LP Configuring Computer Client User Access
LP Configuring Computer Client User Access
CONTENT STANDARD note: Pls concise the number of pages po…. Murag daghan ra..ikaw
lang bahala basta malessen ang pages
PERFORMANCE STANDARD
The learners shall be able to set up computer servers based on acceptable standards
and hardware.
Set-up computer server systems and peripherals in accordance with job. LO1-
Set up user access
I.Objectives:
Respect Each Other: Treat everyone in the shop with courtesy and consideration.
Raise Your Right Hand: Before speaking or leaving for the comfort room, raise your right
hand to signal your intention, ensuring minimal disruption.
Ask for Permission: Always seek permission before borrowing any tools or equipment.
Return them promptly after use.
Practice CLAY GO: Keep the workspace clean by practicing CLAY GO (Clean as You
Go) - tidy up after yourself to maintain a safe and organized environment.
7. Review
Reviewing the previous lesson or presenting new lesson
Learners will be asked to recap on the previous topic: Installing Windows 10
Questions:
1) What is the purpose of installing an operating system like Windows 10 on a
computer?
Answer: The purpose of installing an operating system like Windows 10 is to
provide a platform for managing computer hardware and software. It allows
users to interact with the computer, run applications, access files, and perform
various tasks such as browsing the internet, creating documents, and playing
games.
2) Why is it important to back up data before installing Windows 10?
Answer: It is important to back up data before installing Windows 10 to prevent
potential loss of important files and documents. During the installation process,
there is a risk of data loss or corruption, especially if the installation involves
formatting the hard drive or partitioning. Backing up data ensures that
important files are safely stored and can be restored in case of any unforeseen
issues during the installation.
B. Motivation
Introduction:
Imagine your computer is like a fortress, filled with valuable information
and resources. But every fortress needs guards to protect it and keys to grant
access to those who need it. Today, you're going to become the master of
those keys as we explore the world of configuring computer client user
access.
Activity:
I'm going to give you a quick challenge. Close your eyes and imagine you're
in charge of a company's digital fortress. Your job is to decide who gets
access to what. Think about who should have access to sensitive information
and who should be kept out.
Now, open your eyes, and I'll give you three scenarios:
1. An intern needs access to training documents.
2. The CEO wants access to financial reports.
3. A visitor needs temporary Wi-Fi access.
In just a minute, jot down who should get access in each scenario and why.
Discussion:
Now, let's discuss your answers. What factors did you consider when
granting access? How did you balance security with convenience? We'll
explore these questions further as we dive into our lesson on configuring
computer client user access.
By framing the lesson as a digital fortress with keys to grant access, students
are immediately drawn into the topic and can quickly grasp the concept of
managing user access rights. This short activity sets the stage for deeper
exploration while keeping students engaged and focused.
i. Activity
1. Preparatory Activity
Question:
Social Media Privacy Settings:
How can you ensure that only your friends can view your posts and photos on social
media platforms like Instagram or Facebook? What privacy settings would you adjust to
control who can access your profile and posts?
School Computer Lab Access:
Imagine you're a student in charge of managing access to the school's computer lab.
How would you ensure that only authorized students can log in and use the computers?
What measures would you put in place to prevent unauthorized access?
Online Gaming Account Security:
You're an avid gamer with an online gaming account. How do you protect your account
from being accessed by unauthorized users? What security measures would you use,
such as strong passwords or two-factor authentication, to keep your gaming progress
safe?
2. Lesson Proper
Discussing new concepts and practicing new skills
User Level Access means access rights that allow the user to read, change or
delete information which she or he owns or data and objects shared with the user or
the user’s team. Generally, basic user level access affords the least amount of
authority and permission regarding an organizations network.
Part of an access control procedure for computer systems, which allows a system
administrator to set up a hierarchy of users. Thus, the low level users can access only
a limited set of information, whereas the highest level users can access the most
sensitive data on the computer.
Further access levels need to be assigned manually by a user with the appropriate
authority. An editor with more experience and good sharing can attempt to become
an administrator (sysop), which provides a large number of advanced permission.
A user account is a collection of settings and information that tells Windows
which files and folders you can access, what you can do on your computer, what are
your preferences, and what network resources you can access when connected to a
network.
User Account
A “user account” is a digital identity that allows individuals or entities to
access and interact with a computer system or online service. It consists of a
username and password and determines the user's access permissions within the
system.
Password
A “password” is a secret combination of characters, typically
alphanumeric, that is used to authenticate a user's identity and grant access to a
computer system, network, or online account. It serves as a security measure to
protect sensitive information and ensure that only authorized individuals can access
the resources or services associated with the account.
Guest
The “Guest” account is a special type of user account that has the name
Guest and no password.
3. After Opening the Change, the account type window, navigate to Add a
new User in PC settings
4. As you can here is where all your user accounts are listed, including the
administrative account. To create a new user account select the option
Add someone else to this PC. This action will open the Microsoft
Account Window.
5. Here enter the new user for this PC, who’s going to use, password, and 3
security question.
ii. Analysis
Recite the Steps by viewing the presented slides
The students will identify the different steps of configuring computer client user access
iii. Abstraction
Asking the students if they have clarifications and questions
iv. Application
Performance Activity:
Configuring Computer Client User Access
Divide the class into 3 groups
Distribute activity sheets per group
Let the learners follow the steps in Configuring Computer Client User Access using
the hardware devices given
After which each group will discuss, determine if they properly Configured
Computer Client User Access.
Assign one representative per group to demo.
Rubrics
Criteria 5 points 3 points 1 point
Accuracy The operation The operation The entire
was executed was carried out operation
accurately, with assistance required
following the from the guidance from
steps precisely teacher, with the teacher.
and without any the steps being
assistance from followed to
the teacher. some extent.
Quality The output was The output was The output
of work completed done, reasonably was
without any well-done, unsatisfactory,
errors or albeit with a containing
mistakes. few minor errors and
errors and mistakes.
mistakes.
Time Finished the task Finished the Needs more
before the given task on time time to finish
time the given task
Points Earned Descriptive Rating
12-15 Very Good
8-11 Good
4-7 Fair
1-3 Needs Improvement
IV. Generalization
Using FB Messenger. The learner shall give their personal answer by typing.
1. What is the impact of computer services in our daily life?
2. How does computer client make our files secured?
V. Valuing
In a ½ sheet of paper, the learner shall give their personal answer with the given question.
1. Why is it important to have computer client user access in the network security?
VI. Assessment
Matching Type - Direction: Match column A with column B by identifying the correct
order of steps.
Column A Column B
1. After Opening the a) Step 1
Change the account type
window, navigate to Add
a new User in PC settings
VII. Assignment
Using your knowledge and concepts learned: Create a one-page technical report. Submit
through email: [email protected] on or before May 20, 2024 until 12:00 midnight.
Prepared by: