic device.


English
Activating the
schema
Technology
When is necessary
to break up the
network into
multiple smaller
networks?

Science
How a router,
electronic device
does process the
exchange of
information
between computers
connected in the
internet?






English
Why are our
schemata essential
in understanding a

21 | P a g e


contrasted.

1.7 Appropriate
routing protocol for
a given organization
is selected.

1.8 Purpose and
function of exterior
routing protocols
are described.


Relate ideas from
previous readings to
a given text

text?

LO2. Configure
static and
dynamic routing.


1.1 Default and
static routing are
configured.

1.2 RIPv2 is
configured and
verified.

1.3 BGP is
configured and
verified.




1. Exterior Routing
Protocols

2. Autonomous
Systems

Routing Across the
Internet

3. Exterior Routing
Protocols and the
ISP
4. Configuring and
Verifying BGP
Organize ones
thoughts and
construct a
critique







English
Outlining
Gather main topics
and minor details
and create an
outline
Technology
When does a router
begin transmitting
routing updates?


English
What is the essence
of having an
organized thought?



22 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : USE INTERNET SERVICE PROTOCOL (ISP) SERVICES
MODULE TITLE : USING ISP SERVICES

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
the network
services provided
by an ISP.



1.1 Services
commonly provided
by an ISP are listed.

1.2 Purpose of the
Service Level
Agreement is
explained


1. Introducing ISP
Services

2. Customer
Requirements

3. Reliability and
Availability

Y-4
Trace the
development of
Communication
Technologies.
Y-4
Collect statistical
data and organize
in a table/chart.

Emphasize the
important points
in an informative
text















Science
Tracing the
development of
communication
technologies.

Compare the early
21
st
century
technology to 20
th

century
technology

Technology
How do an
E-mail, web
hosting, media
streaming, IP
telephony, and file
transfer serve as
the most
important services
that ISPs can
provide to all
customers?

Science
Why do machines
like computers are
able to
communicate with
each other using
20
th
century
technology?






23 | P a g e



Math
Data Collection
and Presentation
Make a survey on
the ISP used by
the students at
home. Prepare
data for table
creation and chart.
Differentiate the
different ISP in
terms of
bandwidth
offered, price,
add-ons
(additional
privileges),
number of
interference,
number of devices
can connected,
number of
students used
particular ISP and
those with out
Internet at home.
Present the
outcome using
charts and
interpret.


English
Math
How can you
collect, organize,
and display data?
































24 | P a g e

Role playing
Explain essential
points through
illustrations and
schematic
diagrams in
Technology texts




















English
Why are
illustrations
important?


LO2.
Describe the
purpose and
function of the
protocols that
support the
network services

1.1 TCP/IP
application layer
protocols that are
commonly
supported by ISPs
are described.


1. Protocols that
Support ISP Services

2. Review of TCP/IP
Protocols

3. Transport Layer
Emphasize the
important points
in an informative
text







English
Technology
How do protocols
support
communication
processes?

English
Why are

25 | P a g e

provided by an
ISP.
1.2 OSI model and
the layered TCP
model are
compared and
contrasted.


1.3 TCP and UDP
and their functions
in the data
communication
process are
compared and
contrasted.

1.4 Transport Layer
that allows network
devices to maintain
multiple
simultaneous data
conversations are
explained.

Protocols

4. Differences
Between TCP and
UDP


5. Supporting
Multiple Services

Role playing
Explain essential
points through
illustrations and
schematic
diagrams in
Technology texts


illustrations
important?


LO3.
Describe the
implementation
of ISP and
enterprise DNS.

1.1 TCP/IP host
name and host
name resolution are
defined.

1.2 Components
and structure of the
DNS are described.

1.3 DNS name
resolution process

1. Domain Name
System

2. TCP/IP Host
Name

3. DNS Hierarchy

4. DNS Name
Resolution

Y-3
Solve problems
using Pythagorean
Theorem.
Emphasize the
important points
in an informative
text











Math
Technology
How do small- to
medium-sized
businesses or
larger nonprofit
organizations
differ services
requirements?


Math
How can we say

26 | P a g e

is explained.

1.4 ISP and local
DNS servers and the
importance of DNS
service reliability
are compared and
contrasted.

5. Implementing
DNS Solutions

Group Work
Find Pythagorean
numbers among 0
to 255.


English
Role playing
Explain essential
points through
illustrations and
schematic
diagrams in
Technology texts



that a particular
number is special?



English
Why are
illustrations
important?












LO4. Explain
the common
application layer
services and
protocols
supported by the
ISP.


Common network
services, and the
associated
application layer,
protocols supported
by ISPs are
described.

A web server that
delivers a web page
to users is
described.

The use of http

1. Services and
Protocols

2. Services

3. HTTP and HTTPS

4. FTP

5. SMTP, POP3, and
IMAP4

Y-2
Solve equations on
direct variations,
direct square
variation, inverse
variation, and joint
variation.
Explain visual
verbal
relationships
illustrated in
tables, graphs,
information maps
commonly used in
context area texts










Math Evaluation
Evaluate the
following
problems on
variations. Use the
Technology
What does an ISP
need to be able to
support multiple
applications for
many different
customers?


Math
Why are variables
used?




27 | P a g e


protocol (including
https) and the ports
necessary is
explained.

Purpose and
operation of ftp are
described.

Email server that
sends and receives
email is described.

Use of smtp, pop
and imap protocols
in a client/server
environment is
explained.

acronyms (HTTP,
FTP, SMTP, POP3,
IMAP4, etc.) as the
variables.

English
Role playing
Explain the main
point of an
informative text
thoroughly with
the aid of
illustrations and
schematic
diagrams







English
What is the
significance in
using illustrations
and schematic
diagrams?

26 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : MAINTAIN ISP RESPONSIBILITY
MODULE TITLE : MAINTAINING ISP RESPONSIBILITY

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/
CONTENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
ISP security
policies and
procedures.

1.1 Ways the ISP
provides network
security to its
customers are
explained.

1.2 Network
security best
practices are
described.

1.3 Describe data
encryption and its
use with common
application services.

1.4 Secure HTTP
channels and
examine website
certificates are
identified.

1.5 Three types of
denial of service
attacks and two

1. ISP Security
Considerations

2. ISP Security
Services

3. Security
Practices

4. Data Encryption


Y-4
Discuss how
information
superhighway has
influenced the
affairs of daily
living

Y-2
List the next few
terms of a
sequence given
several
consecutive terms.
Y-4
Use the laws on
exponents to find
the zeros of
exponential
functions
Listen to
determine steps
in a process in
informative text













Science
Proper handling
and utilization of
technological tools

Utilization of
technological tools
in internet
connection.

Math
Group Activity
Make three coding
system for 0 to 9
digits, answer
Technology
How can the
security services
that ISPs provide
ensure protection
on the servers/
clients that are
located at the
premises?

Science
What are the
ways of handling
technological tools





Math
How does the
type of
encryption
influence the
data?


27 | P a g e

ways of countering
these threats are
described.

1.6 Placement of
ACLs given
communication and
security
requirements is
planned.

questions given.
Hide the answer by
encrypting or using
the coding system
made. Decode the
answer using the
coding system of
the other.

English
Presenting a power
point presentation

Demonstrate the
steps or a
procedure in
installing the
Operating system,
software programs
etc of a computer
through a power
point presentation












English
What is the
importance of
listening in a
process?


LO2.
Describe security
tools commonly
used by ISPs.

1.1 Purpose and
function of firewalls
are described.

1.2 Purpose and
function IPS and IDS
devices are
compared and
contrasted.

1.3 Common
Listen closely to
determine the
information map
suited to different
text types, e.g.
Flow chart for
narratives and
processes, tree
diagrams for
classifications and
enumerations and
Venn diagram or











English
Technology:
What types of
attacks that an ISP
must protect
against?

How does this
attack be
mitigated?

English
Why are

28 | P a g e

wireless security
measures are
described.

1.4 WEP on a
wireless router and
client and verify
connectivity is
configured.

1.5 Ways in which
host-based firewalls
can protect ISP
servers are
described.

1.6 Anti-X software
and its use on host
computers are
described.



grid for
comparison
Comparison and
contrast
Differentiate
information to get
the pros and cons
using a grid






















information maps
essential?

LO3.
Describe the
monitoring and
management
responsibilities
of the ISP.

1.1 Purpose and
common features of
a SLA are described.

1.2 Role of the ISP
in monitoring

1. Monitoring and
Managing the ISP

2. Service Level
Agreements

Y-3
Apply the
definition of
similar triangles to
derive the
Pythagorean
Theorem
Use varied text
types to develop
extensive reading
skills







Technology
What common
issues do an ISP
and a user usually
have in contract in
the SLA?


29 | P a g e

network
performance is
described.

1.3 In-band and
out-of-band
network monitoring
tools are described.

1.4 Route to accept
terminal sessions
over SSH and Telnet
is configured.

1.5 Utilize network
monitoring
software to monitor
network
performance is
utilized.


3. Monitoring
Network Link
Performance

4. Device
Management
Using In-band
Tools


5. Using SNMP and
Syslog



Math
Compare and
Contrast
Find ways in proving
Pythagorean
theorem in the
internet and in
printed materials,
differentiate the
two methods by
their advantages
and disadvantages?


English
Describing key
points
Highlight key points
in an informative
text through
description


Math
How reliable
internet is in
gathering
information about
geometric
concepts?









English
Why do we use
description?

LO4. Explain
proper disaster
recovery and
server backup
procedures.


1.1 Responsibilities
of the ISP with
regard to service
and equipment
maintenance and
data recovery are
described.

1.2 Evaluate
different methods

1. Backups and
Disaster Recovery

2. Backup Media

3. Methods of File
Backup

4. Cisco IOS
Software Backup
Use ideas and
information
gained from
previous readings
and personal
experiences to
better understand
a text
English
Predicting
outcomes
Conjecturing and
hypothesizing using
background
knowledge or
schema while
reading a text
English
Why are our
schemata
important?





30 | P a g e


of server backup
are evaluated.

1.3 Backup
procedures for
servers, network
device IOS and
configuration files
are described.

1.4 IOS backups and
recovery are
described.

1.5 Server backup
plan is created.

1.6 Best practices
for disaster
recovery are
explained.

and Recovery

5. Disaster
Recovery Plan


31 | P a g e


QUALIFICATION TITLE : COMPUTER NETWORKING TECHNOLOGY
UNIT OF COMPETENCY : TROUBLESHOOT A NETWORK
MODULE TITLE : TROUBLESHOOTING A NETWORK

LEARNING
OUTCOMES


ASSESSMENT
CRITERIA
LEARNING
CONCEPTS/CON
TENT

LEARNING COMPETENCIES

LEARNING
ACTIVITIES
GUIDE
QUESTIONS

TECHNOLOGY

SCIENCE

MATH

ENG/COMM

LO1. Describe
how to
troubleshoot
using the OSI
Model.

1.1 Methods used
to troubleshoot on
a network are
described.

1.2 Problems that
occur on various
layers of the OSI
reference model
are described.

1.3 Troubleshooting
tools and how they
can be used are
described.


1. Troubleshooting
Methodologies
and Tools

2. The OSI Model
and
Troubleshooting

3. Troubleshooting
Methodologies

4. Troubleshooting
Tools

5. Certification
Study Guide

Y-1
Demonstrate
understanding of
the basic processes
of science
Y-3
Define and
illustrate parallel
lines; Define and
illustrate a
transversal

Listen closely to
get information
needed to solve
problems















Science
Troubleshooting
Activity

Apply and
demonstrate
problem solving
skills in
troubleshooting a
computer network
on various layers.

Math Recognizing
Technology
How does each
layer of the OSI or
TCP/IP model
help in
troubleshooting
specific functions
and protocols
within the
network?

Science
How could you
determine the
layer at which the
symptoms and
issues of a
problem is related
to?





Math
What tools and

32 | P a g e

Pattern
Identify the parallel
lines, transversal
lines, and skew
lines from the
installed network
components and
show these by
locating them, with
proper tool.


English
Problem Solving
Give, suggest
solutions to
problems from an
informative text


units are used to
measure the
attributes of
lines?











English
Why do we need
to read closely?


LO2. Describe,
Identify and
Correct issues
that occur at
Layer 1 and Layer
2 of the OSI
Reference Model



1.1 Symptoms and
issues related to
Layer 1 and Layer 2
are described.

1.2 Bootup and
hardware issues are
identified and
corrected.

1.3 Cable and
device port errors
are identified and
corrected.

1.
Troubleshootin
g Layer 1 and
Layer 2 Issues

2. Layer 1 and
2 Problems

3.
Troubleshootin
g Device
Hardware and
Boot Errors

4.
Use appropriate
modes of
development to
express ones
ideas, needs,
feeling and
attitude


















English
Journal writing

Write reflections
on learning
Technology:
What problems
with routing can
cause network
failures or can
adversely affect
network
performance?

English

How do we
express our
thoughts, attitude
and ideas?

33 | P a g e


1.4 Identify and
correct LAN
connectivity issues
are identified and
corrected.

1.5 WAN
connectivity issues
are identified and
corrected.

Troubleshootin
g Cable and
Device Port
Errors

5.
Troubleshootin
g LAN
Connectivity
Issues

6.
Troubleshootin
g WAN
Connectivity
Issues

7. Certification
Study Guide












experiences in
diary and journal
entries

LO3. Describe,
Identify and
Correct IP
addressing issues
that occur at
Layer 3 of the
OSI Reference
Model

1.1 IP addressing at
Layer 3 of the OSI
reference model is
described.

1.2 How to
recognize and
correct IP address
design issues are
described.

1.3 DHCP and NAT
issues are described
and corrected.


1. Troubleshooting
Layer 3 IP
Addressing Issues

2. Review of Layer
3 Functionality
and IP Addressing

3. IP Design and
Configuration
Issues

4. IP Address
Planning and
Allocation Issues
Activate
background
knowledge to
better understand
the text











English
Activating the
schema
Relate ideas from
previous readings
to a given text
Technology
What are the
indications that
network problem
is brought about
by an error in IP
configuration?


English
Why are our
schemata
essential in
understanding a
text?


34 | P a g e


5. DHCP and NAT
Issues

6. Certification
Study Guide



LO4. Describe,
Identify and
Correct routing
issues that occur
at Layer 3 of the
OSI Reference
Model.


1.1 Layer 3 Routing
Issues are identified
and corrected.

1.2 Routing table
update issues are
identified and
corrected.



1. Troubleshooting
Layer 3 Routing
Issues

2. Layer 3 Routing
Issues

3. Dynamic
Routing Errors

4. Certification
Study Guide
Do self and peer
editing using a set
of criteria










English
Peer checking
Peer edit to
improve and check
ones work by
drawing up set of
criteria
Technology
What steps are
involved to help
isolate the cause
of a problem of
layer 3 OSI
reference model?

English
Why do we need
to formulate set
of criteria?

LO5. Describe,
Identify and
Correct issues
that occur in the
Transport and

1.1 Traffic filtering
errors are identified
and corrected.

1.2 Upper layer

1. Troubleshooting
Layer 4 and Upper
Layer Issues

2. Layer 4 Traffic
Do self and peer
editing using a set
of criteria






Technology
What steps are
involved to help
isolate the cause
of a problem of
transport layers

35 | P a g e


upper layers of
the OSI
Reference Model

issues are identified
and corrected.

Filtering Errors

3. Troubleshooting
Upper Layer
Problems

4. Using Telnet to
Check Upper Layer
Connectivity

5. Certification
Study Guide






English
Peer checking
Peer edit to
improve and check
ones work by
drawing up set of
criteria
of the OSI
reference model?

English
Why do we need
to formulate set
of criteria?

Вам также может понравиться