Css For Grade 10 - SQL3 - Core3 - 3. Perform Testing Documentation and Pre Deployment Procedures
Css For Grade 10 - SQL3 - Core3 - 3. Perform Testing Documentation and Pre Deployment Procedures
procedures.
Content Standard:
Performance Standard:
The learners shall be able to set up computer servers based on acceptable standards and
hardware.
Learning Competencies
The individual can undertake pre-deployment procedures based on enterprise policies and
procedures. Undertake operation and security check based on end-user requirements. Prepare
reports according to enterprise policies and procedures. Complete reports according to enterprise
policies and procedures
INFORMATION SHEET 1
Testing configured computer system and network
In general, testing is finding out how well something works. For human beings, testing
tells what level of knowledge or skill has been acquired. In computer hardware and software
development, testing is used at key checkpoints in the overall process to determine whether
objectives are being met. For example, in software development, product objectives are
sometimes tested by product user representatives. When the design is complete, coding follows
and when finished, this is then tested at the unit or module level by each programmer; at the
component level by the group of programmers involved; and at the system level when all
components are combined together. At early or late stages, a product or service may also be
tested for usability.
What to Know
Safety Precautions
Occupational Health and Safety (OHS) Policy – An Information and Communication
technology (ICT) student should know how to behave when working in the computer laboratory,
and to accomplish task safely. Safety practices should be learned early and always adheres in
working with any electrical and electronic device, including personal computers and its
peripherals. This is for your protection as well as to the people working with you, and for the
devices that you are using.
Occupational safety and health (OSH) is a planned system of working to prevent illness and
injury where you work by recognizing and identifying hazards and risks. Health and safety
procedure is the responsibility of all persons in the computer and technology industries. You
must identify the hazards where you are working and decide how dangerous they are. Eliminate
the hazard or modify the risk that it presents.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from harm.
4. If the hazard can be easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain
assistance.
6. After clearing the hazard, fill out the correct documentation to assist in identifying improved
practice to reduce further incidence of hazards.
All hazards must be reported using an Accidental Report form. This enables us to track
the kinds of hazards we have in our workplace, and take action when necessary to make it safer
for all student and clients.
Accident Reports
Forms are used to give specific details with regards to accidents that happened in the
laboratory during experiments.
Accident reports contain the following details:
Name of the person injured
Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents
Fire Exits
All fire exits should be kept clear from any obstacles. All students have a responsibility to make
sure that chairs, empty boxes or any other type of obstacle are not placed in or near fire exit
doorways.
All corridors also need to have equipment stored on one side only to ensure that in the event of
an emergency there is a clear exit.
What to Know
You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished: You must
verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is functional:
Check that the Link light — the little red or green light next to the RJ-45 port — is lit on
every computer. You must check this light both on the computer itself and on the switch or
router the computer is plugged into. If this light is not on, you have a connection problem —
most likely a bad cable.
When you're sure the physical connections are good, you should attempt to log in to each
of your network computers using a valid domain user account.
Click the Start button, type cmd and press Enter. Then, enter the command
ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line you're
looking for should resemble this:
Another basic test you should perform is to use the ping command from a command
prompt to make sure that the computers on your network can contact one another.
Do several ping tests. First, make sure that TCP/IP is up and running by having the
computer try to ping itself. Open a command prompt and type ping local host. The output
from this command will indicate whether or not the ping was successful.
Next, try to ping your servers by name. For example, if your file server is named
FileServer01, use the command ping FileServer01.
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following format for a
technical report for your recently conducted test.
Name of Technician:________________________________________
Date of Inspection: __________________ Time: _________________
Directions: In this activity, you will check the status of your wired/wireless connection,
investigate the availability of wired/wireless networks, and test connectivity. After
accomplishing the task you need to write a technical report regarding the test conducted.
Recommended Equipment
A computer with Windows Professional installed
A wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Internet connectivity
Step 1
Disconnect the Ethernet patch cable from your computer.
A red “X” appears over the “Local Area Connection” icon.
A successful ping indicates that there is a connection between the computer and the default
gateway.
Step 2
Open a web browser.
Type www.google.com in the “Address” field, and then press Return.
Step 3
Open the Network Connections window.
Figure 21. Network Connections Window
INFORMATION SHEET 1
Testing configured computer system and network
Learning Objective:
Introduction
It is often believed that "Ping" is an abbreviation for Packet Internet Groper. A program
that system administrators and hackers or crackers use to determine whether a specific computer
is currently online and accessible. Pinging works by sending a packet to the specified IP address
and waiting for a reply; if a reply is received, the computer is deemed to be online and
accessible.
A utility that is used to verify that a data packet is capable of being distributed to an address
without errors. The ping utility is commonly used to check for network errors.
Before doing anything else, you are advised to check the computer's IP configuration. Windows
systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP
configuration. The output of this command gives the IP configuration for each interface; a
computer with two network cards and one wireless adapter has 3 interfaces each with its own
configuration.
To view your computer's IP configuration, simply enter the following command (Start/run):
cmd
The output of such a command looks like this:
Windows IP Configuration
Host name . . . . . . . . .
. : CCM
Primary DNS suffix . . .
. . . :
Node type . . . . . . . . . .
: Broadcast
The above report shows that the computer has two network interfaces, one of which is wireless.
The name of the machine on the network is CCM.
The Ethernet interface connected to the local area network (network card) is not active since the
cable is disconnected, but the wireless adapter is configured.
Machines on a same network must use a same address range (with different addresses)
and a same subnet mask. In the case of a local network, connecting machines that do not have
routable IP addresses, so-called private address ranges must be used.
The default gateway refers to, when applicable, the IP address of the machine offering internet
access. DNS servers.
The DNS servers must correspond to the organization's DNS servers; most of the time these are
the service provider's DNS servers.
To test the proper functioning of a network, there is a highly practical utility provided as a
standard feature with most operating systems; this is the ping utility. Ping lets you send a data
packet to a network computer and lets you evaluate the response time. The ping command is
explained in detail at the following address:
To test the network thoroughly, simply open a command-line window, then successively carry
out the following steps:
ping -t
ping -t
ping -t
ping the computer used as gateway on the local area network, that is, the computer
sharing its internet connection. It usually has the address 192.168.0.1:
ping -t
ping the service provider's gateway. The address of the service provider's gateway can be
retrieved using the ipconfig command on the computer being used as gateway on the
local area network;
ping the service provider's name servers . The address of the service provider's DNS
servers can be retrieved using the ipconfig command on the computer being used as
gateway on the local area network;
ping a machine on the internet network, for example:
ping -t
ping -t