0% found this document useful (0 votes)
13 views

LP Configuring Computer Client User Access

The document discusses configuring computer client user access by going over concepts like user levels, passwords, and guest accounts. It then outlines the steps to configure user access on a computer, which includes opening the control panel user accounts, changing the account type, adding a new user, and entering their information like username, password, and security questions.

Uploaded by

Sarce Belleza
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

LP Configuring Computer Client User Access

The document discusses configuring computer client user access by going over concepts like user levels, passwords, and guest accounts. It then outlines the steps to configure user access on a computer, which includes opening the control panel user accounts, changing the account type, adding a new user, and entering their information like username, password, and security questions.

Uploaded by

Sarce Belleza
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

TECHNOLOGY AND LIVELIHOOD EDUCATION

COMPUTER SYSTEMS SERVICING 9


LESSON PLAN

CONTENT STANDARD note: Pls concise the number of pages po…. Murag daghan ra..ikaw
lang bahala basta malessen ang pages

The learners demonstrate an understanding of concepts and principles in setting up


computer servers.

PERFORMANCE STANDARD

The learners shall be able to set up computer servers based on acceptable standards
and hardware.

MOST ESSENTIAL LEARNING COMPETENCY

Set-up computer server systems and peripherals in accordance with job. LO1-
Set up user access
I.Objectives:

At the end of the lesson, the students will be able to.


a. Understand Computer Client User Access.
b. Perform the steps in Configuring Computer Client User Access.
c. Appreciate the importance of setting computer Client’s access in securing
information.

II. Subject Matter: CONFIGURING COMPUTER CLIENT USER ACCESS


Materials: Laptop/Personal Computer, PowerPoint Presentation
A. References: Self-Directed Learning Module (SLM) 9-Module 1a: Setting-up
Computer Server
B. Materials: Laptop, Desktop PC, PowerPoint Presentation Slides, Related
Videos
C. Skill: Listening, Communication, Writing, Analyzing, Assembling
Computer Hardware
D. Teacher Strategies: Self-Paced Direct Instruction, Demonstration
Method, Collaborative Learning, Scaffolding Strategy
E. Appreciation: Respect individual differences in culture and belief
G. Other Learning Resources: Monitor, System Unit, Mouse, Keyboard,
AVR, Monitor Cable, Power Cable, VGA Cord, Speaker, Router, LAN Cable
III. Procedure:
A. Classroom Routine
1. Prayer
2. Greetings
3. Attendance
4. Encourage and Assign students to seat in front of those who are visually
impaired/visual astigmatism or have hearing problems.
5. Pair the students for collaborative learning or (lean on others strategies) but
encourage them to do the task individually and observe proper safety
standards.
6. Give the shop room rules for their proper guidance.

Shop Room Rules

 Respect Each Other: Treat everyone in the shop with courtesy and consideration.

 Raise Your Right Hand: Before speaking or leaving for the comfort room, raise your right
hand to signal your intention, ensuring minimal disruption.

 Ask for Permission: Always seek permission before borrowing any tools or equipment.
Return them promptly after use.

 Practice CLAY GO: Keep the workspace clean by practicing CLAY GO (Clean as You
Go) - tidy up after yourself to maintain a safe and organized environment.

 Use Complete Sentences: When responding to questions or instructions, communicate


clearly and effectively by using complete sentences.

 Participate Actively: Engage in class discussions and demonstrations. Your participation


enriches the learning experience for everyone.

7. Review
Reviewing the previous lesson or presenting new lesson
Learners will be asked to recap on the previous topic: Installing Windows 10
Questions:
1) What is the purpose of installing an operating system like Windows 10 on a
computer?
Answer: The purpose of installing an operating system like Windows 10 is to
provide a platform for managing computer hardware and software. It allows
users to interact with the computer, run applications, access files, and perform
various tasks such as browsing the internet, creating documents, and playing
games.
2) Why is it important to back up data before installing Windows 10?
Answer: It is important to back up data before installing Windows 10 to prevent
potential loss of important files and documents. During the installation process,
there is a risk of data loss or corruption, especially if the installation involves
formatting the hard drive or partitioning. Backing up data ensures that
important files are safely stored and can be restored in case of any unforeseen
issues during the installation.

B. Motivation
Introduction:
Imagine your computer is like a fortress, filled with valuable information
and resources. But every fortress needs guards to protect it and keys to grant
access to those who need it. Today, you're going to become the master of
those keys as we explore the world of configuring computer client user
access.

Activity:
I'm going to give you a quick challenge. Close your eyes and imagine you're
in charge of a company's digital fortress. Your job is to decide who gets
access to what. Think about who should have access to sensitive information
and who should be kept out.

Now, open your eyes, and I'll give you three scenarios:
1. An intern needs access to training documents.
2. The CEO wants access to financial reports.
3. A visitor needs temporary Wi-Fi access.
In just a minute, jot down who should get access in each scenario and why.

Discussion:
Now, let's discuss your answers. What factors did you consider when
granting access? How did you balance security with convenience? We'll
explore these questions further as we dive into our lesson on configuring
computer client user access.

By framing the lesson as a digital fortress with keys to grant access, students
are immediately drawn into the topic and can quickly grasp the concept of
managing user access rights. This short activity sets the stage for deeper
exploration while keeping students engaged and focused.
i. Activity
1. Preparatory Activity
Question:
 Social Media Privacy Settings:
How can you ensure that only your friends can view your posts and photos on social
media platforms like Instagram or Facebook? What privacy settings would you adjust to
control who can access your profile and posts?
 School Computer Lab Access:

Imagine you're a student in charge of managing access to the school's computer lab.
How would you ensure that only authorized students can log in and use the computers?
What measures would you put in place to prevent unauthorized access?
 Online Gaming Account Security:

You're an avid gamer with an online gaming account. How do you protect your account
from being accessed by unauthorized users? What security measures would you use,
such as strong passwords or two-factor authentication, to keep your gaming progress
safe?

2. Lesson Proper
Discussing new concepts and practicing new skills
User Level Access means access rights that allow the user to read, change or
delete information which she or he owns or data and objects shared with the user or
the user’s team. Generally, basic user level access affords the least amount of
authority and permission regarding an organizations network.
Part of an access control procedure for computer systems, which allows a system
administrator to set up a hierarchy of users. Thus, the low level users can access only
a limited set of information, whereas the highest level users can access the most
sensitive data on the computer.
Further access levels need to be assigned manually by a user with the appropriate
authority. An editor with more experience and good sharing can attempt to become
an administrator (sysop), which provides a large number of advanced permission.
A user account is a collection of settings and information that tells Windows
which files and folders you can access, what you can do on your computer, what are
your preferences, and what network resources you can access when connected to a
network.
User Account
A “user account” is a digital identity that allows individuals or entities to
access and interact with a computer system or online service. It consists of a
username and password and determines the user's access permissions within the
system.

Password
A “password” is a secret combination of characters, typically
alphanumeric, that is used to authenticate a user's identity and grant access to a
computer system, network, or online account. It serves as a security measure to
protect sensitive information and ensure that only authorized individuals can access
the resources or services associated with the account.

Guest
The “Guest” account is a special type of user account that has the name
Guest and no password.

Steps in Configuring Computer Client User Access.

1. Open Control Panel > User Accounts


2. Here in this User account, select the option Change account type.

3. After Opening the Change, the account type window, navigate to Add a
new User in PC settings
4. As you can here is where all your user accounts are listed, including the
administrative account. To create a new user account select the option
Add someone else to this PC. This action will open the Microsoft
Account Window.

5. Here enter the new user for this PC, who’s going to use, password, and 3
security question.
ii. Analysis
Recite the Steps by viewing the presented slides
The students will identify the different steps of configuring computer client user access
iii. Abstraction
Asking the students if they have clarifications and questions
iv. Application
Performance Activity:
Configuring Computer Client User Access
 Divide the class into 3 groups
 Distribute activity sheets per group
 Let the learners follow the steps in Configuring Computer Client User Access using
the hardware devices given
 After which each group will discuss, determine if they properly Configured
Computer Client User Access.
 Assign one representative per group to demo.
Rubrics
Criteria 5 points 3 points 1 point
Accuracy The operation The operation The entire
was executed was carried out operation
accurately, with assistance required
following the from the guidance from
steps precisely teacher, with the teacher.
and without any the steps being
assistance from followed to
the teacher. some extent.
Quality The output was The output was The output
of work completed done, reasonably was
without any well-done, unsatisfactory,
errors or albeit with a containing
mistakes. few minor errors and
errors and mistakes.
mistakes.
Time Finished the task Finished the Needs more
before the given task on time time to finish
time the given task
Points Earned Descriptive Rating
12-15 Very Good
8-11 Good
4-7 Fair
1-3 Needs Improvement

IV. Generalization
Using FB Messenger. The learner shall give their personal answer by typing.
1. What is the impact of computer services in our daily life?
2. How does computer client make our files secured?
V. Valuing
In a ½ sheet of paper, the learner shall give their personal answer with the given question.
1. Why is it important to have computer client user access in the network security?
VI. Assessment
Matching Type - Direction: Match column A with column B by identifying the correct
order of steps.
Column A Column B
1. After Opening the a) Step 1
Change the account type
window, navigate to Add
a new User in PC settings

2. Open Control Panel > b) Step 2


User Accounts

3. Here enter the new user c) Step 3


for this PC, who’s going
to use, password, and 3
security question.

4. Here in this User account, d) Step 4


select the option Change
account type.

5. As you can here is where e) Step 5


all your user accounts are
listed, including the
administrative account.
To create a new user
account select the option
Add someone else to this
PC. This action will open
the Microsoft Account
Window.

VII. Assignment
Using your knowledge and concepts learned: Create a one-page technical report. Submit
through email: [email protected] on or before May 20, 2024 until 12:00 midnight.

Prepared by:

Kuenzelle Kate A. Plaza

You might also like