Reviewer Tle10
Reviewer Tle10
EDUCATION
Learner’s Material
GOVERNMENT PROPERTY
Division _________________________________________________
First Year of Use: _________________________________________
Source of Fund (Year included):__________________________
Department of Education
Republic of the Philippines
Republic Act 8293, section 176states that: No copyright shall subsist in any work of the Government of
the Philippines. However, prior approval of the government agency or office wherein the work is created
shall be necessary for exploitation of such work for profit. Such agency or office may, among other things,
impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.)
included in this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners. The publisher
and authors do not represent nor claim ownership over them.
ii
Development Team of the Learner’s Material
Authors:
Rosalie P. Lujero
Teacher III / School ICT Coordinator
Dasmariñas East National High School
Ronaldo V. Ramilo
Education Program Specialist
Division of Tanauan
ii
TABLE OF CONTENTS
iv
Generating Ideas for Business ………………………….. 27
Key Concept of Selecting a business Idea …………….. 29
Branding …………………………………………………… 30
What to Process.………………………………………………………….….. 31
What to Reflect and Understand ...……………………………………….. 33
What to Transfer …………………………………………………………... 34
v
Structure of the Registry ……………………………. 53
What to Process ……………………………………………….. 56
MS Configuration and Command Classification … 56
Applet Grouping …………………………………….. 57
vi
Coaxial Cable ………………………………… 87
Fiber-Optic Cable ………………………………… 88
Creating Ethernet Cable ………………………… 89
What to Process…………………………………………… 93
Criss-Cross Puzzle……………………………. 93
What to Reflect / Understand …………………………. 94
What to Transfer………………………………………… 96
Create Your Own Ethernet Cable……………. 96
What to Know…………………………… 98
Internet Protocols………………………. 98
IP Addressing…………………………….. 100
Subnet Mask…………………… 102
IpConfig…………………… 102
How to Assign IP Address…………… 104
Ping……………………………………. 108
What to Process……………………………… 111
Protocols…………………………………………….. 111
Identify IP Address Classes……………………….. 112
What to Reflect / Understand……………………… 112
Reflection on the Video Presentation…… 113
What to Transfer…………………… 114
Configure an Ethernet NIC to use DHCP…… 114
Configure Wireless Router……… 120
What to Know……………………………. 123
Peer to Peer Network…………………………… 123
Peer to Peer Network in Windows XP…………… 124
vii
Peer to Peer Network in Windows 7…………….. 128
Client/ server Network ……………………………. 134
What to Process……………………… 136
What to reflect/understand ……………….. 136
What to Transfer…………………… 140
What to Know……………………………… 141
Network Security………………………… 141
Security Attacks…………………………. 142
Virus, Worms, and Trojan Horses…………………. 142
Security Procedure………………………… 143
Data Encryption………………………. 144
Port Protection……………………… 145
viii
What to Transfer………………………………………… 162
Share Folder, Printer and Set Share Permission… 162
Reading Resources / Instructional Activities
Inspect and Test Configured Computer System
And Network……………………………………… 170
What to Know……………………………… 171
Safety Precautions………………………… 171
Accident Reports ………………………. 172
Hazardous Substances……………………….. 173
Fire Exits………………………………….. 173
Fire Safety Procedure…………………… 173
Personal Safety While Working with PCs…………. 174
What to Know……………………………….. 174
Guidelines for Testing Configured Computer
System and Network………………………….. 174
Testing Your Computer Network ………………… 174
Writing a Technical Report on Test Conducted ….. 176
What to Transfer………………………………………… 177
Test the Wireless NIC…………………………….. 177
Summative Test ……………………………………………. 182
ix
Reading Resources / Instructional Activities………………… 191
Procedure in Planning and Conducting
Maintenance
Preventive Maintenance……………………………. 191
Maintenance Procedure…………………………… 192
What to Know…………………………………………………..
Diagnosis and Identification of Faulty Computer and
Networks
Preventing Computer System Failure ………………. 196
Network Problems ………………………………..…… 199
What to Process………………………………………………….. 203
Slide Show of Computer and Network Errors
What to Reflect / Understand…………………………………… 203
Pictorial Tour
What to Transfer………………………………………………… 204
Video Demo
What to Know………………………………………………………
204
Maintain Computer and Network System
What to Process……………………………………………….
207
What to Reflect / Understand…………………………………… 208
Investigative Report
What to Transfer……………………………………………….. 208
Magazine Article
What to Know……………………………………………………… 209
Computer Specification
x
Understanding Computer Specification
What to Process………………………………………………….. 214
Internet Research
What to Reflect / Understand…………………………………… 215
Making Checklist
What to Transfer………………………………………………… 216
Computer Specifications
What to Know……………………………………………………… 217
Networking Hardware Requirements
What to Process………………………………………………….. 220
Network Layout
What to Reflect / Understand…………………………………… 221
Critical review
What to Transfer………………………………………………… 221
Computer Shop Network Layout
Reading Resources / Instructional Activities
Maintaining Computer System ………………………………. 223
What to Know……………………………………………………… 224
Maintenance of Computer System…………………… 224
Data Backup………… ………………………………… 225
Malware Maintenance/Disk Maintenance…………… 228
What to Process………………………………………………….. 229
Essay activity
What to Reflect / Understand…………………………………… 230
Research and Investigate
What to Transfer………………………………………………… 230
Demonstration
xi
What to Know……………………………………………………… 231
Diagnosis and Identification of Faulty System
What to Process………………………………………………… 238
Critical Review
What to Reflect / Understand………………………………. 238
Slide Show Presentation
What to Transfer………………………………………………… 239
Video Tutorials
xii
What to Process…………………………………………………………… 260
Duplication – Disk Image backup
What to Reflect / Understand…………………………….…………..…. 263
Critical Review
What to Transfer……………………………………..…………….……. 264
Online Review
264
What to Know…………………………………………………….………
How to Scan Disk
265
What to Process…………………………………………………….……
How to Run Scan Disk in Windows 2000 and Windows XP
How to Run Scan Disk in Windows Vista
Run Scan Disk on Windows 7
Run CHKDSK Using GUI
Run CHKDSK from the DOS Command Prompt
267
What to Reflect / Understand………………………………….….…….
267
What to Transfer……………………………………..…………….…….
Concept Mapping
Scan Flash Drive
268
What to Know……………………………………………………………..
Delete Temporary Files
Unused Software Application
269
What to Process………………………………………………….………
Temporary Internet Files
Windows Temporary Files 270
What to Reflect / Understand………………………………….….…….
Computer Terminologies 271
What to Transfer…………………………………………….…………..
Deleting Temporary Files 271
xiii
What to Know……………………………………………………………..
Disk Cleanup
xiv
xv
What to Process……………………………………………. 272
Remove Unnecessary Startup Programs
What to Reflect / Understand………………………………….….……… 274
Internet Research
What to Transfer…………………………………………….…………….. 275
Activity
277
Maintain Network Systems ………………………………………………
277
What to Know………………………………………………………………
Procedure on how to maintain Computer System and Networks
Perform computer maintenance task regularly
General Safety
Electrical Safety Fire
Safety
284
What to Process………………………………………………..……………
Maintenance Inspection Checklist
284
What to Reflect / Understand………………………….………….….…….
Video Tutorial
284
What to Transfer…………………………………..…………….…………..
Weekly Maintenance Checklist
285
What to Know………………………………………………….…………….
Burn-In Testing
Standard Scripts 286
What to Process…………………………….……………………………….
Performing Immediate Burn- in Testing
Reading Resources / Instructional Activities 291
Inspect Computer Systems and Networks………………………. 293
What to Know……………………………………………………….……..
Maintenance of the Computer System and Networks 294
xvi
What to Process…………………………….……………………………….
Testing Demonstration
xvii
What to Reflect / Understand………………………….………….….……. 294
Network Diagnostics for Windows XP Tool
What to Transfer…………………………………..…………….………….. 294
Schedule and Techniques in Maintaining Systems
What to Know……………………………………………………………… 298
Network Monitoring
299
What to Process……………………………………………………………
Testing Network Configuration
301
What to Reflect / Understand………………………….………….….…….
Practicing TCP/IP Networking Skills
302
What to Transfer…………………………………..…………….…………..
Network Checking
303
What to Know………………………………………………………………
Computer Communications
Methods of Connection Commonly Used
How Network Works- Computer in network
305
What to Process……………………………………………………………
Set Up a DSL or cable connection
306
What to Reflect / Understand………………………….………….….…….
Video Tutorial 307
What to Transfer…………………………………..…………….…………..
Network Connection Demo 308
What to Know……………………………………………….……………….
xviii
Identify Safety Procedures and Potential Hazards for Users and
Technician
Preparing Technical Reports
What to Process…………………………………………………………… 310
Simple Technical Reports
What to Reflect / Understand………………………….………….….……. 312
Computer Item Enumeration
What to 312
Transfer…………………………………..…………….…………..
Computer Hardware- Software Tools Report 313
Summative Test 317
……………………………………………………………... 319
References
……………………………………………………………………
Glossary
……………………………………………………………………….
xix
Module 1
Personal Entrepreneurial Competencies (PECs)
Content Standards Performance Standards
In this module, you will learn more about entrepreneurship and the
entrepreneurial competencies related to Computer Hardware Servicing. You
will have a first-hand experience in educational activities leading to
assessment of your personal entrepreneurial competencies (PECs) and the
entrepreneurial competencies of a successful computer technician within your
province. You will also have several activities that will align your competencies
with those of successful practitioners. Moreover, this module will encourage
you to think about entrepreneurship and its role in the business community as
well as in the economic and social development of an individual.
Entrepreneurs are those with the skills and capabilities to see and
evaluate business opportunities. They are individuals who can strategically
identify products or services needed by the community, and have the capacity
to deliver them at the right time and at the right place.
1
Entrepreneurship, on the other hand, is not just a simple business
activity but a strategic process of innovation and new product creation.
Basically, entrepreneurship is both an art and science of converting business
ideas into marketable products or services to improve the quality of living.
To begin, let us find out the competencies you will have gained upon
completion of this module.
assessmentObjectives
Now try to take the first challenge in this module, the pre assessment.
Pre-assessment
As part of your initial activity, try to assess your prior knowledge and
experience related to personal entrepreneurial competencies. Answer Task 1.
A B
2
____2. Profit-oriented B. strategic thinking and setting of goals
Directions: The following are guide questions which covers the entire module.
Write your answers on your assignment notebook. Discuss / share these to
the class.
3
After all the guide questions are answered, share these with your
classmates. You may also compare your insigths, personal knowledge,
and relevant experiences on the topic to make the sharing more exciting
and engaging.
After setting your own personal goals and targets in achieving the
objectives of this module, check your inherent knowledge of PECs. Answer
the following guide questions with the help of your classmates.
4
1. Explain the importance of assessing one’s PECs before engaging in a
particular entrepreneurial activity.
________________________________________________________
_
________________________________________________________
_
________________________________________________________.
2. Are there other strategies or approaches where you can assess your
PECs? Explain how these strategies will become more useful in
selecting a viable business venture.
________________________________________________________
_
________________________________________________________
_
________________________________________________________.
5
________________________________________________________
________________________________________________________
.
How was your experience in answering the guide questions with your
classmates? Were you able to benefit from them? What were the insights you
have realized?
This time you’re going to study the different topics that will enrich your
knowledge of PECs. Read all the important details about the succeeding topic
carefully.
6
• Disciplined: Successful entrepreneurs always stick to the plan
and fight the temptation to do what is unimportant.
7
well-developed interpersonal skill can make a huge difference
between success and failure of the business.
Strengths Development
Areas
Hardworking
- Works diligently
Confident
- Self-reliance in one’s ability
8
Disciplined
- Always stick to the plan
Committed
- Solid dedication
Creative
- Innovative to have edge over other
competitors
Profit-oriented
- Always looking for an opportunity to
have/earn income
Excellent planner
- Strategic thinking and setting of goals
TOTAL
Interpretation or Insight:
___________________________________________________________________________
9
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
_________________________________________________.
How was your experience in discovering the strengths and the areas
you need to develop? Did you gain a valuable experience in exchanging
insights with your classmates? To learn more and deepen your understanding
of PECs, do task 5 below.
Task 5: Interview
1. What preparations did you make before you engaged in this type of
business or job?
________________________________________________________
________________________________________________________
_______________________________________________________.
10
2. What special skills and characteristics do you have that are related with
your business or job?
________________________________________________________
________________________________________________________
_______________________________________________________.
3. How did you solve business-related problems during the early years of
your business operation?
________________________________________________________
________________________________________________________
_______________________________________________________.
Personal
Entrepreneurial Characteristics Attributes Lifestyles Skills Traits
Competencies
11
Successful
Entrepreneur in
the province
My PECs
Using the information on the table above, analyze and reflect on the
similarities and differences in your answers. Put your reflection on the table
you copied in your notebook or in a separate sheet of paper. Write your
conclusion on the space provided.
Personal
Entrepreneurial Similarities Differences
Competencies
Characteristics
Attributes
Lifestyles
Skills
Traits
Conclusion:
12
________________________________________________________
_____________________________________________________________
_
_____________________________________________________________
_
_____________________________________________________________
_
_____________________________________________________________
.
To align my Characteristics
PECs with
the PECs of
a successful
entrepreneur
in Computer
Hardware
Servicing Skills
13
Attribute
Traits
Directions: Read and study the following questions below. You may use a
separate sheet of paper or your notebook to write your answers.
1. Why is there a need to compare and align one’s PECs with the PECs
of a successful entrepreneur?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
_______________________________________________________.
2. How does your action plan help sustain your strong PECs and/or
address your development areas?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
14
________________________________________________________
_______________________________________________________.
3. What plan of action will you utilize to address your development areas?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
_______________________________________________________.
Module 2
ENVIRONMENT AND MARKET (EM)
Content Standards Performance Standards
Quarter I Time
Allotment: 4 hours
15
To be successful in any kind of business venture, potential
entrepreneurs should look closely at the environment and market. They
should always be watchful of existing opportunities and constraints, and to
take calculated risks. The opportunities in the business environment are
factors that provide possibilities for a business to expand and make more
profit. Constraints, on the other hand, are factors that limit business growth,
hence reduce the chance of generating profit. One of the best ways to evaluate
opportunities and constraints is to conduct a Strengths, Weaknesses,
Opportunities and Threats (SWOT) Analysis.
To begin with, let’s find out the competencies that you will master as
you finish this module.
Objectives
16
Now that you have an idea about the things you will learn, take the first
challenge in this module – the pre-assessment.
Pre-
DIRECTIONS: Choose the letter of the best answer. Write your answer on a
separate sheet of paper.
17
B. creativity D. innovation
7. It is a managerial tool used to assess the environment and to gather
important information that can be used for strategic planning.
A. scanning C. WOTS Analysis
B. SWOT Analysis D. survey analysis
Directions: Read and study the guide questions below. Use a separate
sheet of paper to write your answer.
18
________________________________________________________
________________________________________________________
5. How can one effectively respond to the needs of the target customer?
________________________________________________________
________________________________________________________
________________________________________________________
After all the guide questions are answered and skills have been
mastered, share insights/ideas with your classmates. Discuss your insights,
personal knowledge, and relevant experiences on the topic to make it more
exciting and engaging.
19
After reading and understanding the objectives of this module and
having gone through the pre-assessment and guide questions, you will be
asked to set your own personal goals. These goals will urge you to further
achieve the ultimate objective of this module. In the end, these goals will
motivate you to learn more about environment and market.
After setting your own personal goals and targets in achieving the
objectives of this module, you will have the opportunity to read and learn more
about environment and market. You will also be given a chance to do practical
exercises and activities to deepen your understanding of the topic.
Product Development
20
There are basic, yet vital questions that you can ask yourself about
product development. When you find acceptable answers to them, you may
now say that you are ready to develop a product and/or render services.
These questions include the following:
1. For whom are the product/services aimed at?
2. What benefit will the customers expect from product/service?
3. How will the product/service differ from the existing brand? From its
competitor?
In addition, needs and wants of the people within an area should also
be taken into big consideration. Everyone has his/her own needs and wants.
However, each person has different concepts of needs and wants. Needs in
business are the important things that an individual cannot live without in a
society. These include:
1. basic commodities for consumption,
2. clothing and other personal belongings, 3. shelter,
sanitation and health, and
4. education.
Basic needs are essential to an individual to live with dignity and pride
in a community. These needs can obviously help you generate business ideas
and subsequently to product development.
Wants are desires, luxury and extravagance that signify wealth and
expensive way of living. Wants or desires are considered above all the basic
necessities of life. Some examples of wants or desires are: fashion
accessories, expensive shoes and clothes, travels, eating in an expensive
restaurant, watching movies, concerts, having luxurious cars, wearing
expensive jewelry and perfume, living in impressive homes, among others.
Needs and wants of people are the basic indicators of the kind of
business that you may engage in because it can serve as the measure of your
success. Some other points that might be considered in business
undertakings are the kind of people, their needs, wants, lifestyle, culture and
tradition, and their social orientation.
To summarize, product development entirely depends on the needs and
wants of the customers. Another important issue to deal with is the key
concepts of developing a product. The succeeding topic shall enlighten you
about the procedure in coming up with a product.
21
Concepts of Developing a Product
Plan
Remaining
Analyze Development
Perform
Competitive Project
Economic
Products
Analysis
Concept
Development
22
1. Identify customer needs: Using survey forms, interviews, researches,
focus group discussions, and observations, an entrepreneur can easily
identify customers’ needs and wants. In this stage, the information that
can be possibly gathered are product specifications (performance, taste,
size, color, shape, life span of the product, etc.). This stage is very
important because it would determine the product to be produced or
provided.
23
costs, and selling price of the product or services to be offered or
provided.
Finding Value
Innovation
24
Unique Selling Proposition is the factor or consideration
presented by a seller as the reason that one product or service is
different from and better than that of the competition. Before you
can begin to sell your product or service to your target customers,
you have to sell yourself in it. This is especially important when
your product or service is similar to your competitors.
USP requires careful analysis of other businesses' ads and
marketing messages. If you analyze what they say or what they
sell, not just their product or service characteristics, you can learn
a great deal about how companies distinguish themselves from
competitors.
Here's how to discover your USP and how to use it to increase your sales
and profit:
25
information and questions that you can use to improve your
product or service.
Task 3: Interview
26
________________________________________________________
________________________________________________________
________________________________________________________
5. What were your preparations before you started the actual business?
________________________________________________________
________________________________________________________
________________________________________________________
2. Prepare a short narrative report about these topics and discuss it to the
class. You can highlight the aspect that intensifies your knowledge of
product development.
27
Task 5: Product Conceptualization
28
1. Identify
Customers N eed
7. Prepare a 2. Target
-
Development Plan Specifications
-
- -
- -
- -
- -
- -
29
Generating Ideas for Business
1. Examine existing goods and services. Are you satisfied with the
product? What do other people who use the product say about it? How
can it be improved? There are many ways of improving a product from the
way it is made to the way it is packed and sold. You can also improve the
materials used in crafting the product. In addition, you can introduce new
ways of using the product, making it more useful and adaptable to the
customers’ many needs. When you are improving the product or
enhancing it, you are doing an innovation. You can also do an invention
by introducing an entirely new product to replace the old one.
2. Examine the present and future needs. Look and listen to what the
customers, institutions, and communities are missing in terms of goods and
services. Sometimes, these needs are already obvious and identified right
away. Other needs are not that obvious because they can only be
identified later on, in the event of certain development in the community.
For example, a province will have its electrification facility in the next six
months. Only by that time will the entrepreneur could think of
electricallypowered or generated business such as photo copying,
computer service, digital printing, etc.
30
3. Examine how the needs are being satisfied. Needs for the products and
services are referred to as market demand. To satisfy these needs is to
supply the products and services that meet the demands of the market.
The term market refers to whoever will use or buy the products or services,
and these may be people or institutions such as other businesses,
establishments, organizations, or government agencies.
Businesses or industries in the locality also have needs for goods and
services. Their needs for raw materials, maintenance, and other services
such as selling and distribution are good sources of ideas for business.
A group of people in your neighborhood may have some special skills that
can be harnessed for business. For example, women in the Mountain
Province possess loom weaving skills that have been passed on from one
generation to another. Some communities set up weaving businesses to
produce blankets, decorative, and various souvenir items for sale to
tourists and lowlanders.
Business ideas can come from your own skills. The work and experience
you may have in agricultural arts, industrial arts, home economics, or ICT
classes will provide you with business opportunities to acquire the needed
skills which will earn you extra income should you decide to engage in
income-generating activities. With your skills, you may also tinker around
with various things in your spare time. Many products are invented this
way.
5. Read magazines, news articles, and other publications on new
products and techniques or advances in technology. You can pick up
new business ideas from magazines such as Newsweek, Reader’s Digest,
31
Business Magazines, “Go Negosyo”, Know About Business (KAB)
materials, and Small-Industry Journal. The Internet also serves as a library
where you may browse and surf on possible businesses. It will also guide
you on how to put the right product in the right place, at the right price, and
at the right time.
You have to select the most promising one among hundreds of ideas.
It will be good to do this in stages. In the first stage, you screen your ideas to
narrow them down to about few choices. In the next stage, trim down the
choices to two options. In the final stage, choose between the two and decide
which business idea is worth pursuing.
Branding
32
promise to your customers. It tells them what they can expect from your
product or service and it differentiates your offerings from other competitors.
Your brand is derived from who you are, who you want to be and what people
perceive you to be.
33
In generating a business idea, you should first identify the
type of business suited to your business idea. You should analyze
and scan the potential environment, study the marketing practices
and strategies of your competitors, analyze strengths,
weaknesses, opportunities, and threats in your environment to
ensure that the products or services you are planning to offer will
be patronized and within easy reach of target consumers.
• Keep your SWOT Analysis short and simple. Avoid complexity and over
analysis.
34
Task 6: SWOT Analysis
Directions: In a separate sheet of paper or in your notebook list down all your
observations for your business idea. Categorize your observations according
to strengths, weakness, opportunities and treats. After carefully listing them
down, use the stated strategies to come up with a sound analysis, activities
and best business idea.
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
Strategies:
35
• SW - Maximize on the Strengths to overcome the internal Weakness.
• OW - Capitalize on the Opportunities to eliminate the internal
Weakness.
Analysis:
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
Activities:
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
36
Reading books and watching videos have been considered as some of
the most effective educational activities that can help learners broaden their
understanding on a certain topic. In this particular task, you will be asked to
conduct extra reading and video viewing on the Internet with the following
topics:
37
Logo
Tagline
Vicinity Map
38
39
MODULE 3:
40
Reminder! Just follow the instructions given in this module. Now let us start
exploring new things in this module.
There are three learning objectives (LO) in this module: (1) plan and prepare
for configuration; (2) configure computer systems and networks; and (3) inspect and
test configured computer systems and networks. These three learning objectives
(LO) contain sub-topics that discuss the details on configuring computer systems and
networks. This module has four essential parts, namely: what to KNOW, what to
PROCESS, what to REFLECT and UNDERSTAND and finally, what to TRANSFER.
The competencies for this module are the following:
41
In order to master the listed competencies, you must gain knowledge of the
topics under what to KNOW, perform activities required under what to PROCESS,
accomplish additional tasks under what to REFLECT and UNDERSTAND and
finally show some evidences of your learning by transferring what you have
learned to a different context under
what to TRANSFER.
Pre Assessment
Before you proceed to the core of this module, challenge yourself first and dig
deep into your mind in order to answer the pre assessment exercises prepared for
you. Take time to answer it!
42
Directions: Write the letter of the correct answer in a clean sheet of paper.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Appearance and Themes c. Performance and Maintenance
b. Network and Internet d. Sounds, Speech and Audio
5. Which of the following applets does not belong to performance and
maintenance category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following is a wizard used to configure MS Windows for vision,
hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. Which of the following tab in direct X Diagnostic tool displays your current
audio settings?
a. Input c. Sound
b. Music d. System
8. Which of the following networking cable category is the most commonly used?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. What copper-cored cable is surrounded by a heavy shielding?
a. coaxial cable c. optical fiber
b. fiber optics d. twisted pair
10. What Ethernet cable is used to connect two devices directly?
a. cross- over c. both A and B
b. straight-through d. none of the options
11. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. Subnet mask
12. In which of the following IP address classes does 192.168.1.105 belong to?
a. Class A c. Class C e. Class E
43
b. Class B d. Class D
13. What command is used to test the ability of the source computer to reach a
specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. What do you call an approach to computer networking where all computers
show equivalent responsibility for processing data? a. Client server c. Peer
to client
b. Peer to peer d. None of the options
15. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
A B
1. Copper cabling used for a. Crimping tool
telephone communication b. Cross-over
2. Standard Ethernet cable c. Fiber-optic
3. Cable that has a very thin core d. Ipconfig
4. Cable that has a thicker core e. Multi-mode
5. Tool used for crimping RJ45 f. Ping
6. Connector for Cat 5e cable g. Protocol
7. Set of rules h. RJ45
8. Indicates the network portion of i. Single-mode
an IP address j. Straight-through
9. Command used find out the IP k. Subnet mask
address l. Twisted pair
10. Glass or plastic conductor
44
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
B. Skills Checklist
Configuration Skills
Directions: Below is a matrix containing the most important skills that one must have
to configure computer systems and networks successfully. Check (∕) the appropriate
column which describes the level of your confidence in performing the given tasks.
I can do it
I can do it confidently
I am not
Competencies confidently but with
confident 1
3 assistance 2
45
7. I can manage to create a
peer-to-peer networking.
8. I can configure Network
Interface Card using
DHCP.
9. I can enable a firewall.
10. I can configure file and
printer sharing.
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total number
of items. Refer to the verbal interpretation on the table below to determine your initial
competency on configuration of computer systems and networks.
Don’t feel bad if you got a “not yet confident” in all of the
competencies. B ear in mind that this is just a p re assessment of
the knowledge and skills on the lessons to be presented. Also, it
will guide and inspire you to study harder as you go along with the
lessons.
46
The following topics familiarize you with the tasks involved
in planning and preparing for configuration of computer systems
and networks . All you need to do is to carefully read all the topics
and apply the skills you have gained through the distinct activities
provided in this module. Good luck and have fun while learning!
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks. At the end of this lesson you are
expected to:
✓ Familiarize, follow and apply OHS in configuring computer systems and
networks;
✓ Prepare materials and tools for configuration;
✓ Check and adhere to the standard operating procedures and requirements
in computer system and network configuration; and ✓ Identify the
procedures in using the tools for configuration.
Safety Procedures
47
A safe work space is clean, organized, and well-lit. The disposal or recycling
of hazardous computer components must be done properly. Make sure to follow
regulations that govern how to dispose specific items. When an organization violates
these regulations, there can be legal consequences.
To keep you safe, this module provides the general and fire safety guidelines
that protects the technician and the equipment.
Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and
damage to eyesight. As a best practice, make sure that a fire extinguisher and first
aid kit are available in case of fire or injury. Here are some general safety guidelines:
• Remove your watch or any other jewelry and secure loose clothing.
• Turn off the power and unplug equipment before opening the case and
performing service.
• Cover any sharp edges inside the computer case with tape.
• Never open a power supply or a monitor.
• Do not touch areas in printers that are hot or those which use high voltage.
• Know where the fire extinguisher is located and learn how to use it.
• Know where the first aid kit is located.
• Keep food and drinks out of your workspace.
• Keep your workspace clean and free of clutter.
• Lift heavy objects with sturdy leg support to avoid back injury.
48
Peer-to-Peer Activity
General Directions: Get a partner to perform the next activity. Identify whether each
statement is true or false. Gather picture evidences that make it true or false. On the
third column, show the effects of not following the safety precautions through a picture
presentation.
Example:
Turn off the power and unplug equipment before opening the case and performing
service.
True
49
Research and Investigate
Directions: Form a group of five members and research on the different safety
precautions used in computer laboratory. Interview/Observe a practitioner while
lending a quality service in computer hardware servicing. Use a video camera to
record the event stressing the safety guidelines and procedures in the laboratory.
You will be rated according to the following rubrics:
Quality of Video It lacks clarity Most part is well The video was
(30%) and/or does not organized, clear well organized,
• Clarity and present ideas in and presents clear and
cohesiveness of a coherent way. ideas in a presents ideas in
the video coherent way. a coherent way.
• Organization and
coherence of
ideas
Interview on Questions were Most of the All of the
practitioner (20%) not congruent questions were questions were
with the topic congruent with congruent with
• Congruency of and were not the topic and the topic and
questions to the delivered delivered delivered
topic clearly. clearly. clearly.
• Clarity of questions
50
Application of Safety Procedures While Accomplishing a Task
Directions: After the interview and observation with a practitioner, your group will
showcase what you have learned through a role playing. You will be rated based on
the Rubrics written below:
51
Prepare Materials and Tools Used for Configuration
1. Microsoft System Configuration: This boot configuration utility allows you to set the
programs that will run at startup and to edit configuration files. It also offers
simplified control over Windows Services.
System Configuration Utility consists of five functional tabs such as
General, Boot, Services, StartUp and Tools. The succeeding table describes the
use and functionality of each tab:
52
Figure 4. General Tab
53
Boot Log. Stores all information from the boot process in
the file %SystemRoot% Ntbtlog.txt.
Base Video. Boots to the Windows graphical user
interface in minimal VGA mode. This loads standard
VGA drivers instead of display drivers specific to the
video hardware on the computer.
OS boot information. Shows driver names as drivers are
being loaded during the boot process.
Make all boot settings permanent. Does not track
changes made in System Configuration. Options can be
changed later using System Configuration, but must be
changed manually. When this option is selected, you
cannot roll back your changes by selecting Normal
startup on the General tab.
54
The Services tab allows you to enable or disable any of
the Microsoft Windows services or other program services
running on the computer. It lists all the services that start when
Services the computer boots, along with their status (Running or
Stopped). By checking the "Hide all Microsoft services" box at
the bottom of the window, you can see all non-Windows
services such as driver services and program services that are
often the cause of startup problems. Unchecking a box will
disable the service from starting.
Warning:
Disabling services that normally run at boot time might
cause some programs to malfunction or result in system
instability. Do not disable services in this list unless you know
they are not essential to your computer’s operation. Selecting
Disable all will not disable some secure Microsoft services
required for the operating system to start.
55
The Startup tab is one of the most frequent reasons
most Windows users enter the System Configuration utility. In
the Startup tab, you will be able to see the list of applications
that run when the computer boots, along with the name of their
publisher, the path to the executable file, and the location of
Startup the registry key or shortcut that causes the application to run.
These startup programs are often one of the biggest causes
for a computer to startup and run slow. You can clear the
check box for a startup item to disable it on your next boot. If
you have chosen Selective startup on the
General Tab, you must either choose Normal startup on the
General tab or select the startup item’s check box to start it
again at boot time. If you suspect an application has been
compromised, examine the Command column to review the
path to the executable file.
Note:
Disabling applications that normally run at boot time might
result in related applications starting more slowly or not
running as expected.
56
Figure 7. Startup Tab
1. The Registry has a hierarchical structure, like the directories on your hard disk.
Each branch (denoted by a folder icon in the Registry Editor, see below) is called
a key. Each key can contain other keys, as well as Values. Each value contains
57
the actual information stored in the Registry. There are three types of values:
String, Binary, and DWORD - the use of these depends upon the context.
2. There are six main branches (five in Windows 2000 and Windows XP), each
containing a specific portion of the information stored in the Registry. They are as
follows:
o HKEY_CLASSES_ROOT - this branch contains all of your file types as well
as OLE information for all your OLE-aware applications.
o HKEY_CURRENT_USER - this branch points to the part of HKEY_USERS
appropriate for the current user.
o HKEY_LOCAL_MACHINE - this branch contains information about all of
the hardware and software installed in your computer. Since you can
specify multiple hardware configurations, the current hardware
configuration is specified in
HKEY_CURRENT_CONFIG.
o HKEY_USERS - this branch contains certain preferences (such as colors
and control panel settings) for each of the users of the computer. In
Windows 95/98/Me, the default branch here contains the currently-logged
in user. In Windows 2000/XP, the default branch here contains a template
to be used for newlyadded users.
o HKEY_CURRENT_CONFIG - this branch points to the part of
HKEY_LOCAL_MACHINE appropriate for the current hardware
configuration.
o HKEY_DYN_DATA (Windows 95/98/Me only) - this branch points to the
part of HKEY_LOCAL_MACHINE, for use with Windows' Plug-&-Play
subsystem.
3. Direct X Diagnostic: The Microsoft DirectX Diagnostic Tool provides you with
information about the DirectX API components and drivers on your system. It
enables you to test sound and graphics output and Microsoft DirectPlay service
providers. You can use the diagnostic tool to gather information about your system
to use for diagnostic purposes.
If you are experiencing problems when running
Microsoft DirectX applications, the DirectX Diagnostic Tool can help you find the
source of the trouble such as incorrect versions of DirectX components, lack of
hardware acceleration, devices that are not connected and unsigned drivers.
58
Figure 9. DX Diagnostic Tool
59
Printers and Other Hardware: Applets to configure devices connected to
your computer:
✓ Game controllers
✓ Keyboard
✓ Mouse
✓ Phone and modem options
✓ Printers and faxes
✓ Scanners and cameras
User Accounts: Applets to configure options for users and their email:
✓ E-mail
✓ User accounts
Date, Time, Language, and Regional Options: Applets to change settings
based on your location and language:
✓ Date and time
✓ Regional and language options
• Accessibility Options: A wizard used to configure windows for vision,
hearing, and mobility needs
• Security Center: Applet used to configure security settings for:
✓ Internet options
✓ Automatic updates
✓ Windows firewall
1. Event Viewer
2. Safe Boot
3. List of services that 6. No GUI Boot
start when computer 7. OS Boot information
boots 8. Hide All Microsoft
4. Make all boot settings Services
permanent 9. Convenient List of
5. Normal startup Diagnostic Tools
10. Base Video
II. Applet Grouping
60
Directions: Complete the diagram of various Control Panel Applets with the
components included in their category.
61
Research and Explore
Directions: Conduct a research that identifies other available tools used for computer
system and network configuration. Use some other resources like the World Wide
Web and interview a practitioner (preferably an IT specialist or a computer technician)
to find out the different tools they use for configuration. Your research will be rated
according to the following criteria:
62
Content/Information The research The research The research The research
(50%) was not was objective was objective was objective
objective and and for some and for the and
• All elements of the poorly part most part addresses
topics are addresses the addresses an addresses an with an
addressed issues in-depth in-depth indepth
• The information is
referred in the analysis The analysis of analysis all
technically sound
• Information based proposed provided most issues the issues
on careful research topic. information referred in the referred in the
Coherence of The provided was, for some proposed proposed
information information part, topic. topic.
was not necessary The provided The provided
necessary or and sufficient information information
not sufficient to discuss was, for the was
to discuss these issues. most part, necessary
these issues. necessary and sufficient
and sufficient to discuss
to discuss these issues.
these issues.
Quality of Writing The essay The essay The essay The essay
(25%) was not well was well was well was well
written, and written for written for the written from
• Clarity and contains some part, most part, start to finish,
cohesiveness of many spelling without without without
sentences and errors, and/or spelling, spelling, spelling,
paragraphs No
grammar grammar or grammar or grammar or
errors in spelling,
grammar and use errors and/or use of use of use of
of English use of English English English
• Organization and English errors. errors. errors.
coherence of errors. The essay is The essay is The essay
ideas It lacks clarity for some part for the most was well
and/or does well part well organized,
not present organized, organized, clear and
ideas in a clear and clear and presents
coherent presents presents ideas in a
way. ideas in a ideas in a coherent
coherent coherent way.
way. way.
63
References (10%) References Some of the Most of the All of the
Soundness of were not references references references
references appropriately were were were
used and appropriately appropriately appropriately
cited. used and used and used and
cited. cited. cited.
64
Oral Presentation
Directions: After the thorough research and exploration, you have to present your work
individually in an oral presentation. Your performance will be rated based on the rubrics
provided in this section.
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
a logical manner
4. Used complete sentence
5. Offered a concluding
statement
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained good and
proper posture
9. Utilized audio-visual
materials
10. Answered questions
sufficiently and received
comments openly
Total
Grand Total
Legend:
B- Beginner P- Proficient
D- Developing A- Advance
65
AP- Approaching Proficiency
As a future computer technician you must be diligent and eager to know the
different procedures in using the tools for computer system configuration. This will help
and guide you to carry out a particular job in a proper manner. Once you already identify
them, you must also acquire the necessary and appropriate skills to apply them in actual
situations.
This part of the module present some of the required procedures in computer
system configuration. Take note that you need to exert extra effort in finding out some
procedures which are not in this module. This is your chance to explore and learn through
your own experience.
66
Figure 10. General Tab of Microsoft system configuration
67
✓ Lastly, you can delete a key or value by clicking on it, and pressing Delete on the
keyboard, or by right-clicking on it, and choosing Delete.
To run the DirectX Diagnostic Tool (DX Diagnostic Tools Window of Windows XP
differs from Windows 7 but it does the same function):
• Click on Start Button, type Run on the search box.
• On the Run window, Type in dxdiag and click Ok or press Enter, as shown
in Figure 9, Run Dialog Box.
Figure12. Run
Dialog Box
68
Figure13. System Tab of DX Diagnostic Tool
❖ The System tab shows information about your computer and displays the version of
DirectX installed on your computer.
❖ The DirectX Files tab shows the file name and the version number for each DirectX
file installed on your computer. It also shows the file names and the version numbers
of other files that are used by games that are running under DirectX.
❖ The Display tab lists your current display settings, and allows you to disable
DirectDraw, Direct3D, and AGP Texture Acceleration. You can also test DirectDraw
and Direct3D from the Display tab which will indicate that the DirectX Graphics
runtime files are installed and operating correctly. It will also display your device's
available memory and can tell you if your video driver has passed Microsoft's
Windows Hardware Quality Labs testing standard. The DirectX Diagnostic Tool,
however, cannot report memory that is in use at the time that it starts and you may
see less memory reported than your video card actually has.
69
Figure14. Display Tab of DX Diagnostic Tool
❖ The Sound tab displays your current audio settings and allows you to test
DirectSound. It will tell you if the audio driver are signed, meaning that it has passed
Microsoft's Windows Hardware Quality Labs testing standard. The Hardware Sound
Acceleration Level slider is used to correct audio glitches that might be caused by
some audio drivers. You can adjust the slider settings and see if it provides better
results in your application. Be sure not to lower it too much or you may disable some
audio features of your system. If the tool detects a problem with your sound settings,
a warning message is displayed in the Notes box.
❖ The Music tab displays your current MIDI settings, and allows you to test the
DirectMusic component of DirectX. Click on the Test DirectMusic button to perform
the test. If the DirectX Diagnostic Tool detects a problem with DirectMusic, a warning
message is displayed in the Notes box.
70
Figure15. Sound Tab of DX Diagnostic Tool
❖ The Input tab lists the input devices connected to your computer such as USB and
PS2 devices. It also displays the input drivers installed on your computer. If the
DirectX Diagnostic Tool detects a problem with an input device or an input device
driver, a warning message is displayed in the Notes box.
71
Figure16. Input Tab of DX Diagnostic Tool
❖ The Network tab lists the registered DirectPlay Service Providers. These are the
connection methods that DirectPlay will operate across. A registry problem here can
normally be resolved by reinstalling DirectX. A registry error here can normally be
resolved by removing and reinstalling that application. If the DirectX Diagnostic Tool
detects a problem with a DirectPlay Service Provider or Application, a warning
message is displayed in the Notes box.
❖ The More Help tab allows you to further troubleshoot problems that the other tabs
could not resolve. Features include the DirectX troubleshooter, sound
troubleshooter, system information tool and the override tool which will override
DirectDraw’s refresh rate.
Directions: In this activity you will back up a computer registry. You will also perform a
recovery of a computer registry. The registry is also called System State data. You will
be given 1 hour to accomplish this activity.
72
Recommended Equipment:
A computer system running Windows XP is required for this exercise.
Procedures:
Step 1
✓ Log on to the computer as yourself. ✓ Click Start > Run.
✓ Type ntbackup and then click OK. The “Backup or Restore Wizard” window
appears.
Step 2
✓ Click Advanced Mode.
✓ The Backup Utility window appears.
Step 3
✓ Click Backup Wizard.
73
✓ The “Welcome to the Backup Wizard” window appears.
Step 4
✓ Click Next.
✓ Click the Only back up the System State data radio button.
Step 5
✓ Click Next.
74
✓ The “Backup Type, Destination, and Name” window appears.
Step 6
✓ Click Browse.
✓ If you are asked to insert a disk into the floppy disk drive, click Cancel.
✓ The “Save As” dialog box appears.
Step 7
✓ Click the My Documents icon on the left side
of the “Save As” dialog box.
75
✓ Click Save. ✓ The “Backup Type, Destination, and Name” window re-appears.
Step 8
✓ Click Next.
✓ The “Completing the Backup Wizard” appears.
Step 10
76
✓ Click Next.
✓ The “How to Backup” window appears.
Step 12
✓ Click Replace the existing backups, and then click Next.
✓ The “When to Back Up” window appears.
77
Figure 27. When to Backup Window
Step 13
✓ At the “When To Back Up” window, click Now and then click Next. ✓ The
“Completing the Backup Wizard” window appears.
Step 14
✓ Click Finish.
✓ The “Backup Progress” window appears.
78
Figure 29. Backup Progress Window
Step 15
✓ Click Report.
✓ The Notepad application window appears containing the report.
79
Figure30. Notepad Application Window
✓ Close Notepad.
✓ In the Backup Progress dialog box, click Close.
✓ Close the Backup Utility.
Step 16
✓ Click Start >Run.
✓ Type regedit in the “open” field. The Registry Editor window appears.
Step 18
✓ Click the Restore files and settings radio button and then click Next.
✓ The “What to Restore” window appears.
81
Figure 33. Click System State Check box
Step 20
✓ Click Next.
✓ The “Completing the Backup or Restore Wizard” window appears.
82
Figure 35. Where to Restore Window
Step 22
✓ The default restoration location is “Original location”. ✓ Click Next.
✓ The “Restoring System State will always overwrite current System State
unless restoring to an alternate location.” Warning window appears.
✓ Click OK.
Step 23
✓ Click the Replace existing files if they are older than the backup files radio
button.
83
Figure 37. How to Restore Window
Step 24
✓ Click Next.
✓ The “Advanced Restore Options” window appears
84
✓ Be sure that all three check boxes are selected, and then click Next.
✓ Click Finish.
✓ The system recovery begins by copying the files back to the computer.
✓ When prompted to restart the computer, click Yes. The computer will restart.
Step 25
✓ Click start > Run.
✓ Type regedit in the “Open” field.
✓ Click OK.
✓ You should see the “Screen Saver Stars” Registry key in the Registry Editor
application window.
✓ Click File > Exit.
Finish
Workmanship (15%)
-Utilized organized
materials and tools
while accomplishing the
task and exhibited time
management
Quality of work (40%) -
the windows registry was
fully backed up
85
After dealing with the preparations for configuration , you
can now proceed with the next section of this module which is
Configuring Computer System and Network.
This lesson is designed to give you the proper procedures
used in configuring computer systems and networks. At the end of
this lesson you should be able to:
✓ Inspect networking devices and connectors;
✓ Create a cross -over an d straight -through Ethernet
cables;
✓ Assign and configure IP address to clients and
servers;
✓ Create a peer-to-peer network;
✓ Enable network security; and
✓ Configure file and printer sharing.
86
Safety Precautions Related to Networks
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
87
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Specific types of tools and chemicals are used when working with fiber-optic cable.
These materials must be handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle
them with extreme care. Read the instructions on the label, and follow them carefully.
Also, read the material safety data sheet (MSDS) that accompanies the chemicals to
know how to treat someone in case of emergency.
Tools
When working with any tool, safety should always be your first priority. Any
compromise in safety could result in serious injury or even death. The tools used for
working with fiber optics have sharp cutting surfaces that are used to scribe glass. Other
tools pinch cables with high pressure to fasten connectors to them. These tools can
produce shards of glass that can splinter and fly into the air. You must avoid getting them
on your skin and in your mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce
tiny fragments of glass or plastic that can penetrate your eyes or skin and cause severe
irritation. The fibers can be extremely difficult to see on your skin because they are clear
and small. When you work with fiber-optic cabling, the working surface should be a dark
mat so that you can see the tiny glass or plastic fragments. The mat should also be
resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiberoptic fragments
with your fingers. Use tape to pick up small fragments, and dispose them off properly.
Use a disposable container, such as a plastic bottle with a screw-on lid, to store fiber
fragments. Close the lid tightly before disposing the container.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The
light is a color that humans cannot see. It can damage your eyes before you can feel it.
When you use a magnifier to inspect fiber-optic cable and connectors, the light emitted
from the fiber could be directed into your eyes. When working with fiber, be sure to
disconnect the light source. Use special detectors to help you tell if a fiber is energized.
88
Caution:
Obtain proper training before you attempt to cut, strip, or splice
fiber-optic cable. An experienced technician should supervise you until
you become adequately skilled.
To make data transmission more extensible and efficient than a simple peer-to-
peer network, network designers use specialized network devices such as hubs,
switches, routers, and wireless access points to send data between devices. You have
already discussed in your Grade 9 CHS class the different devices used in networking
and which provides you the knowledge on the common networking cables that are
essential in putting up a network.
Until recently, cables were the only medium used to connect devices on networks.
A wide variety of networking cables are available. Coaxial and twisted-pair cables use
copper to transmit data. Fiber-optic cables use glass or plastic to transmit data. These
cables differ in bandwidth, size, and cost.
You need to know what type of cable to use based on the job requirements. You also
need to be able to troubleshoot and repair problems along the way.
Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit that transmits
data. The pair is twisted to provide protection against crosstalk, the noise generated by
adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded
plastic insulation and are twisted together. An outer jacket protects the bundles of twisted
pairs.
89
Source: www.lanshack.com
Figure 39. UTP and STP Cable
When electricity flows through a copper wire, a magnetic field is created around
the wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged
magnetic fields. When the two wires of the circuit are next to each other, the magnetic
fields cancel each other out. This is called the cancellation effect. Without the cancellation
effect, your network communications become slow because of the interference caused
by the magnetic fields.
90