Você está na página 1de 18

POST

ASSESSMENT
Do the Activity on More Security for
Remote Desktop

When Enzo travels on company


business, he finds it’s a great help to be
able to access his office computer from
anywhere on the road using Remote
Desktop. However, he wants to make
sure his office computer as well as the
entire corporate network is as safe as
One way you can help Enzo add
more security is to change the port
that Remote Desktop uses.
Knowledgeable hackers know that
Remote Desktop uses port 3389, but
if you change this port to a secret
port, hackers are less likely to find
the open port. Search the Microsoft
Knowledge Base
articles(support.microsoft.com) for a
Practice implementing this change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use another
computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to a secret port. Print a screen
shot showing how you made the change. Use the client computer to create a Remote Desktop session
to the host computer using the secret port. Print a screen shot showing how you made the connection
using the secret port. Verify the session works by transferring files in both directions.
3. What secret port did you use?
Summative
Test
I. Identify what computer error is
illustrated on the following situations.
__________1. The LED indicator of your monitor
is in steady orange color.
_________ 2. When you open your PC, nothing s
hows up in your monitor and the LED indicator of
your monitor is flashing in yellow color.
__________3.When you open your PC it will
show the processor brand and/or the
motherboard brand but doesn't continue. Usually
this error will result to system restart over and
over again.
__________4.This also happens even if you try disco
nnecting your computer set from the internet. This is
what we called aftershock virus which will continue
to run even if internet is disconnected.
__________5. The computer opens up then boots
but when the operating system loads it doesn't
continue and it will take a lifetime if you're going to
wait for it to load.
__________6. This happens even if you try installing
the hardware. When you restart your set it will
happen again.
__________7.When you try going to safe mode all you will
see is a list of files in Command prompt style.
__________8. Upon loading he operating system, you will
hear a loading sound and then the sound stops, when you try
running an audio file, no sound will be heard.
__________9.This will happen only in standby mode, when
you move your mouse or type something, your system will
automatically restart and the worst part is it will delete a file
at random.
__________10. Just like the mouse problem, when you open
a program that will take the whole screen like for example a
game and/or a program applications, when you close it, it will
cause your system to restart.
II. Choose the letter of the best answer:

1) These are moderately dangerous types of


errors among those that can popup on your PC.
System errors are caused by malfunctioning
hardware components, corrupted operating
system modules, etc.
a. System error c. Stop errors
b. Runtime errors d. Device managers errors
2) These are caused by corrupted or malfunctioning system files or
software executables. Most runtime errors cause the application
that caused it to shutdown. However, more serious runtime errors
may cause the system to be come unstable or unresponsive,
leaving you with no choice but to reach for the Reset button.
a. System error c. Stop errors
b. Runtime errors d. Device managers errors

3) These are caused by corrupted hardware, especially


malfunctioning RAM modules and bad sectors on hard disks. Stop
errors can be difficult to resolve at times.
a. System error c. Stop errors
b. A Runtime errors d. Device managers errors
4) These are usually caused by corrupted driver files or
malfunctioning hardware components. In case of the former
cause, the problem is usually solved simply by reinstalling or
updating the drivers. However, the latter cause can often be solved
only by replacing hardware components.
a. System error c. Stop errors
b. B. Runtime errors d. Device managers errors

5) These are caused by malfunctioning hardware components, and


are characterized by short beep sounds from the tiny internal
speaker of your motherboard. POST code errors occur when you
press the power button to turn on your PC..
a. System errors c. Application errors
b. Browser status errors d. Post Code errors
6) These can be caused at any point of time. As the name suggests,
these are caused by applications while those are running. These are
usually caused by glitches in the program code itself. These are usually
resolved by updating the program to its latest version.
a. System error c. Application errors
b. Browser status error d. Post Code errors

7) These are caused by problems faced by browsers when trying to


access a website. These can be caused by misplaced web pages in the
server of the 249 website itself, or due to connection problems. For
instance, a 404 error would indicate that the browser is trying to
access a webpage that does not exist in the specified location.
a. System error c. Application errors
b. Browser status error d. Post Code errors
8) is define as the flow of electron or electric current. It is an
invisible form of energy that can be transform into other form
of energy like heat light and mechanical.
a. Electricity c. Proton
b. Atom d. Post Code errors

9) the amount of pulling force that makes the electron flow.


Also known as potential difference or EMF(electromotive force)
a. Electricity c. Current
b. Resistance d. Voltage

10) a type of circuit that has an open path for current to flow. It
means that current cannot flow in open circuit.
a. Open Circuit c. Current Circuit
b. Resistance d. Close Circuit
III. Match Column A with Column B
COLUMN A COLUMN B
1. Used for installing and removing screws in A. Screw drivers
the computer unit.
2. Used for picking small parts in the B. Pliers and tweezers
computer unit.
3. Used for eliminating electrostatic C. Soldering iron
discharge in the work area.
4. Primarily used for connecting terminals in D. Lens cleaner
the power supply and circuit board with the
use of a soldering lead.
5. It is a paste used for heat dissipation of E. Anti-static wrist strap, mat and spray
the processor.
6. A device used for cleaning optical media, F. Thermal paste
such as DVD-ROMS and CD-writers.
7. A device used to crimp the RJ45connector
to the UTP cable G. LAN Tester
8. A device used for testing the network H. Crimping tool
connection
I. Systems Tool Box
IV. Arrange the following steps in verifying the correct
protocols are installed on the computer
_____Within the configuration tab double-
click the TCP/IP protocol icon. Note: Do not click on the PPP or Dial-Up
adapter, click on the network card adapter.
_____ Select the option to specify an IP address
_____ Click Start / Settings / Control Panel
_____Double-click the Network icon
_____In the TCP/IP properties click the IP address tab
_____When specifying these values, the computers on the network must
all have the same Subnet Mask and have a different IP Address. For
example, when using the above values on one computer you would want
to use an IP address of 102.55.92.2on another computer and then specify
the same Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such
an address could be: IP Address: 102.55.92.1, Subnet Mask:
255.255.255.192
V. List down at list Five (5) common computer
problems and solutions.
Common Computer Problems Solutions

1.

2.

3.

4.

5.

Você também pode gostar