q2 Module5 g12 Css Ncii Luciano Millan Nhs
q2 Module5 g12 Css Ncii Luciano Millan Nhs
q2 Module5 g12 Css Ncii Luciano Millan Nhs
12
TVL-ICT
COMPUTER SYSTEMS SERVICING NCII
QUARTER 2 – MODULE 5
Install Operating Software
I. INTRODUCTION
This module covers the outcomes required in installing and configuring desktop and
workstation computers systems. It consists competencies to assemble computer hardware,
install operating system and drivers for peripherals / devices, and install application software
as well as to conduct testing and documentation.
A “server” is a computer or system that provides resources, data, services, or
programs to other computers, known as clients, over a network. In theory, whenever
computers share resources with client machines they are considered servers. There are many
types of servers, including web servers, mail servers, and virtual servers. An individual system
can provide resources and use them from another system at the same time. This means that
a device could be both a server and a client at the same time.
1
Print servers
Print servers allow for the management and distribution of printing functionality. Rather
than attaching a printer to every workstation, a single print server can respond to printing
requests from numerous clients.
Application servers
Application servers run applications in lieu of client computers running applications
locally. Application servers often run resource-intensive applications that are shared by a large
number of users.
DNS servers
Domain Name System (DNS) servers are application servers that provide name
resolution to client computers by converting names easily understood by humans into
machine-readable IP addresses.
Mail servers
It is then ready to send and receive messages rather than requiring every client
machine to have its own email subsystem continuously running.
Web servers
One of the most abundant types of servers in today’s market is a web server. A web
server is a special kind of application server that hosts programs and data requested by users
across the Internet or an intranet. Web servers respond to requests from browsers running on
client computers for web pages, or other web-based services.
Database servers
Databases need to be accessible to multiple clients at any given time and can require
extraordinary amounts of disk space. Database servers run database applications and
respond to numerous requests from clients.
Virtual servers
Uses the virtual hardware as usual, and the hypervisor passes the actual computation
and storage needs onto the real hardware beneath, which is shared among all the other virtual
servers.
Proxy servers
Often used to isolate either the clients or servers for security purposes, a proxy server
takes the request from the client. Instead of responding to the client, it passes the request on
to another server or process.
Monitoring and management servers
These servers can keep track of all the traffic on the network, as well as the requests
and replies of clients and servers, without interfering with those operations. A monitoring
server will respond to requests from monitoring clients such as those run by network
administrators watching the health of the network.
2
INSTALLATION OF SERVER TO COMPUTER
1. Prepare the installer for Server.
2. Restart your Computer then insert the Bootable material (USBFD/ , CD/DVD)
3. Choose version you want to install (Standard, Enterprise, DataCenter), accept the condition.
Select Custom for a new Copy.
4. Select the Drive where to install the Server. It will restart a couple of times. Performing the
Copying Files, Expanding Files, Installing Features, Installing Updates and Completing
Installation
5. Create your administrator’s users and its password. Change in Taskbar of Server.
3
that consists of multiple processors, disk drives, memory, and network connections. But, even
now, a server is still just a system that responds to a request from a client.
INSTALLATION OF SERVER 2008 R2 USING VIRTUALBOX
1. Install the virtual box to your PC, then use the bootable USBFD or CD/DVD Server 2008R2.
2. Create new Virtual Machine, named it Server R2. And choose version type.
5. Then Create.
6. Allowing another computer to connect to Virtual Machine. Change the network setting, from
NAT to Internal Network. Click Next. Select installation media.
Clients (Computer Terminal) and Server (Computer Server) use transport protocols to
communicate. Concurrency is fundamental in client – server interaction. Most servers are
concurrent programs that creates an interdependent thread control for each request. Using
concurrent threads of control permits a server to handle request from multiple clients at the
same time, without requiring a client to wait for previous requests to be handled. A single client
interaction can be complex. A single client can access more than one service, a client can
access multiple machines (like Printers), and a server for one service can become a client for
4
other services. Designers and programmers must be careful avoid circular dependencies
among servers.
PATCHES
A patch is a set of changes to a computer program or its supporting data designed to
update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with
such patches usually being called bugfixes or bug fixes.
Five Reason of Software Updates and Patches
1. Software updates do a lot of things
Software updates offer plenty of benefits. It’s all about revisions. These might include
repairing security holes that have been discovered and fixing or removing computer bugs.
Updates can add new features to your devices and remove outdated ones. While you’re at it,
it’s a good idea to make sure your operating system is running the latest version.
2. Updates help patch security flaws
Hackers love security flaws, also known as software vulnerabilities. A software
vulnerability is a security hole or weakness found in a software program or operating system.
Hackers can take advantage of the weakness by writing code to target the vulnerability. The
code is packaged into malware — short for malicious software. An exploit sometimes can
infect your computer with no action on your part other than viewing a rogue website, opening
a compromised message, or playing infected media.
3. Software updates help protect your data
You probably keep a lot of documents and personal information on your devices. Your
personally identifiable information — from emails to bank account information — is valuable
to cybercriminals. They can use it to commit crimes in your name or sell it on the dark web to
enable others to commit crimes. If it’s a ransomware attack, they might encrypt your data. You
might have to pay a ransom for an encryption key to get it back. Or, worse, you might pay a
ransom and not get it back. Updating your software and operating systems helps keep hackers
out.
4. It’s not all about you
OK, cyber security is mostly about you, but you’ve got other people to think about, too.
If your device gets a virus, you could pass it on to your friends, family, and business
associates. That’s why you want to keep your software and systems updated. A trusted
security program such as Norton 360TM can help keep your devices secure. And that can
potentially help all those people you interact with online. But it’s also important to know anti-
virus protection isn’t enough to protect your devices against all cyberthreats
5. You deserve the latest and greatest
Updates not only patch security holes, they can also add new features and improve
existing ones. In that way, software updates really are all about you. Your software program
may get a new shot of stability — no more crashing. Or an update might boost program
performance — more speed. You could ignore those reminders to update your software, but
you might be missing out on a lot, starting with your cyber security. Another option? If you’re
still not keen on clicking “Update now,” you may be able to configure your devices to update
automatically. If so, your problem is solved.
5
III. EXERCISES
A. Multiple Choice. Choose the letter that corresponds to the correct answer (Write your
answer in your notebook)
1. Among the options given, this performs numerous additional tasks as part of a single
request and response, including verifying the identity of the requestor.
A. Desktop PC B. Client C. Server
2. Which of the following materials is used in virtual machine to create a memory disk
space?
A. Desktop PC B. USBFD C. Server PC
4. They are the virtual servers hosted on a third-party infrastructure on an open network.
A. Computer Antivirus B. Device Driver C. Driver Update
5. Which of the following is a program that lets the operating system communicate with
specific computer hardware?
A. Netware Server B. Linux Server C. Cloud Server
6. Which of the following that created and controlled by the operating system by
manipulating free hard disk space to mimic more RAM than is actually installed in the
system?
A. Configuration B. Fixed Size C. Visual Memory
7. It refers to the arrangement of each of its functional units, according to their nature,
number and chief characteristics.
A. Fixed Size B. Configuration C. Visual Memory
8. A virtual disk file that may take longer to create on some systems but is often faster to
use.
A. Fixed Size B. Configuration C. Visual Memory
9. This can provide resources and use them from another system at the same time.
A. Individual Server B. Server C. Client – Server
10. Which application servers that provide name resolution to client computers by converting
names easily understood by humans into machine-readable IP addresses?
A. Proxy Server B. Web Server C. DNS Server
6
IV. SUMMATIVE TEST
(Write your answer in the ANSWER SHEET provided in this module)
A. ORDER IN THE COURT
Direction: Arrange the following steps in chronological order to complete the installation of
Server by writing the number order in your answer sheet.
A. _____Choose version you want to install (Standard, Enterprise, Data Center)
B. _____Restart your Computer then insert the Bootable material (USBFD/CD/DVD)
C. _____Select Custom for a new Copy.
D. _____Create your password’s users.
E. _____Select the Drive where to install the Server.
F ._____It will restart a couple of times.
G. _____Performing the Copying Files, Expanding Files, Installing Features, Installing
Updates and Completing Installation
H. _____Create your administrator’s users.
I. _____Accept the condition.
J. _____Prepare the installer for Server.
B. GUESZMO
Direction: Identify the following Batch Operating System. (Write your answer in your answer
sheet)
______________1. It passes the request on to another server or process.
______________2. Server that It is then ready to send and receive messages rather than
requiring.
______________3. Servers that respond to request from browsers running on client
computer.
______________4. A repository for files, or other resources, that can be accessed and shared
across a network by many users.
______________5. run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by a large
number of users.
C. WORLD PATCH
7
KEY ANSWER for EXERCISES
A. Multiple Choice
1. C 6. C
2. B 7. B
3. B 8. A
4. A 9. A
5. C 10. C
B. Enumeration
1. Five types of server operating systems. (May Vary)
• File servers • Web servers
• Print servers • Database servers
• Application servers • Virtual servers
• DNS servers • Proxy servers
• Mail servers • Monitoring and management
servers
References:
A. Handouts
TESDA CSS NC II Training Regulation
DepEd Curriculum Guide in CSS NCII
B. Books
CISCO
IT Essentials
PC Hardware and Software Companion Guide
3rd Edition
C. Portal
https://www.paessler.com/it-explained/server.
https://us.norton.com/internetsecurity
8
ANSWER SHEET
NAME: ______________________________________________ SCORE ________
SUBJECT TEACHER ____________________________GRADE/SECTION ____________
B. GUESZMO
____________________________ 1.
____________________________ 2.
____________________________ 3.
____________________________ 4.
____________________________ 5.
C. WORLD PATCH
A.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
B.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________