HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL
The unit of competency, “SET-UP COMPUTER SERVERS ”, is one of the
competencies of COMPUTER SYSTEM SERVICING NCII , a course which
comprises the knowledge, skills, and attitudes required for a TVET trainee to
posses.
The module, SETTING-UP COMPUTER SERVERS , contains training
materials and activities related to receiving reservation request, recording details
of reservation, updating reservations and advising others on reservation details.
In this module, you are required to go through a series of learning activities
in order to complete each learning outcome. In each learning outcome are
Information Sheets, Self-checks, Operation Sheets, Task Sheets, and Job Sheets.
Follow and perform the activities on your own. If you have questions, do not
hesitate to ask for assistance from your facilitator.
Remember to:
Read information sheet and complete the self-check.
Perform the Task Sheets, Operation Sheets, and Job Sheets until you are
confident that your outputs conform to the Performance Criteria Checklists
that follow the said work sheets.
Submit outputs of the Task Sheets, Operation Sheets, and Job Sheets to
your facilitator for evaluation and recording in the Achievement Chart.
Outputs shall serve as your portfolio during the Institutional Competency
Evaluation. When you feel confident that you have had sufficient practice,
ask your trainer to evaluate you. The results of your assessment will be
recorded in your Achievement Chart and Progress Chart.
You must pass the Institutional Competency Evaluation for this competency
before moving to another competency. A Certificate of Achievement will be awarded
to you after passing the evaluation.
You need to complete this module before you can perform the module on
maintaining Computer Systems and Networks.
COMPETENCY BASED LEARNING MATERIAL
Sector :ELECTRICAL & ELECTRONICS SECTOR
Qualification Title :COMPUTER SYSTEM SERVICING NCII
Unit of Competency :SET-UP COMPUTER SERVERS
Module Title :SETTING-UP COMPUTER SERVERS
MODULE CONTENT
Qualification Title : Computer System Servicing NCII
Unit of Competency : Set-up Computer Servers
Module Title : Setting-up Computer Servers
Introduction
This unit of competency deals with the skills, knowledge and attitude in
setting-up computer servers computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network services as
well as to perform testing, documentation and pre-deployment procedures.
Learning Outcomes:
Upon completion of this module, you MUST be able to:
1.Set-up user access
2.Configure network services
3.Perform testing, documentation and pre-deployment procedures
ASSESSMENT CRITERIA
1.User folder is created in accordance with network operating system (NOS)
features
2.User access level is configured based on NOS features and established
network access policies/end-user requirements.
3.Security check is performed in accordance with established network access
policies/end-user requirements.
4.Normal functions of server are checked in accordance with
manufacturer’s instructions
5.Required modules /add-ons are installed/updated based on NOS
installation procedures
6.Network services to be configured are confirmed based on user/system
requirements
7.Operation of network services are checked based on user/system
requirements
8.Unplanned events or conditions are responded to in accordance with
established procedures
9.Pre-deployment procedures is undertaken based on enterprise policies
and procedures
10.Operation and security check are undertaken based on end-user
requirements
11.Reports are prepared/completed according to enterprise policies and
procedures.
COMPUTER SYSTEM SERVICING NCII
LIST OF COMPETENCIES
CORE COMPETENCIES
No.Unit of Competency Module Title Code
1.Install and configure
computer systems
Installing and configuring
computer systems
ELC724331
2 Set-up Computer
Networks
Setting-up Computer
Networks
ELC724332
3 SET-UP COMPUTER
SERVERS
SETTING-UP COMPUTER
SERVERS
ELC724333
4 Maintain and Repair
Computer Systems and
Networks
Maintaining and
Repairing Computer
Systems and Networks
ELC724334
LEARNING OUTCOME SUMMARY
LEARNING OUTCOME #1: SET-UP USER ACCESS
CONTENTS:
This module will teach you how to set up user access
Upon completion of this module, you will be able to:
1.Create User Folder in Accordance with Network Operating Systems (NOS
Features).
2.Configure User Access Level Based on NOS Features and Established
Network Access Policies/ End User Requirements.
3.Perform Security Check in Accordance with Established Network Access
Policies/ End-User Requirements.
ASSESSMENT CRITERIA:
1.User folder is created in accordance with network operating system (NOS)
features
2.User access level is configured based on NOS features and established
network access policies/end-user requirements.
3.Security check is performed in accordance with established network access
policies/end-user requirements.
CONDITIONS:
The student/trainee must be provided with the following:
Given access to a Network Operating System environment (e.g., Windows
Server, Linux-based NOS, or simulation software).
With tools, equipment, and organizational policies available.
Within the specified timeframe and in accordance with TESDA competency
standards.
ASSESSMENT METHODS:
Written examination
Practical Demonstration w/ oral questioning
Interview
Portfolio
LEARNING EXPERIENCES
LEARNING OUTCOME 1
SET-UP USER ACCESS
Learning Activities Special Instructions
Read Information Sheet 3.1-1: on
the “Create a user folder using
your network operating system in
your computer network.”
This Learning Outcome deals with the
development of the Institutional Competency
Evaluation Tool which trainers use in
evaluating their trainees after finishing a
competency of the qualification.
Go through the learning activities outlined
for you on the left column to gain the
necessary information or knowledge before
doing the tasks to practice on performing the
requirements of the evaluation tool.
The output of this LO is a complete
Institutional Competency Evaluation
Package for one Competency of Computer
Hardware Servicing NC II. Your output
shall serve as one of your portfolio for your
Institutional Competency Evaluation for Set-
up user access.
Feel free to show your outputs to your
trainer as you accomplish them for guidance
and evaluation.
After doing all the activities for this LO, you
are ready to proceed to the next LO:
Configure network services.
Answer Self-check 3.1-1 on the
“Create a user folder using your
network operating system in your
computer network.”
Read Information Sheet 3.1-2: on
the “Configure User Access Level
Based on NOS Features and
Established Network Access
Policies/ End User
Requirements.”
Answer Self-check3.1-2 on
“Configure User Access Level
Based on NOS Features and
Established Network Access
Policies/ End User
Requirements.”
Read Information Sheet 3.1-3: on
the “Perform Security Check in
Accordance with Established
Network Access Policies/ End-
User Requirements.”
Answer Self-check 3.1-3 on the
“Create a user folder using your
network operating system in your
computer network.”
INFORMATION SHEET 3.1-1
CREATE A USER FOLDER USING YOUR NETWORK OPERATING SYSTEM
(NOS) IN YOUR COMPUTER NETWORK
Learning Objectives
After completing this module, you should be able to:
1.Explain the role and features of a Network Operating System (NOS).
2.Differentiate client/server from peer-to-peer architectures in relation to user
folder management.
3.Create user folders using NOS features and assign access permissions.
4.Demonstrate secure file and folder management according to organizational
policies.
5.Perform self-checks to validate your understanding and application of NOS
folder creation.
What is a Network Operating System (NOS)?
A Network Operating System is software that enables computers to
communicate, share resources, and manage files and users in a network
environment. Unlike standalone operating systems, a NOS coordinates the
activities of multiple computers across a network.
Key Functions of a NOS:
File and print sharing
User and account management
Security and access control
Backup and data management
Support for client/server or peer-to-peer networks
Types of NOS Structures
1.Peer-to-Peer NOS
All computers are equal.
Users can share folders and resources directly.
Example: Windows for Workgroups.
Advantages:
Easy to set up
No dedicated server needed
Disadvantages:
Lack of centralized security
no centralized storage.
2.Client/Server NOS
Server provides centralized storage, management, and security.
Clients access resources through the server.
Example: Windows Server.
Advantages:
Centralized management
strong security
scalable.
Disadvantages:
Higher cost
requires maintenance.
Creating User Folders in a NOS
When creating a user folder in a NOS, the following procedures are commonly
followed:
1.Access the Server or Shared Computer
Log in with administrator credentials.
2.Create a Folder for the User
Right-click > New Folder > Name the folder according to username or
user ID.
3.Set Permissions
Right-click > Properties > Security/Sharing tab.
Assign permissions such as Read, Write, or Full Control.
Restrict unauthorized users.
4.Assign the Folder to the User
Configure the user’s profile to map their folder as a home directory or
network drive.
5.Test Access
Log in as the user and verify if the folder is accessible with the
assigned permissions.
Security Considerations
Assign strong, unique passwords for each user.
Restrict folder access to authorized users only.
Use encryption for sensitive files.
Regularly back up user folders.
SELF-CHECK 3.1-1
TRUE OR FALSE
Instruction:
Read each statement carefully. Write TRUE if the statement is correct and FALSE
if the statement is incorrect.
1.A Network Operating System (NOS) allows multiple users to share resources
and manage files in a network.
2.In a peer-to-peer NOS, one computer always acts as the central server.
3.Creating a user folder requires assigning the correct permissions to ensure
security.
4.In a client/server NOS, the server provides centralized management of
resources.
5.Backing up user folders is unnecessary since files are stored in the network.
TASK SHEET 3.1-1
CREATE A USER FOLDER USING YOUR NETWORK OPERATING
SYSTEM (NOS) IN YOUR COMPUTER NETWORK
Purpose:
This task sheet will guide the trainee in creating a user folder, configuring
access permissions, and verifying security settings using the features of a
Network Operating System (NOS).
Materials, Tools and Equipment:
1.Computer with installed NOS (e.g., Windows Server / Linux / or
Windows with sharing enabled)
2.Administrator account credentials
3.User accounts for testing (e.g., trainee01, trainee02)
4.Network connection (for client-server setup)
Steps and Procedures:
1.Log in to the server or administrator account of the computer
running the NOS.
2.Create a new folder named after the user (e.g., trainee01_folder).
3.Set folder permissions:
Right-click the folder → Properties → Security/Sharing tab.
Add the specific user account (e.g., trainee01).
Assign Read/Write or Full Control permissions as required.
4.Restrict unauthorized access by removing unnecessary user groups
or “Everyone” access.
5.Assign the folder as the user’s home directory or map it as a
network drive (if applicable).
6.Test the setup:
Log in as trainee01 and check if the folder is accessible.
Log in as trainee02 (or another account) and verify that access
is denied.
7.Document the results by taking note of permissions granted and
denied.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.1-1
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Correctly create a user folder following NOS features
and requirements.
Assign the appropriate access level to the user
folder.
Restrict access to unauthorized users.
Demonstrate proper security practices (unique
passwords, proper permissions).
Verify functionality by testing folder access with
different user accounts.
Follow organizational safety/security protocols.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.1-2
CONFIGURE USER ACCESS LEVEL BASED ON NOS FEATURES AND
ESTABLISHED NETWORK ACCESS POLICIES/ END USER REQUIREMENTS.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Explain user roles and access levels in a Network Operating System.
2.Identify organizational network access policies and end-user requirements.
3.Configure user roles, groups, and permissions based on NOS features.
4.Apply security principles when assigning user access.
5.Verify and validate access configuration through testing.
User Access Levels in NOS
A user access level determines what resources and operations a user is
allowed to perform in a network environment. Access levels are configured
through:
User accounts – identities for each individual.
Groups – collections of users with similar access needs.
Roles – predefined sets of permissions.
Permissions – rights to perform actions (e.g., read, write, modify, execute).
Common Access Levels
1.Administrator / Root
oFull control over the system.
oCan create, delete, or modify accounts, files, and configurations.
2.Standard / Authenticated User
oAccess to personal files and assigned shared resources.
oCannot change system-wide settings.
3.Guest / Anonymous User
oLimited or temporary access.
oNo modification rights.
Established Network Access Policies
Network access policies are rules and standards defined by an organization to
ensure proper and secure use of network resources. These include:
Principle of Least Privilege (POLP): Users are given the minimum access
needed to perform their tasks.
Role-Based Access Control (RBAC): Access is granted based on the user’s
role.
Password and authentication policies: Use of strong, unique passwords
and regular updates.
Data security policies: Restricting access to sensitive information.
Audit and monitoring policies: Regular review of user access logs.
Steps to Configure User Access Levels
1.Identify End-User Requirements
oDetermine what resources each user needs (files, applications,
printers).
oIdentify user’s role in the organization.
2.Create or Assign User Accounts
oUse administrator privileges to add or edit accounts.
oAssign users to appropriate groups.
3.Configure Permissions
oUse NOS features (e.g., Security tab in Windows, chmod in Linux) to
grant access rights.
oSet permissions: Read, Write, Execute, Modify, Full Control.
4.Apply Security Policies
oRemove “Everyone” or unnecessary access rights.
oEnforce strong password rules.
oConfigure login restrictions if required.
5.Test and Verify
oLog in as the user to confirm access.
oCheck restrictions by attempting unauthorized actions.
Example Scenario
User Role: Accounting staff.
Requirement: Access to shared “Finance” folder (read/write), but no access
to “HR” or “Admin” folders.
Configuration: Assign user to Finance Group, set read/write on Finance
folder, deny access to other folders.
Testing: Verify that the user can open and edit files in Finance, but cannot
access HR or Admin.
SELF-CHECK 3.1-2
TRUE OR FALSE
Instruction:
Read each statement carefully. Write TRUE if the statement is correct and FALSE
if the statement is incorrect.
1.The principle of least privilege means giving users all possible permissions to
avoid access issues.
2.Role-based access control (RBAC) assigns permissions based on the user’s
job role.
3.Guests usually have limited access and cannot change system-wide settings.
4.Testing and verifying access ensures that permissions match end-user
requirements.
5.Removing “Everyone” group access from sensitive folders is a good security
practice.
TASK SHEET 3.1-2
CONFIGURE USER ACCESS LEVEL BASED ON NOS FEATURES AND
ESTABLISHED NETWORK ACCESS POLICIES/ END USER
REQUIREMENTS.
Purpose:
This task sheet aims to guide the trainee in configuring user accounts, groups, and
permissions in a Network Operating System (NOS) to meet established network access
policies and end-user requirements.
Materials, Tools and Equipment:
1.Computer with installed NOS (e.g., Windows Server / Linux)
2.Administrator account credentials
3.At least 3 test user accounts (e.g., Admin01, Staff01, Guest01)
4.Shared folders (e.g., SharedDocs, PublicDocs, FinanceDocs)
5.Network access policies (provided by instructor or organization)
Steps and Procedures:
1.Log in using administrator credentials on the NOS.
2.Review network access policies to identify the required access levels
for different user roles.
3.Create or use existing user accounts (Admin01, Staff01, Guest01).
4.Assign roles and permissions based on policy and requirements:
Admin01: Full control over all folders.
Staff01: Read/Write access to SharedDocs; no access to
AdminDocs.
Guest01: Read-only access to PublicDocs.
5.Set folder permissions using NOS features:
Windows: Right-click folder → Properties → Security/Sharing
tab → Edit permissions.
Linux: Use chmod, chown, or role-based access commands.
6.Apply security best practices:
Remove “Everyone” or unnecessary access.
Ensure users have strong passwords.
Restrict guest permissions.
7.Test and verify:
Log in as each user (Admin01, Staff01, Guest01).
Attempt to access folders according to their assigned role.
Document results.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.1-2
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Correctly configure user access levels according to
NOS features.
Follow organizational network access policies.
Assign permissions based on end-user
requirements.
Apply the Principle of Least Privilege (POLP) when
granting access.
Demonstrate verification of user access through
actual login testing.
Ensure security by restricting unauthorized access
and enforcing password policies.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.1-3
PERFORM SECURITY CHECK IN ACCORDANCE WITH ESTABLISHED
NETWORK ACCESS POLICIES/ END-USER REQUIREMENTS.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Explain the importance of performing security checks in a network
environment.
2.Identify common security risks at the client, network, and server levels.
3.Perform routine security checks according to network access policies.
4.Apply end-user requirements in conducting security assessments.
5.Document and report security check findings.
Importance of Security Checks
Protects organizational data from unauthorized access.
Ensures compliance with network access policies.
Prevents disruptions due to malware or hacking.
Helps maintain trust and accountability in network operations.
Security Risks in a Network Environment
Client Risks:
Weak or shared passwords.
Unauthorized software installations.
Leaving sessions open without logging out.
Malware/viruses on individual devices.
Network Risks:
Eavesdropping on transmitted data.
Weak or outdated encryption methods.
Misconfigured routers, switches, or firewalls.
Unauthorized devices connected to the network.
Server Risks:
Outdated security patches.
Overly broad folder/file permissions.
Inadequate antivirus and backup measures.
Lack of access logging or monitoring.
Security Policies and End-User Requirements
Policies are rules set by the organization to ensure safe use of resources. These
may include:
Password policy: Minimum length, complexity, and expiration.
Access control policy: Role-based access (Administrator, Staff, Guest).
Data protection policy: Encryption of sensitive information.
Audit policy: Regular reviews of accounts and permissions.
End-user requirements: Access tailored to job role (e.g., HR staff access HR
files but not Finance files).
Step-by-Step Security Check Procedure
1.Review network access policies – Identify password rules, login
requirements, and permission guidelines.
2.Inspect user accounts – Remove inactive, duplicate, or unauthorized
accounts.
3.Check access permissions – Ensure files and folders have the correct
read/write/execute permissions.
4.Verify client security – Ensure users log out properly, update antivirus,
and comply with password rules.
5.Assess network security – Check for encryption, firewall rules, and
unusual network traffic.
6.Test server security – Confirm latest updates/patches, antivirus
installation, and backups.
7.Perform compliance testing – Log in with test accounts to verify
permissions match policies.
8.Document and report findings – Record observations and suggest
corrective measures.
Example Scenario
Policy: Only Accounting staff should access the Finance folder with
read/write permissions.
Action: During the check, you discover a Guest account also has access.
Correction: Remove Guest account permissions, keep access only for
Accounting Group.
Documentation: Record that Guest access was removed as a corrective
measure.
SELF-CHECK 3.1-3
TRUE OR FALSE
Instruction:
Read each statement carefully. Write TRUE if the statement is correct and FALSE
if the statement is incorrect.
1.Security checks are only necessary when a problem occurs in the network.
2.Weak passwords are a common client-side security risk.
3.Encrypting sensitive data during transmission helps protect against
eavesdropping.
4.Removing unnecessary or inactive accounts is part of performing a proper
security check.
5.Backups are not part of security checks because they do not prevent
hacking.
ANSWER KEY
SELF-CHECK 3.1-3
TRUE OR FALSE
1.False – Security checks should be regular, not only when issues occur.
2.True – Weak passwords make systems vulnerable.
3.True – Encryption helps protect data.
4.True – Removing unnecessary accounts strengthens security.
5.False – Backups are part of security measures to ensure data recovery.
TASK SHEET 3.1-3
PERFORM SECURITY CHECK IN ACCORDANCE WITH ESTABLISHED
NETWORK ACCESS POLICIES/ END-USER REQUIREMENTS.
Purpose:
This task sheet will guide the trainee in conducting a systematic security
check to ensure that users, folders, and network resources comply with
access policies and meet end-user requirements.
Materials, Tools and Equipment:
1.Computer with installed Network Operating System (NOS) (Windows
Server/Linux)
2.Administrator account credentials
3.Sample user accounts (e.g., staff01, staff02, guest)
4.Shared folders with varying permission levels
5.Antivirus software
6.Access to basic network tools (firewall, event viewer, network monito
Steps and Procedures:
1.Log in as an administrator on the server or workstation.
2.Review organizational policies regarding access control, password
rules, and data protection.
3.Check user accounts:
Identify active, inactive, or duplicate accounts.
Disable or delete unauthorized accounts.
4.Inspect folder permissions:
Verify if each folder is assigned to the correct user/group.
Remove or restrict “Guest/Everyone” access if unnecessary.
5.Verify client security compliance:
Check if antivirus is updated.
Confirm that password policies are followed (complexity,
expiration).
6.Test network security:
Ensure firewall is enabled.
Check for unusual connections or unauthorized devices.
7.Check server security:
Ensure system patches and updates are installed.
Verify if backups are scheduled and functioning.
8.Perform compliance test:
Log in using a test account to confirm permissions align with
policy.
9.Document findings in a Security Check Report including issues
found and corrective actions taken.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.1-3
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Identify and follow established network access
policies.
Detect unauthorized or inactive accounts.
Verify that access permissions meet end-user
requirements.
Ensure antivirus, firewall, and updates are properly
functioning.
Demonstrate verification of user access through
actual login testing.
Demonstrate corrective actions for identified security
risks.
Document findings in a clear and complete report.
Apply safety, security, and organizational protocols.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
LEARNING OUTCOME SUMMARY
LEARNING OUTCOME #2 : CONFIGURE NETWORK SERVICES
CONTENTS:
This module will teach you how to Configure Network Services
Upon completion of this module, you will be able to:
1.Check Normal Functions of Server in Accordance with Manufacturer’s
Instructions.
2.Install/ Update Modules / Add-Ons are Based on NOS Installation
Procedures.
3.Confirm Network Services to be Configure Based on User/System
Requirements.
4.Checked Operation of Network Services Based on User/ System
Requirements.
5.Respond to Unplanned Events or Conditions in Accordance with Established
Procedures.
ASSESSMENT CRITERIA:
1. Normal functions of server are checked in accordance with
manufacturer’s instructions
2. Required modules /add-ons are installed /updated based on NOS
installation procedures
3. Network services to be configured are confirmed based on
user/system requirements
4. Operation of network services are checked based on user/system
requirements
5. Unplanned events or conditions are responded to in accordance with
established procedures
CONDITIONS:
The student/trainee must be provided with the following:
Personal Protective equipment (ex. protective eyewear, anti-static wrist
wrap)
Electronic laboratory hand tools (assorted pliers, assorted screw drivers,
soldering iron & desoldering tool)
LAN tester
Crimping tools
RS 232 pin exertion/ extraction tool
Hand-outs
ASSESSMENT METHODS:
Written examination
Practical Demonstration w/ oral questioning
Interview
Portfolio
LEARNING EXPERIENCES
LEARNING OUTCOME 2
CONFIGURE NETWORK SERVICES
Learning Activities Special Instructions
Read Information Sheet3.2-
1: “Check Normal Functions
of Server in Accordance with
Manufacturer’s Instructions.”
This Learning Outcome deals with the
development of the Institutional Competency
Evaluation Tool which trainers use in evaluating
their trainees after finishing a competency of the
qualification.
Go through the learning activities outlined for
you on the left column to gain the necessary
information or knowledge before doing the tasks
to practice on performing the requirements of the
evaluation tool.
The output of this LO is a complete Institutional
Competency Evaluation Package for one
Competency of Computer Hardware Servicing
NC II. Your output shall serve as one of your
portfolio for your Institutional Competency
Evaluation for Configure Network Services.
Feel free to show your outputs to your trainer as
you accomplish them for guidance and
evaluation.
After doing all the activities for this LO, you are
ready to proceed to the next LO: Perform
testing, documentation and pre-deployment
procedures
Answer Self-check3.2-1 for
the “Check Normal Functions
of Server in Accordance with
Manufacturer’s Instructions.”
Read Information Sheet3.2-
2: “Install/ Update Modules /
Add-Ons are Based on NOS
Installation Procedures.”
Answer Self-check3.2-2 for
the “Install/ Update
Modules / Add-Ons are
Based on NOS Installation
Procedures.”
Read Information Sheet3.2-
3: “Confirm Network Services
to be Configure Based on
User/System Requirements.”
Answer Self-check3.2-3 for
the “Confirm Network
Services to be Configure
Based on User/System
Requirements.”
Read Information Sheet3.2-
4: “Checked Operation of
Network Services Based on
User/ System Requirements.”
Answer Self-check3.2-4 for
the “Checked Operation of
Network Services Based on
User/ System Requirements.”
Read Information Sheet3.2-
5: “Respond to Unplanned
Events or Conditions in
Accordance with Established
Procedures.”
Answer Self-check3.2-5 for
the “Respond to Unplanned
Events or Conditions in
Accordance with Established
Procedures.”
INFORMATION SHEET 3.2-1
CHECK NORMAL FUNCTIONS OF SERVER IN ACCORDANCE WITH
MANUFACTURER’S INSTRUCTIONS.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Describe server roles and functions.
2.Identify critical server components (hardware and software).
3.Perform normal function checks using manufacturer’s guidelines.
4.Detect and document abnormal conditions for corrective action.
Why Server Function Checks are Important
Prevents downtime and service disruption.
Protects against data loss.
Ensures compliance with manufacturer warranty/support.
Detects hardware/software problems early.
Enhances system security and reliability.
Server Components to Check
Hardware
Power supply & UPS – must be steady, no fluctuations.
Cooling systems (fans, temperature sensors) – ensure proper airflow, avoid
overheating.
Storage drives (HDD/SSD/RAID) – check disk health, space, and
redundancy.
Memory (RAM) – monitor usage, errors.
Processor (CPU) – utilization should be within normal range.
Network cards (NICs) – stable connectivity.
Software/OS
Operating System – updated and running without crashes.
Services (DHCP, DNS, File Sharing, Active Directory, Database, Email, etc.) –
should be active.
Logs (Event Viewer/System Logs) – no critical or repeated errors.
Security (firewall, antivirus, patches) – enabled and updated.
Manufacturer’s Instructions
Every server comes with its own documentation and monitoring utilities, such
as:
Dell OpenManage – hardware health monitoring.
HP iLO (Integrated Lights-Out) – remote server management.
Lenovo XClarity – server status monitoring.
Windows Server Tools – Task Manager, Event Viewer, Performance Monitor.
Linux Server Tools – top, htop, dmesg, journalctl.
These tools provide indicators for normal and abnormal server status.
Procedure for Checking Normal Server Functions
1.Review manufacturer’s manual and organizational maintenance policy.
2.Check physical indicators (power lights, fan noise, temperature, UPS).
3.Log in to the server OS with admin credentials.
4.Verify hardware health using built-in monitoring tools.
5.Check performance metrics:
oCPU utilization (ideally below 70% average load).
oMemory usage (no unusual spikes).
oDisk usage (ensure sufficient free space, RAID stable).
oNetwork throughput (responsive, stable).
6.Verify services required for the server’s role (DHCP, DNS, File sharing, Web
server).
7.Review system logs for errors, warnings, or failed services.
8.Check for OS and security updates (patches, antivirus definitions).
9.Record findings in a maintenance log or report form.
10. Report any abnormal conditions (e.g., overheating, repeated disk
errors) to supervisor for corrective action.
Example
Normal Check Result: CPU load 20%, RAM usage 40%, disk capacity 65%
free, all services running, no errors in logs.
Abnormal Check Result: Disk error warnings in Event Viewer, temperature
exceeding threshold, antivirus outdated.
Action Taken: Logged issue, scheduled disk replacement, updated
antivirus.
SELF-CHECK 3.2-1
MULTIPLE CHOICE QUESTIONS
Instruction:
Read each question carefully. Choose the letter of the correct answer from the
options given.
1.Why is it important to check the normal functions of a server regularly?
A.To decorate the computer laboratory
B.To prevent downtime and ensure consistent performance
C.To reduce screen brightness and power consumption
D.To avoid updating the operating system
2.Which of the following is NOT a server hardware component to be checked
during routine monitoring?
A.CPU utilization
B.Cooling fans and temperature sensors
C.Network Interface Cards (NICs)
D.Desktop wallpaper
3.What tool in Windows Server can be used to monitor performance and
detect abnormal usage?
A.Microsoft Word
B.Task Manager and Event Viewer
C.File Explorer
D.MS Paint
4.If a server log shows repeated disk errors, the technician should:
A.Ignore the error since the server is still running
B.Immediately shut down the server without backup
C.Report and schedule disk maintenance or replacement
D.Change the screen resolution
5.Which of the following is an example of a manufacturer’s monitoring tool?
A.Dell Open Manage
B.Google Chrome
C.Adobe Photoshop
D.MS PowerPoint
TASK SHEET 3.2-1
CHECK NORMAL FUNCTIONS OF SERVER IN ACCORDANCE WITH
MANUFACTURER’S INSTRUCTIONS.
Purpose:
The learner must be able to check the hardware and software functions of a server,
verify that all components are operating normally, and document findings in accordance
with the manufacturer’s instructions and organizational procedures.
Materials, Tools and Equipment:
1.Computer server (physical or virtual)
2.Manufacturer’s manual (Dell, HP, Lenovo, etc.)
3.Monitoring tools (e.g., Dell OpenManage, HP iLO, Windows Task
Manager, Event Viewer, Linux monitoring commands)
4.Server maintenance log/report form
5.Internet connection (if updates are required)
Steps and Procedures:
1.Review the manufacturer’s documentation and organizational
maintenance policies.
2.Inspect the physical server (power indicators, fans, UPS, cabling).
3.Log in to the server using administrator credentials.
4.Access monitoring tools to check:
CPU utilization
Memory usage
Disk health and capacity
Network connectivity
5.Verify that critical services (DHCP, DNS, File Sharing, Active
Directory, etc.) are running.
6.Open system logs (e.g., Event Viewer or journalctl) and review for
warnings or errors.
7.Confirm that OS and security updates are installed.
8.Record all results in the Server Maintenance Log/Report Form.
9.Report abnormal findings to the instructor/supervisor.
Expected Output:
Completed Server Maintenance Report Form showing normal or abnormal
server functions.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.2-1
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Reviewed manufacturer’s documentation before
starting the task.
Checked physical server components (power
indicators, fans, UPS, cabling)
Logged in securely using administrator credentials
Monitored CPU utilization using appropriate tools
Checked memory usage and identified potential
issues
Verified disk health and available storage space
Tested network connectivity and NIC status
Verified that critical network services (DNS, DHCP,
File Sharing, etc.) are running
Reviewed system logs for warnings or errors
Checked for operating system and security updates
Documented all findings accurately in the
maintenance log/report
Reported abnormal findings to the
instructor/supervisor
Followed proper safety and security procedures
during the task
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.2-2
INSTALL/ UPDATE MODULES / ADD-ONS ARE BASED ON NOS
INSTALLATION PROCEDURES.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Describe the role of modules and add-ons in NOS functionality.
2.Differentiate between installation and updating procedures.
3.Perform actual installation and updates based on vendor instructions.
4.Confirm installation success through testing and verification.
5.Record the update process for future reference.
Importance of Modules/Add-ons
Provide new features (e.g., DNS, DHCP, file sharing).
Enhance security (patches, firewall upgrades).
Improve performance (driver updates, performance enhancements).
Ensure compatibility with new applications or hardware.
Fix known bugs or vulnerabilities.
Examples of NOS Modules/Add-ons
Windows Server:
oActive Directory Domain Services (AD DS)
oDNS Server
oDHCP Server
oPrint and File Services
oHyper-V
Linux Server (Ubuntu/CentOS/RHEL):
oApache/Nginx Web Server
oSamba File Sharing
oSquid Proxy Server
oMySQL/MariaDB Database
Third-party add-ons:
oMonitoring tools (Nagios, Zabbix)
oVirtualization software (VMware tools)
oSecurity add-ons (Antivirus, Intrusion Detection Systems)
Preparation Before Installation/Update
Review manufacturer’s manual and release notes.
Backup critical data.
Ensure system requirements (disk space, memory, OS version).
Notify users of possible downtime.
Obtain administrator privileges.
Installation/Update Procedure (General)
1.Plan – Identify the required module or update.
2.Download/Acquire – Get the module from a trusted source (official vendor
site).
3.Install – Follow manufacturer’s step-by-step installation instructions.
oIn Windows: use Server Manager → Add Roles and Features Wizard.
oIn Linux: use package manager (apt, yum, or dnf).
4.Update – Apply patches or updates from the vendor.
oWindows: Windows Update or manual patch installer.
oLinux: run update commands (apt update && apt upgrade).
5.Verify – Check logs, confirm services are running, test module functionality.
6.Document – Record installation/update details: version, date, and issues
encountered.
Example Scenarios
Windows Server: Installing DHCP role using Server Manager and
configuring IP address pools.
Linux Server: Updating Apache Web Server to latest stable version using
apt upgrade.
Third-party Add-on: Installing Nagios monitoring tool on Linux to track
server performance.
SELF-CHECK 3.2-2
MULTIPLE CHOICE QUESTIONS
Instruction:
Read each question carefully. Choose the letter of the correct answer from the
options given.
1.Which of the following is NOT an example of an NOS module?
A.DHCP Server
B.DNS Server
C.Microsoft Word
D.Active Directory
2.What is the first step before installing or updating an NOS module?
A.Reboot the server immediately
B.Review manufacturer’s manual and backup data
C.Delete system logs
D.Remove old hardware
3.Which tool is used in Linux to install or update modules?
A.File Explorer
B.Task Manager
C.Package Manager (apt, yum, dnf)
D.Windows Update
4.After installing a module, what should you do to confirm it works?
A.Ignore warnings and proceed
B.Verify services and test functionality
C.Immediately install another module
D.Remove administrator rights
5.Why is documentation important after updates?
A.For decoration purposes
B.To keep track of changes for troubleshooting and future reference
C.To avoid reading manuals
D.To reduce memory usage
JOB SHEET 3.2-2
INSTALL/ UPDATE MODULES / ADD-ONS ARE BASED ON NOS
INSTALLATION PROCEDURES.
Learning Outcome:
At the end of this job, the trainee should be able to:
1.Install and update NOS modules/add-ons in accordance with
manufacturer’s procedures.
2.Verify installation/update results.
3.Document the process as per organizational standards.
Materials, Tools and Equipment:
1.Server or workstation with installed NOS (Windows Server/Linux)
2.Manufacturer’s installation/update guide (documentation)
3.Stable network/internet connection
4.Installation media (ISO, package, installer)
5.Administrator account credentials
6.Storage device for backup (USB/HDD)
7.Log sheet or Update Report Form
Steps and Procedures:
1.Preparation
Review manufacturer’s instructions and release notes.
Backup important files and configurations.
Ensure the server meets hardware/software requirements.
2.Installation/Update
Log in with administrator/root account.
Download or access module/add-on installer from a trusted vendor
source.
Follow the manufacturer’s step-by-step procedure:
oWindows: Use Server Manager → Add Roles and Features
Wizard.
oLinux: Use package manager (e.g., apt, yum, dnf).
For updates, apply available patches through Windows Update or
Linux update commands.
3.Verification
Confirm installation/update through system logs and monitoring
tools.
Test the newly installed/updated module (e.g., DHCP issuing IP
addresses, Apache serving webpages).
Ensure no error messages appear after installation/update.
4.• Documentation
Record the installation/update details:
oModule/Add-on name
oVersion number
oDate of installation/update
oIssues encountered and resolutions
Submit documentation to instructor/supervisor.
Expected Output:
Installed/updated NOS module/add-on functioning properly.
System logs free of major errors.
Completed and accurate update report.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.2-2
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Prepared tools, equipment, and materials in
accordance with NOS requirements.
Reviewed and followed manufacturer’s
installation/update instructions.
Ensured server readiness (backups, system
requirements check).
Installed/updated the correct module/add-on
without errors.
Applied updates securely (from trusted
source/vendor).
Verified successful installation/update using logs
and system testing.
Checked that system continues to function normally
after installation/update.
Documented module/add-on details (name, version,
date, remarks) accurately.
Reported completion of installation/update to
supervisor/instructor.
Observed proper safety, security, and housekeeping
procedures during the task.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.2-3
CONFIRM NETWORK SERVICES TO BE CONFIGURE BASED ON
USER/SYSTEM REQUIREMENTS.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Identify different types of network services.
2.Analyze user/system requirements for network services.
3.Confirm and document network services to be configured.
4.Ensure alignment with organizational policies and best practices.
Network Services
Network services are applications or functions provided by servers and devices
within a network to support users and system operations.
Examples of Network Services:
File Sharing Service – allows users to store, access, and share files.
Print Sharing Service – enables multiple users to use network printers.
DHCP (Dynamic Host Configuration Protocol) – automatically assigns IP
addresses.
DNS (Domain Name System) – resolves domain names into IP addresses.
Web Services – provide access to websites and applications.
Email Services – handle sending and receiving emails.
Database Services – manage storage and retrieval of structured data.
Remote Access/VPN Services – secure access to internal systems from
external locations.
User/System Requirements
Network services must be configured based on specific requirements, which can
include:
1.User Requirements
Number of users (scalability)
Level of access (permissions, roles)
Type of services needed (file, print, web, email, etc.)
Security requirements (passwords, encryption, authentication)
2. System Requirements
Hardware and software specifications
Server operating system (Windows Server, Linux, etc.)
Network capacity and bandwidth
Compatibility with existing applications
Reliability and uptime requirements
Steps in Confirming Network Services
Gather Requirements – Conduct interviews, surveys, or system analysis to
know what users and systems need.
Review System Capabilities – Check hardware, software, and network
readiness.
Identify Required Services – Match user needs with available network
services.
Validate with Stakeholders – Confirm proposed services with supervisors,
administrators, or clients.
Document Requirements – Create a network services configuration plan for
approval.
Sample Scenario
User Requirement: An organization with 50 employees requires centralized
file storage, email communication, and secure remote access.
System Requirement: A Windows Server 2019 machine with 16 GB RAM
and 2 TB storage, capable of running DHCP, DNS, and file services.
Confirmed Services to Configure: File sharing, DHCP, DNS, Microsoft
Exchange (email), and VPN.
SELF-CHECK 3.2-3
MULTIPLE CHOICE QUESTIONS
Instruction:
Read each question carefully. Choose the letter of the correct answer from the
options given.
1.Which of the following BEST describes a network service?
A.A software that only runs games on a computer
B.A function or application provided over a network to support users
and systems
C.A hardware device used to connect printers to a PC
D.A tool used to design websites only
2.What is the main purpose of DHCP (Dynamic Host Configuration Protocol) in a
network?
A.Provides email communication services
B.Assigns IP addresses automatically to devices in a network
C.Resolves domain names into IP addresses
D.Manages file storage and access
3.An organization requires employees to access files from a central location.
Which network service is MOST appropriate?
A.Print sharing
B.File sharing
C.DNS
D.VPN
4.When confirming network services, which of the following is the FIRST step?
A.Document the requirements immediately
B.Install all available network services at once
C.Gather requirements from users and analyze their needs
D.Configure DHCP and DNS without validation
5.Which of the following is an example of system requirement when confirming
network services?
A.Number of users needing access
B.User roles and permission levels
C.Server hardware specifications
D.Password length required by policy
JOB SHEET 3.2-3
CONFIRM NETWORK SERVICES TO BE CONFIGURE BASED ON
USER/SYSTEM REQUIREMENTS.
Learning Outcome:
At the end of this job, the trainee should be able to:
1.Gather user and system requirements for network services.
2.Analyze and match user needs with appropriate network services.
3.Confirm and document the network services to be configured.
Materials, Tools and Equipment:
1.Computer workstation or server with NOS (Windows Server / Linux)
2.Network diagram or case scenario
3.User/system requirement checklist form
4.Documentation tools (MS Word, Excel, or template forms)
5.Internet connection (for research, if required)
6.Pen and paper for notetaking
Steps and Procedures:
1.Preparation
Review the provided case scenario or consult with a “client”
(instructor/assessor acting as end-user).
Identify whether the requirements are user-related (e.g., file sharing,
email, remote access) or system-related (e.g., server specs,
bandwidth, compatibility).
2.Requirements Gathering
Interview users or analyze the case study.
Fill out a requirements checklist (number of users, type of access,
services needed).
3.Analysis
Compare user requirements with available system resources.
Identify which network services are appropriate (e.g., DHCP for IP
addressing, DNS for name resolution, file sharing for collaboration).
4.Confirmation
Present proposed services to the “client” or supervisor for validation.
Make necessary adjustments based on feedback.
5.Documentation
Record the following details:
oUser/System requirements
oNetwork services to be configured
oJustification for each service
oApproval signature of supervisor/instructor
Expected Output:
Completed requirement checklist.
Documented list of confirmed network services to configure.
Justification report showing alignment with user/system requirements.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.2-3
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Gathered complete user requirements through
interview, case study, or checklist.
Identified accurate system requirements (server
specs, OS, network capacity).
Matched user/system requirements with
appropriate network services.
Proposed services clearly aligned with
organizational/network policies.
Confirmed proposed services with supervisor/client
before documentation.
Documented requirements and confirmed services
accurately and completely.
Justified the choice of services logically and based
on user/system needs.
Submitted requirement checklist and documentation
within the given time.
Communicated findings and proposals clearly to
supervisor/client.
Observed professional, safety, and organizational
procedures during the activity.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.2-4
CHECKED OPERATION OF NETWORK SERVICES BASED ON USER/SYSTEM
REQUIREMENTS
Learning Objectives:
After reading this information sheet, you must be able to:
1.Identify network services that require monitoring and checking.
2.Use appropriate tools to check the operation of network services.
3.Compare current service operation with user/system requirements.
4.Document findings and recommend corrective actions when necessary.
Network Services to be Checked
File Sharing Service – Verify accessibility of shared folders/files by
authorized users.
Print Sharing Service – Ensure shared printers are available and
functional.
DHCP (Dynamic Host Configuration Protocol) – Confirm automatic IP
assignment to clients.
DNS (Domain Name System) – Verify that hostnames are properly resolved
into IP addresses.
Web Hosting Service – Check website availability and response time.
Email Service – Confirm sending and receiving functions.
Database Service – Test connectivity and query response.
Remote Access/VPN – Validate secure connections from remote clients.
Tools for Checking Network Services
Ping / Traceroute – To check connectivity and network path.
ipconfig / ifconfig – To verify IP configuration from DHCP.
nslookup / dig – To test DNS resolution.
Telnet / SSH – To check remote access availability.
Web browser – To test web services.
Email client (Outlook, Thunderbird) – To test email send/receive.
Server logs / Event Viewer – To review system performance and errors.
Network Monitoring Tools (e.g., Wireshark, Nagios, PRTG) – For advanced
monitoring.
Procedure in Checking Network Services
1.Review Requirements – Identify what users expect (e.g., uptime, access,
speed).
2.Check Service Status – Use NOS management tools (e.g., Windows Server
Manager, Linux systemctl).
3.Test Functionality – Simulate user access to services (file open, print test,
send email).
4.Analyze Logs and Reports – Review errors, warnings, or unusual activity.
5.Compare with Requirements – Match findings with documented
user/system expectations.
6.Document Results – Record normal operation or issues found.
7.Recommend Corrective Action – Suggest fixes for non-functioning
services.
Sample Scenario
User Requirement: Employees must be able to access a shared folder and
retrieve files anytime during working hours.
System Requirement: Server must provide file-sharing service with limited
access based on user roles.
Check Result: Shared folder accessible, but some users reported “Access
Denied.”
Recommendation: Verify folder permissions and reconfigure access rights.
SELF-CHECK 3.2-4
MULTIPLE CHOICE QUESTIONS
Instruction:
Read each question carefully. Choose the letter of the correct answer from the
options given.
1.Which of the following BEST describes the purpose of checking network
services?
A.To make the server look busy
B.To ensure services function according to user/system requirements
C.To permanently disable unused services
D.To install new operating systems
2.Which tool is commonly used to test whether a server or workstation is
reachable over the network?
A.Paint
B.Ping
C.WordPad
D.Disk Cleanup
3.A user reports that their computer is not receiving an IP address automatically.
Which network service should you check?
A.DNS
B.DHCP
C.File Sharing
D.VPN
4.If a user cannot access a website by its domain name, but can access it using
the IP address, which service is MOST likely malfunctioning?
A.DHCP
B.DNS
C.File Sharing
D.Print Sharing
5.After checking the email service, you find that users can receive emails but
cannot send them. What should be your NEXT action?
A.Replace the users’ computers immediately
B.Check the outgoing mail (SMTP) server configuration
C.Disable the firewall permanently
D.Restart the print server
TASK SHEET 3.2-4
CHECKED OPERATION OF NETWORK SERVICES BASED ON
USER/SYSTEM REQUIREMENTS
Objective:
The trainee will be able to check and verify the operation of network
services in accordance with established procedures and user/system
requirements.
Materials, Tools and Equipment:
1.Computer workstation (client and server)
2.Installed Network Operating System (NOS)
3.Network cables / switch / router
4.Diagnostic tools (ping, ipconfig, nslookup, tracert, etc.)
5.Access to network services (DNS, DHCP, file sharing, email, etc.)
6.Documentation forms/checklists
Steps and Procedures:
1.Review user/system requirements for network services (DNS, DHCP,
file sharing, print services, email, etc.).
2.Log in to the server and check the running status of required
services.
3.Use diagnostic tools (ping, ipconfig, nslookup, etc.) to test
connectivity and service accessibility.
4.Verify that services are functioning according to system
requirements (e.g., DHCP provides valid IP, DNS resolves names).
5.Record test results and compare with expected outcomes.
6.Report any errors, issues, or discrepancies to the supervisor or
trainer.
7.Document findings and corrective actions taken.
Expected Output:
A completed network service check report with test results.
Confirmation that services are working according to user/system
requirements.
Identified issues (if any) with suggested corrective actions.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.2-4
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Gathered and reviewed system/user requirements
before testing.
Gathered and reviewed system/user requirements
before testing.
Accessed and checked the running status of services
on the server.
Used appropriate diagnostic tools (ping, ipconfig,
nslookup, etc.) effectively.
Verified service operations against user/system
requirements.
Documented test results clearly and accurately.
Reported service issues and recommended
appropriate corrective actions.
Ensured all tasks were completed within the allotted
time.
Observed organizational safety and security policies
during the task.
Communicated findings effectively to
supervisor/trainer.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.2-5
RESPOND TO UNPLANNED EVENTS OR CONDITIONS IN ACCORDANCE WITH
ESTABLISHED PROCEDURES.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Identify unplanned events or conditions that may affect computer systems
or networks.
2.Follow established procedures in responding to emergencies or abnormal
conditions.
3.Apply appropriate corrective or preventive measures in line with
organizational protocols.
4.Document and report incidents according to company policy.
Common Unplanned Events or Conditions
Power interruptions or electrical surges
Sudden hardware failure (hard drive crash, overheating, RAM errors, etc.)
Network downtime or connectivity loss
Operating system or application crash
Malware/virus infection or cyberattack
User-related issues (accidental deletion of files, unauthorized changes, etc.)
Procedures in Responding to Unplanned Events
Step 1: Stay calm and assess the situation – Identify the problem and determine
its severity.
Step 2: Follow safety and security measures – Ensure personal and equipment
safety.
Step 3: Apply immediate containment measures – (e.g., disconnecting affected
devices from the network to prevent spread of malware).
Step 4: Refer to established procedures/manuals – Use troubleshooting guides
or company protocols.
Step 5: Escalate the problem – If the issue cannot be solved at your level, report
to higher technical support or supervisor.
Step 6: Document the event – Record what happened, steps taken, and results
for future reference.
Organizational Procedures and Standards
Safety protocols: Avoid electrical hazards, use ESD precautions, and follow
emergency shutdown steps.
Security protocols: Immediately report breaches, apply patches, and follow
escalation levels.
Communication protocols: Use proper reporting formats, notify the right
people, and provide clear updates.
Documentation protocols: Complete incident reports, log corrective
actions, and submit to supervisors.
Skills in Handling Unplanned Events
Problem identification and analysis
Decision-making under pressure
Effective communication with users and supervisors
Applying technical knowledge in troubleshooting
Documentation and record-keeping
SELF-CHECK 3.2-5
MULTIPLE CHOICE QUESTIONS
Instruction:
Read each question carefully. Choose the letter of the correct answer from the
options given.
1.Which of the following is an example of an unplanned event in a computer
system or network?
A.Scheduled software update
B.Network outage due to power failure
C.Planned system backup
D.Routine hardware maintenance
2.What is the first step in responding to an unplanned event or condition?
A.Escalate the problem to your supervisor immediately
B.Document the entire incident right away
C.Stay calm and assess the situation
D.Disconnect the server from the network
3.Why is it important to document unplanned events?
A.To make the incident appear more serious
B.To blame the user for the problem
C.To have a reference for future prevention and reporting
D.To keep the record for personal use only
4.Which of the following actions best demonstrates following organizational
procedures during a network security breach?
A.Ignore the issue until the IT manager notices it
B.Immediately shut down all systems without notifying users
C.Report the incident to the authorized personnel and follow escalation
protocols
D.Attempt to fix the issue without informing anyone
5.In case of a virus outbreak in the network, what should be done immediately?
A.Allow users to continue working until antivirus updates are available
B.Disconnect affected computers from the network to prevent further
spread
C.Format the server immediately without assessment
D.Wait for the next scheduled maintenance to address the issue
TASK SHEET 3.2-5
RESPOND TO UNPLANNED EVENTS OR CONDITIONS IN
ACCORDANCE WITH ESTABLISHED PROCEDURES.
Learning Outcome:
The trainee will be able to respond to unplanned events or conditions in accordance with
established safety, security, and organizational procedures.
Materials, Tools and Equipment:
1.Computer workstation
2.Network connection (LAN/Wi-Fi)
3.UPS (Uninterruptible Power Supply)
4.Antivirus/anti-malware software
5.Incident Report Form (provided by trainer)
6.Organizational policies/procedures manual
Task:
You are assigned as a Computer Systems Servicing Technician. During
your shift, an unplanned event occurs (e.g., a computer suddenly shuts
down due to overheating or a virus is detected on the network). Your task
is to:
1.Assess and identify the unplanned event.
2.Apply immediate corrective or preventive action following safety and
organizational protocols.
3.Escalate the issue if it cannot be resolved at your level.
4.Document and report the incident using the standard form.
Procedure/Steps:
1.Stay calm and observe the event or condition.
2.Confirm the nature and extent of the problem.
3.Apply safety measures (e.g., disconnect device, cut power if
overheating).
4.Follow established procedures from the organization’s manual.
5.If issue persists, escalate to a supervisor or higher-level support.
6.Record the incident in the Incident Report Form (date, time,
problem, action taken, and result).
7.Submit the report to your trainer/supervisor.
Expected Output:
The event is addressed properly with minimal disruption.
Incident report is correctly filled out and submitted.
Proper safety and security measures are observed.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.2-4
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Correctly identified the unplanned event or
condition.
Assessed the severity and scope of the problem.
Applied immediate safety/security measures.
Followed organizational procedures/manuals.
Escalated the issue appropriately when beyond
authority.
Accurately documented the event using proper
forms.
Submitted the report within the required time frame.
Maintained professionalism and calmness during
the process.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
LEARNING OUTCOME SUMMARY
LEARNING OUTCOME #3 : PERFORM TESTING, DOCUMENTATION AND PRE-
DEPLOYMENT
CONTENTS:
This module will teach you how to Configure Network Services
Upon completion of this module, you will be able to:
1.Undertake Pre-Deployment Procedures Based on Enterprise Policies and
Procedures.
2.Undertake Operation and Security Check Based on End-User Requirements.
3.Prepare/ Complete Reports in Accordance to Enterprise Policies and
Procedures.
ASSESSMENT CRITERIA:
1. Pre-deployment procedures is undertaken based on enterprise policies
and procedures
2. Operation and security check are undertaken based on end-user
requirements
3. Reports are prepared/completed according to enterprise policies and
procedures.
CONDITIONS:
The student/trainee must be provided with the following:
Computer workstation with installed Network Operating System (NOS)
Installed applications and network utilities
Access to network services (e.g., file sharing, printing, internet connection)
Manufacturer’s manuals and organizational documentation standards
Test scripts, checklists, and reporting forms
Tools and equipment for system configuration and testing (e.g., cables,
testers, diagnostic software)
ASSESSMENT METHODS:
Written examination
Practical Demonstration w/ oral questioning
Interview
Portfolio
LEARNING EXPERIENCES
LEARNING OUTCOME 2
CONFIGURE NETWORK SERVICES
Learning Activities Special Instructions
Read Information Sheet3.3-
1: “Undertake Pre-
Deployment Procedures
Based on Enterprise Policies
and Procedures.”
This Learning Outcome deals with the
development of the Institutional Competency
Evaluation Tool which trainers use in evaluating
their trainees after finishing a competency of the
qualification.
Go through the learning activities outlined for
you on the left column to gain the necessary
information or knowledge before doing the tasks
to practice on performing the requirements of the
evaluation tool.
The output of this LO is a complete Institutional
Competency Evaluation Package for one
Competency of Computer Hardware Servicing
NC II. Your output shall serve as one of your
portfolio for your Institutional Competency
Evaluation for Perform testing,
documentation And pre-deployment
procedures.
Feel free to show your outputs to your trainer as
you accomplish them for guidance and
evaluation.
After doing all the activities for this
LO, you’re through with this module and can
already go to the next unit of competency for
MAINTAIN AND REPAIR COMPUTER SYSTEMS
AND NETWORKS
Answer Self-check3.3-1 for
the “Undertake Pre-
Deployment Procedures
Based on Enterprise Policies
and Procedures.”
Read Information Sheet3.3-
2: “Undertake Operation and
Security Check Based on
End-User Requirements.”
Answer Self-check3.3-2 for
the “Undertake Operation
and Security Check Based on
End-User Requirements.”
Read Information Sheet3.3-
3: “Prepare/ Complete
Reports in Accordance to
Enterprise Policies and
Procedures.”
Answer Self-check3.3-3 for
the “Prepare/ Complete
Reports in Accordance to
Enterprise Policies and
Procedures.”
INFORMATION SHEET 3.3-1
UNDERTAKE PRE-DEPLOYMENT PROCEDURES BASED ON ENTERPRISE
POLICIES AND PROCEDURES.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Prepare systems, applications, and network services for deployment.
2.Conduct functionality, compatibility, and security testing.
3.Document results and corrective actions.
4.Ensure compliance with enterprise policies and procedures.
5.Confirm readiness for final deployment to end-users.
Understanding Pre-Deployment Procedures
Importance of pre-deployment in ICT projects
Risks of skipping or rushing deployment
Role of enterprise policies and procedures
Typical Enterprise Pre-Deployment Activities
System Preparation
oVerify hardware and software requirements
oInstall necessary drivers, updates, and security patches
oConfigure user accounts and access permissions
Testing
oConduct system functionality tests (performance, reliability)
oRun security checks (antivirus, firewall, access controls)
oValidate compatibility with existing enterprise systems
Backup and Recovery Preparation
oBackup critical data and system configurations
oPrepare recovery plans in case of deployment failure
Documentation
oRecord system specifications, test results, and corrective measures
oPrepare deployment checklist for future reference
Compliance Verification
oReview enterprise policies (security, access control, data handling)
oConfirm adherence to standard operating procedures
Enterprise Policies and Procedures to Follow
Security Policy – password standards, encryption requirements, anti-
malware protections
Access Policy – user roles, permission levels, login/logout procedures
Data Management Policy – data backup, confidentiality, retention
Deployment/Change Management Policy – request approvals, version
control, documentation requirements
Emergency and Contingency Procedures – rollback plans, escalation
protocols
Skills in Undertaking Pre-Deployment
Systematic testing and troubleshooting
Documentation and reporting
Compliance and policy interpretation
Attention to detail and accuracy
SELF-CHECK 3.3-1
MATCHING TYPE
Instruction:
Match Column A (Pre-Deployment Activities/Concepts) with the correct
description in Column B.
Column A
Pre-Deployment
Activities/Concepts
1.System Preparation
2.Testing
3.Backup and Recovery Preparation
4.Documentation
5.Compliance Verification
Column B
Descriptions
A.Ensuring activities follow
enterprise security, access control,
and data handling standards.
B.Recording test results, corrective
measures, and deployment reports
for reference.
C.Installing updates, patches,
drivers, and configuring user
accounts.
D.Creating recovery plans and
securing important data before
deployment.
E.Conducting functionality, security,
and compatibility checks.
JOB SHEET 3.3-1
UNDERTAKE PRE-DEPLOYMENT PROCEDURES BASED ON
ENTERPRISE POLICIES AND PROCEDURES.
Learning Outcome:
The trainee will be able to undertake pre-deployment procedures in compliance with
enterprise policies and procedures.
Materials, Tools and Equipment:
1.Computer workstation with installed operating system
2.Network connection (LAN/Wi-Fi)
3.Diagnostic/testing software
4.Antivirus/antimalware tools
5.External storage device for backup
6.Enterprise policy and procedures manual
7.Pre-deployment checklist form
8.Documentation/reporting form
Task:
You are assigned to prepare a workstation for deployment in a corporate
environment. Follow the enterprise’s pre-deployment policies and
procedures.
Specifically, you must:
1.Verify system requirements (hardware/software).
2.Install updates, patches, drivers, and security tools.
3.Configure user accounts and access levels.
4.Conduct functionality and security testing.
5.Perform data backup and prepare recovery procedures.
6.Document all activities and test results.
7.Submit pre-deployment report for approval.
Procedure/Steps:
1.Review enterprise policies related to deployment.
2.Use the pre-deployment checklist to guide your tasks.
3.Check system compatibility and readiness.
4.Apply necessary updates, patches, and drivers.
5.Configure user access and verify login/logout functions.
6.Test system performance, connectivity, and security.
7.Back up critical files and create a recovery plan.
8.Fill in the deployment documentation form (including results and
issues encountered).
9.Submit the completed report and checklist to your supervisor.
Expected Output:
A fully tested and documented workstation ready for deployment.
Pre-deployment checklist and report completed accurately.
Compliance with enterprise security, data, and access policies.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.3-1
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Reviewed enterprise policies and procedures before
starting.
Verified hardware and software requirements.
Installed updates, patches, and security tools.
Configured user accounts and access permissions
correctly.
Conducted functionality, compatibility, and security
tests.
Performed data backup and recovery preparation.
Documented all procedures, test results, and
corrective actions.
Submitted complete and accurate pre-deployment
report.
Ensured compliance with enterprise standards.
Maintained safety and professionalism throughout
the task.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.3-2
UNDERTAKE OPERATION AND SECURITY CHECK BASED ON END-USER
REQUIREMENTS.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Undertake system operation checks according to end-user requirements.
2.Perform security verification in line with enterprise/network policies.
3.Document results and apply corrective actions when needed.
4.Ensure compliance with established standards for reliability, availability,
and security.
Review End-User Requirements
Identify functional requirements of users (applications, data access, speed,
connectivity).
Identify security requirements (data protection, user access control,
antivirus/firewall).
Check enterprise/network access policies.
Undertake Operational Check
Test system boot-up and shutdown processes.
Verify installed applications are working correctly.
Check network connectivity (LAN/Wi-Fi, shared resources, internet).
Verify performance (response time, speed, resource utilization).
Confirm compatibility of applications and drivers.
Perform Security Check
Verify user authentication/login/logout processes.
Check user access levels and permissions.
Update and scan with antivirus and antimalware tools.
Ensure firewall and security policies are enabled.
Test backup and recovery mechanisms.
Monitor for unusual or unauthorized activity.
Apply Corrective Measures (If Needed)
Resolve operational errors (software, drivers, network).
Apply patches and updates for identified vulnerabilities.
Reconfigure access levels based on requirements.
Coordinate with end-users to validate corrective actions.
Documentation and Reporting
Record operational test results.
Record security scan and verification reports.
Document corrective measures performed.
Submit checklist and report to supervisor/IT head.
SELF-CHECK 3.3-2
MATCHING TYPE
Instruction:
Match Column A (Pre-Deployment Activities/Concepts) with the correct
description in Column B.
Column A
Operation and Security Check
Activities
1.Boot-up and shutdown test
2.Antivirus scan
3.User access level verification
4.Network connectivity check
5.Backup and recovery testing
6.Firewall configuration check
7.Documentation of results
8.Corrective measures application
Column B
Descriptions
A.Ensuring system protection
against malware and viruses is
updated and functional.
B.Verifying the system starts and
powers off properly without
errors.
C.Confirming users have proper
permissions according to
enterprise policies.
D.Recording test results, issues,
and corrective actions for
reporting.
E.Testing the availability and
functionality of saved recovery
systems in case of data loss.
F.Adjusting, updating, or fixing
errors found during system or
security checks.
G.Checking if devices and users
can access shared resources,
LAN/Wi-Fi, or internet.
H.Ensuring security barriers that
block unauthorized access are
properly enabled.
TASK SHEET 3.3-2
UNDERTAKE OPERATION AND SECURITY CHECK BASED ON END-USER
REQUIREMENTS.
Learning Outcome:
The trainee will be able to undertake operation and security checks of a workstation or network
system based on end-user requirements and enterprise policies.
Materials, Tools and Equipment:
1.Computer workstation (desktop/laptop)
2.Operating system with installed applications
3.Antivirus/antimalware software
4.Firewall (hardware/software-based)
5.Backup and recovery tools (external storage/cloud service)
6.Enterprise/network access policies and procedures
7.Documentation/reporting forms (checklist, logs)
Task:
Perform a complete operation and security check on a workstation or networked
system following enterprise policies and end-user requirements.
Specifically, you must:
1.Review end-user requirements and enterprise policies.
2.Conduct operational checks (boot-up, shutdown, performance, network
connectivity).
3.Perform security checks (antivirus scan, firewall, access levels, backup
testing).
4.Identify and apply corrective measures if issues are detected.
5.Document test results and corrective actions.
6.Submit report for approval.
Procedure/Steps:
1.Read and understand the provided end-user requirements.
2.Verify system hardware and software readiness.
3.Perform operation checks:
Boot-up/shutdown test
Application functionality test
Network connectivity verification
4.Perform security checks:
Antivirus/antimalware scan
Firewall and security policy verification
User access rights check
Backup and recovery system test
5.Note any irregularities and apply corrective measures.
6.Fill in operation and security checklist.
7.Submit completed documentation/report to supervisor.
Expected Output:
System verified as operational and secure.
Security threats addressed and resolved.
Checklist and documentation completed according to enterprise
standards.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.3-2
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Reviewed end-user requirements and enterprise
policies before starting.
Performed system operation check (boot-up,
shutdown, application test).
Verified network connectivity successfully.
Conducted antivirus/antimalware scan.
Checked firewall and applied enterprise security
policies.
Verified user access levels according to
requirements.
Tested backup and recovery functionality.
Identified and applied corrective measures for
detected issues.
Documented operation and security check results
accurately.
Submitted completed report to supervisor.
Maintained safety and professionalism throughout
the task.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________
INFORMATION SHEET 3.3-2
PREPARE/ COMPLETE REPORTS IN ACCORDANCE TO ENTERPRISE
POLICIES AND PROCEDURES.
Learning Objectives:
After reading this information sheet, you must be able to:
1.Identify enterprise reporting requirements and formats.
2.Prepare reports accurately in accordance with enterprise standards.
3.Ensure reports are completed, reviewed, and submitted within the required
timeframe.
4.Maintain accuracy, confidentiality, and professionalism in handling reports.
Introduction:
Reporting is a vital aspect of organizational management. Enterprises rely
on reports for decision-making, monitoring, evaluating performance, and ensuring
compliance with industry standards. Preparing and completing reports requires
accuracy, timeliness, and adherence to enterprise policies and procedures. This
module will guide you in producing professional reports that meet organizational
standards and support business operations.
Understanding Enterprise Reports
A report is a structured document that presents information, analysis, or
findings for decision-making.
Types of Reports in Enterprises:
Incident Report
Technical Report
Progress Report
Financial Report
Operational Report
Compliance/Regulatory Report
Importance of Reports:
Provides accurate information for decision-making.
Serves as legal or official documentation.
Tracks progress and evaluates performance.
Communicates issues, recommendations, and actions taken.
Enterprise Reporting Standards and Policies
Format and Structure: Organizations often use standard templates for
consistency.
Language and Style: Must be professional, clear, concise, and free from
bias.
Accuracy: All data must be verified and supported with evidence.
Confidentiality: Sensitive information must be handled securely.
Submission Requirements: Reports must be submitted within set
timelines, following proper approval processes.
Steps in Preparing and Completing Reports
1.Review requirements
oIdentify the purpose of the report.
oDetermine the audience (e.g., management, client, government).
oCheck organizational guidelines/templates.
2.Gather information
oCollect data from reliable sources.
oVerify accuracy of details.
3.Draft the report
oFollow the enterprise template (if available).
oOrganize content logically (introduction, body, conclusion).
oUse tables, charts, or graphs for clarity.
4.Review and finalize
oProofread for grammar, accuracy, and completeness.
oCheck compliance with enterprise standards.
oMake revisions as needed.
5.Submit and archive
oSend to the right authority/recipient.
oKeep a copy (hard copy or digital) for record-keeping.
Common Errors to Avoid in Report Writing
Submitting incomplete or inaccurate information.
Missing deadlines.
Using vague or unprofessional language.
Failing to follow enterprise format and structure.
Ignoring confidentiality requirements.
SELF-CHECK 3.3-2
MATCHING TYPE
Instruction:
Match Column A (Pre-Deployment Activities/Concepts) with the correct
description in Column B.
Column A
1.Incident Report
2.Confidentiality
3.Accuracy
4.Enterprise Report Template
5.Submission Deadline
6.Progress Report
7.Audience
8.Review and Finalize
Column B
A.Ensures that sensitive
information is protected
and only shared with
authorized persons.
B.Organizational standard
format that ensures
reports are consistent in
structure and style.
C.Provides updates on
tasks completed, current
status, and next steps.
D.The step where
proofreading and
compliance checking are
done before submission.
E.A written record of
unexpected events,
accidents, or
irregularities in the
workplace.
F.The set timeframe when
the report must be turned
in to meet organizational
requirements.
G.Ensuring that all
information included in
the report is correct and
verified.
H.The group or individual
for whom the report is
intended (e.g.,
management, client, or
government).
TASK SHEET 3.3-2
PREPARE/ COMPLETE REPORTS IN ACCORDANCE TO ENTERPRISE
POLICIES AND PROCEDURES.
Learning Outcome:
The trainee will be able to prepare and complete reports in accordance with enterprise policies
and procedures.
Materials, Tools and Equipment:
1.Computer or laptop
2.Word processing software (MS Word, Google Docs, LibreOffice Writer, etc.)
3.Enterprise report template (provided by trainer)
4.Reference materials or sample data
5.Report checklist/logsheet
Task:
Prepare a complete enterprise report (incident report, progress report, or
operational report) using the given template, ensuring accuracy, clarity, and
compliance with enterprise policies.
Procedure/Steps:
1.Review the enterprise reporting guidelines and template provided.
2.Identify the purpose and audience of the report.
3.Gather and verify all necessary information and data.
4.Draft the report using the prescribed enterprise template.
5.Ensure proper structure: introduction, body,
conclusion/recommendations.
6.Review the report for accuracy, grammar, completeness, and format
compliance.
7.Submit the finalized report to the trainer (acting as supervisor/manager).
8.Keep a copy for records.
Expected Output:
A complete, accurate, and properly formatted report aligned with
enterprise standards and requirements.
Assessment Method:
Demonstration with oral questioning
PERFORMANCE CRITERIA CHECKLIST 3.3-2
Trainee’ Name: _____________________________ Date: ____________________
CRITERIA YES NO
Did you:
Identified the correct type and purpose of the report.
Determined the appropriate audience of the report.
Collected and verified necessary data/information.
Used the enterprise-approved report template.
Organized content logically (intro, body, conclusion).
Ensured accuracy, clarity, and relevance of
information.
Checked grammar, spelling, and professional tone.
Completed the report within the required timeframe.
Observed confidentiality in handling sensitive data.
Submitted the report according to enterprise
procedure.
Comments/Suggestions:
Trainer: ____________________________________ Date: ______________________