Cover Css
Cover Css
Computer System
Servicing NCII
QUARTER 1-MODULE 6
Specifications of Materials
and Components
( Week 6 )
Computer System Servicing – Grade 11
Alternative Delivery Mode
Quarter 1– Module 1
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over
them.
Managemen t Team:
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Computer System
Servicing NCII
MODULE 1:
1
What I Need To Know …………………………………….…….……
General Instructions ………………………………………………… 1
Quarter 1
Learning Outcome 1 Assemble computer hardware
Self-Scheck 1
Task Sheet 1
References ………………………………………………… 79
TO THE STUDENT
Greetings!
This module contains training materials and activities for you to finish. You are
required to go through a series of learning activities. If you have questions, don’t
hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems
that is in line with the industry standards. You need to complete this module before
you can perform the next module.
Pre-Test
What I Know?
1
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
a. RAM
b. Operating system
c. CPU
d. HDD
2
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
3
14. OS stands for
a. Onsite Software
Commons.wikimedi
a.org a. CPU
b. Operating System b. Processor
c. Only Read Software c. System Unit
d. On-demand System
Commons.wikimedia.org
Definition of Terms
CPU-Central processing unit; the brain of the computer; controls the other
elements of the computer
Disk Drive-A peripheral device that reads and/or writes information on a disk
Hard Drive-A device (usually within the computer case) that reads and writes
information, including the operating system, program files, and data files
4
Keyboard-A peripheral used to input data by pressing keys
Modem-A peripheral device used to connect one computer to another over a phone
line
Monitor-A device used to display information visually
Printer-A peripheral device that converts output from a computer into a printed
image
Browser-A program used to view World Wide Web pages, such as Netscape
Navigator or Internet Explorer
Internet-A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols
URL-Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet
Window-A screen in a software program that permits the user to view several
programs at one time
Read Information Sheet No 1.1-1 and find out how much you can
remember. Do Self-Check 1.1-1 to know how much you have learned.
5
Lesson Information 1.1-1
OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES
Learning Objectives:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing, installing and
testing of computer hardware and software.
2. Determine the effects of computers to the people, health risk, and to the
environment.
During installation and initial test, careful planning and preparation are to be
done. To avoid personal injury and damages to wiring due to sharp pins on
connectors and printed circuit assemblies, rough chassis edges and corners, and hot
components.
6
o If the computer does not pass any of the power on self-test (POST), the
computer will receive an irregular power on self-test. An irregular POST is a
beep code which is different from the standard beep which can either be no
beeps at all or a combination of different beeps.
EFFECTS OF COMPUTERS
1. Violation of Privacy
3. Health Risks
7
called computer addiction, occurs when someone becomes obsessed with using the
computer. Once recognized, computer addiction is a treatable disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information. Some
of these unsuspecting, innocent computer users have fallen victim to crimes
committed by dangerous strangers. Protect yourself and your dependents from these
criminals by being cautious. For example, do not share information that would allow
others to identify or locate you.
5. Impact on Environment
8
A. IDENTFICATION
Direction: Identify the Precautions and Procedures write TRUE if the
statement is correct and FALSE if the statement is wrong.
B. MATCHING TYPE
Direction: Select your answer on the choices below that will correspond on
the statement. Write the letter of your answer on the space provided.
A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force
9
5. Prolonged or improper computer use can lead to injuries or
disorders of the hands, wrists, elbows, eyes, necks, and back.
What I Need To Know?
Read F. Information Sheet No 1.1-2 and find out how much you can
remember. Do G. Self-Check 1.1-2 to know how much you have learned.
H.
REQUIRED DOCUMENTS/FORMS
A. Job Order- (sometimes job ticket or work ticket, as it often has some type of
ticket attached) is an order received by an organization from a customer or client, or
an order created internally within the organization. A work order may be for
products or services.
amount of raw material to be used, its price and amount o the types of
labor required, rate (per hour or per unit) and amount o the machine
utilization for each machine during the routing process, its rate and amount
10
Sample Job Order Form
Computer Repair Job Order Form
11
develop the operator’s capability to be competent in maintenance activities
through education, training and motivation.
o To enhance capability for advanced and sophisticated technology that
would reinforce competitive power.
Sample Request Form
Observation/s:
Reported by:
Alexis V. Larosa
Activity: Reformat Laptop
Signed: ______________________
12
Sample Report Sheet
Repair Report Sheet
Area/Section: ANCHS Computer Laboratory
Education
Employers prefer applicants who have completed and pass the National
Certification Exam II (NC II) from any DepEd School, vocational training institute or
similar setting. Some employers require at least a high school diploma.
Certifications
13
Physical and Personal Traits
Applicants should know how to use a variety of standard office software, and
some jobs also require knowledge of networking. Companies prefer candidates with
previous PC repair experience (Immersion), and they may look for candidates with
experience repairing specific brands of computers. Technicians need strong oral
communication skills and should be able to explain their findings to customers using
common terms.
A. TRUE OR FALSE
Direction: Precautions and Procedures. Write TRUE if the statement is correct
and FALSE if the statement is wrong.
14
_________ 4. Computer Technicians need not to have strong oral communication
skills for they only repair computers.
Read Information Sheet No 1.1-3 and find out how much you can
remember. Do Self-Check 1.1-3 to know how much you have learned.
LEARNING OBJECTIVES:
15
Real-time
A real-time operating system is a multitasking operating system that aims at
executing real-time applications. The main objective of real-time operating systems
is their quick and predictable response to events. They have an event-driven or time-
sharing design and often aspects of both.
Multi-user
A multi-user operating system allows multiple users to access a computer
system concurrently. Single-user operating systems, as opposed to a multi-user
operating system, are usable by a single user at a time. Being able to use multiple
accounts on a Windows operating system does not make it a multi-user system.
Rather, only the network administrator is the real user.
Distributed
A distributed operating system manages a group of independent computers
and makes them appear to be a single computer. The development of networked
computers that could be linked and communicate with each other gave rise to
distributed computing. Distributed computations are carried out on more than one
machine. When computers in a group work in cooperation, they make a distributed
system.
16
Embedded
Embedded operating systems are designed to be used in embedded computer
systems. They are designed to operate on small machines like PDAs with less
autonomy. They are able to operate with a limited number of resources. They are
very compact and extremely efficient by design.
DOS
Mac OS X
The Macintosh (often called "the Mac"),
introduced in 1984 byApple Computer, was the
first widely-sold personal computer with a
graphical user interface (GUI). The Mac was
designed to provide users with a natural,
17
Commons.wikimedia.org
intuitively understandable, and, in general, "userfriendly" computer interface. This
includes the mouse, the use of icons or small visual images to represent objects or
actions, the point-and-click and click-and-drag actions, and a number of window
operation ideas. Microsoft was
successful in adapting user interface concepts first made popular by the Mac in its
first Windows operating system. The primary disadvantage of the Mac is that there
are fewer Mac applications on the market than for Windows. However, all the
fundamental applications are available, and the Macintosh is a perfectly useful
machine for almost everybody. Data compatibility between Windows and Mac is an
issue, although it is often overblown and readily solved.
LINUX
Microsoft Windows
Windows is a personal computer operating system from Microsoft that, together with
some commonly used business applications such as Microsoft Word and Excel, has
become a de facto "standard" for individual users in most corporations as well as in
most homes. Windows contains built-in networking, which allows users to share files
and applications with each other if their PCs are connected to a network. In large
enterprises, Windows clients are often connected to a network of UNIX and NetWare
servers. The server versions of Windows NT and 2000> are gaining market share,
providing a Windows-only solution for both the client and server. Windows is
supported by Microsoft, the largest software company in the world, as well as the
Windows industry at large, which includes tens of thousands of software developers.
18
SELF-CHECK NO. 1.1-3
A. IDENTIFICATION
Direction: Write TRUE if the statement is correct and FALSE if the statement
is wrong.
________3) Time-sharing operating systems schedule time for efficient use of the
system and may also include accounting for cost allocation of
processor time, mass storage, printing, and other resources.
________4) For software functions such as input and output and memory allocation,
the operating system acts as an intermediary between application
programs and the computer hardware.
________5) Operating systems are found on almost any device that contains a
computer—from cellular phones and video game consoles to
supercomputers and web servers
19
What I Need To Know?
Read Information Sheet No 1.1-4 and find out how much you can
remember. Do Task Sheet 1.1-4 to know how much you have learned.
LEARNING OBJECTIVES:
After reading this Information Sheet, you should be able to:
1. Classify of the hardware and software components of a computer with its
corresponding functions.
2. Determine the various computer components and peripherals
Basic Hardware Components of Computer System
A computer is an electronic machine, operating under the control of
instructions stored in its own memory, that can be programmed to accept data
(input), process it into useful information (output), and store it away in a secondary
storage device (store) for safekeeping or later reuse. The processing of input into
output is directed by the software but performed by the hardware. Figure below
shows some common computer hardware components.
20
Commons.wikimedia.org
Input devices. Input devices allow you to enter data or commands in a form that the
computer can use; they send the data or commands to the processing unit.
Commonlyused input devices include keyboard, mouse, microphone, scanner, digital
camera, and PC camera.
Output devices. Output devices show people the processed data--information --in
understandable and useful form. Four commonly used output devices are a printer, a
monitor, speakers, and a portable media player. Input/output devices are playing an
increasingly significant role in our lives. The number and variety of input/output
devices are expanding.
Processing devices. Processing devices are the computer electronic circuitry
housed in the system unit. The processor, formally known as the central processing
unit (CPU), has electronic circuitry that manipulates input data into the information
people want. Computer instructions are actually are executed in the central
processing unit. Memory is a series of electronic elements that temporarily holds
data and program instructions while they are being processed by the CPU. Both the
21
processor and memory consist of chips. A chip is an electronic device that contains
many microscopic pathways designed to carry electrical current.
Storage devices. Storage usually means secondary storage that can store data and
programs outside the computer itself. Storage devices hold data, information, and
programs permanently. Common storage devices include a hard disk, USB flash
drives, CDs, DVDs, and memory cards.
Communications devices. Communications devices provide connections between
the computer and communications networks, and enable computer users to
communicate and to exchange data, information, and programs with other
computers. Communications devices transmit these items over transmission media
such as cables, telephone lines, satellites, and cellular radio. A widely used
communications device is a modem.
In summary, we communicate with computers through input/output devices.
Input devices translate our data and communications into a form that the computer
can understand. The computer then processes these data, and an output device
translates them back into a form we can understand. The central processing unit
manipulates data and controls the other parts of the computer system. Memory
(primary storage) temporarily stores data and program instructions during
processing, while secondary storage feeds data and instructions into the central
processor and stores data for future use.
Commons.wikimedia.org
22
The memory device is a package that holds temporarily data and program
instructions during processing.
23
approximately 1 billion bytes. A terabyte (TB) is equal to approximately 1 trillion
bytes.
The system unit contains two types of memory: volatile and nonvolatile. The
contents of volatile memory are lost when the computer power is turned off. In
nonvolatile memory, the combination of circuit states is fixed, and therefore the
contents of nonvolatile memory are not lost when power is removed from the
computer.
Ports and Connectors
24
Serial port is a type of interface that
connects a device to the system unit by
transmitting data one bit at a time.
Commons.wikimedia.org
Power Supply
The power supply is the component of the system unit that
converts the wall outlet AC power into DC power. Different
motherboards and computers require different wattages on the
power supply
Commons.wikimedia.org
25
TASK SHEET. 1.1-4
Equipment:
1. Computer
2. PPE
Steps/Procedure:
Read Information Sheet No 1.1-5 and find out how much you can
remember. Do Self-Check 1.1-5 to know how much you have learned.
26
LEARNING OBJECTIVES:
After reading this Information Sheet, you should be able to:
1. Identify the different tools and equipment used in computer systems and
networks
2. Determine the different use and functions of these tools and equipment’s
Protective Eyewear
wikimedia.org
Commo
ns.
Multi-tester or Multi-meter
Commons.wikimedia.org
27
Pliers (Assorted)
ons.wikimedia.org
Comm
Screwdriver
Commons.wikimedia.org
Soldering Gun
A soldering gun is
a tool for soldering metals using
tinbased solder to achieve a highly
conductive contact
mmons.wikimedia.org
C
o
Desoldering Tool
28
s.wikimedia.org
Common
Allen Wrench
Commons.wikimedia.org
Flashlight
Commons.wikimedia.org
29
Used for extracting and inserting
BIOS Chip
Commons.wikimedia.org
Mirror
Tweezers
Gloves
30
A gloves are garments for covering
and protecting the whole hand
Commons.wikimedia.org
Printer
Commons.wikimedia.org
Computer
A computer is a programmable
machine designed to automatically
carry out a sequence of arithmetic or
logical operations
Commons.wikimedia.org
31
intermediary between hardware and Commons.wikimedia.org
software
Commons.wikimedia.org
Commons.wikimedia.org
Crimping Tool
32
A crimping tool is a tool designed
to crimp or connect a connector
to the end of a cable. For
example, network cables and
phone cables are created using a
crimping tool to
connect the RJ-45 and RJ-
11 connectors to the end of the
cable. In the picture to the right, is
an example of what a crimping
tool looks like. This example
shows a tool capable of crimping
both RJ-11 and RJ-45 connectors.
Commons.wikimedia.org
LAN Tester
Commons.wikimedia.org
wikimedia.org
Commons.
33
RJ 45 Connector
Commons.wikimedia.org
Ethernet Switch
A. TRU OR FALSE
Direction: Identify the Precautions and Procedures write TRUE if the statement is
correct and FALSE if the statement is wrong.
34
________2. Uni-tester is an electronic device for measuring instrument that
combines several measurement and functions
________3. Fliers are hand tool used to hold objects firmly for bending or
physical compression
________4. A screw is a tool for driving screws and often rotating other machine
elements with the mating drive system
B. Direction: Select your answer on the choices below that will correspond on the statement.
Write the letter of your answer on the space provided.
a. Mirror
b. Flash light
c. Gloves
d. Tweezers
e. IC Insertion and Extracting Tool
______ 1. A hand held portable electric light source
______ 4. Intended for picking up objects too small for human hands
Read Information Sheet No 1.1-6 and find out how much you can
remember. Do Self-Check 1.1-6 to know how much you have learned.
Learning Objectives:
35
2. Access the BIOS Setup
3. Select proper boot device
BIOS Setting
The BIOS or Basic Input/Output System is the basic controller that allows
all of the components that make up a computer system to talk to one another. But in
order for this to happen, there are a number of things that the BIOS needs to know
how to do. This is why the settings within the BIOS are so critical to the operation of
the computer system. For about 95% of the computer users out there, they will never
need to adjust the BIOS settings of their computer. However, those who have
chosen to build their own computer system will need to know how to modify the
settings.
Some of the critical things one will need to know are the clock settings,
memory timing, boot order and drive settings. Thankfully the computer BIOS has
come a long way in the past ten years where many of these settings are automatic
and very little needs to be adjusted.
The method for accessing the BIOS is dependent upon the manufacturer of the
motherboard and the BIOS vender they have selected. The actual process to get to
the BIOS is identical, just the key that is needed to be pressed will vary. It is
important to have the user manual for the motherboard handy whenever changes
will be made to the BIOS.
2. Look up what key needs to be pressed to enter the BIOS. Some of the
common keys used to access the BIOS are F1, F2 and the Del key.
Generally, the motherboard will post this information when the computer
first turns on.
3. Press the key to enter the BIOS after the beep for a clean POST (Power-
On Self Test) is signaled. If the procedure has been done correctly, the
BIOS screen should be displayed rather than the typical boot screen.
Because of the wide variety of computer and BIOS manufacturers over the evolution
of computers, there are numerous ways to enter the BIOS or CMOS Setup. Below is
a listing of most of these methods, as well as other recommendations for entering
the BIOS setup.
36
Note: Apple, or Mac, computers do not have a BIOS and instead utilize an EFI,
which does not need to modified based on the hardware in the computer, like a
BIOS. The EFI provides better integration between hardware and software for Apple
computers, virtually eliminating the need for a BIOS.
Computers manufactured in the last few years allow you to enter the BIOS setup
using one of the five keys shown below during the boot process.
• F1
• F2 *
• F10 **
• DEL
• ESC
* If pressing F2 opens a diagnostics tool, your setup key is likely F10
** F10 is also used for the boot menu. If F10 opens a boot menu, your setup key is likely F2.
Setup keys are to be pressed as the computer is booting up. Most users will
see a message similar to the example below upon startup. Some older computers
may also display a flashing block to indicate when to press the F1 or F2 keys.
Once you have successfully entered the CMOS setup, you should see a screen
similar to the example below. Your CMOS setup may look a little different,
depending on the manufacturer, but should still have most of the same options in the
menu on the left or along the bottom of the screen.
37
➢ American Megatrends Inc. (AMI)
➢ Phoenix Technologies
➢ ALi
Commons.wikimedia.org
Boot Order
Boot order determines which device the motherboard will look at for an
operating system or installer. The options typically include Hard Drive, Optical Drive,
Floppy Drive, Network and Other. The standard order at first startup is Floppy, Hard
Drive, Optical Drive, etc. This will generally cause the system to find the hard drive
first which will not have a functional operating system on the computer.
Since we are installing a new operating system on the computer, and our
installation files are stored in a CD-ROM, we need to set the computer to boot from
the CD-ROM drive instead. This allows the computer to boot from the OS
installation CD that has a bootable installer program on it. This is done in the BIOS
setup.
38
Options Menu. This is usually found at the top
of the screen. In some computers it is found in
the Advance menu.
Commons.wikimedia.org
Commons.wikimedia.org
3. Go to the Exit menu and select Save and Exit to save your
configuration.
Commons.wikimedia.org
Commons.wikimedia.org
Note: You may need to consult the User's Manual on how to set the CD-ROM Drive
as first boot device.
39
Self Check 1.1-6
I. Identification:
Identify the following acronyms:
1. BIOS -
2. POST –
II. Enumeration
1. What are the 3 common keys used to access the BIOS.
2. Enumerate the steps on how to set-up the CD-ROM as the first boot
device.
III. Essay:
1. Why do we need to set the computer to boot from the CD-ROM drive?
40
What I Need To Know?
Read Information Sheet No. 1.2-1 and find out how much you can
remember. Do Self-Check 1.2-1to know how much you have learned.
Learning Objectives:
1. Install Operating System (OS) in accordance with established installation
procedures and to comply with end-user requirements
2. Install peripherals/ devices in accordance with manufacturer’s instructions
and/ or OS installation procedures
3. Configure peripherals/ devices in accordance with manufacturer’s instructions
and/ or OS installation procedures
4. Access OS and drivers updates/ patches in accordance with manufacturer’s
recommendations and requirements
5. Install OS and drivers updates/ patches in accordance with manufacturer’s
recommendations and requirements
6. Check the quality of the work undertaken in accordance with established
procedures.
Software Fundamentals
Software consists of computer programs, which are sequences of instructions
for the computer. The process of writing (or coding) programs is called
programming, and individuals who perform this task are called programmers.
TWO TYPES OF SOFTWARE
1. Systems software - is a set of instructions that serves primarily as an
intermediary between computer hardware and application programs and may
also be directly manipulated by knowledgeable users.
Categories:
41
1. Operating System
42
Self-Check 1.2-1
Test I. Identification:
______________1.is the class of programs that control and support the computer
system and its information-processing activities.
43
What I Need To Know?
Read Information Sheet No. 1.2-2 and find out how much you can
remember. Do Self-Check 1.2-2 to know how much you have learned.
CREATING INSTALLERS
WHAT IS AN IMG OR ISO FILE? An IMG or ISO file is a complete image of physical
media such as a CD-ROM, DVD, floppy disk, etc. that contains all of the files in a
particular package.
44
WHAT DO I DO WITH MY INSTALLATION PACKAGE?
Your installation package contains one of the images identified in the previous
section.
To install any software package from an image, the image itself must first be
“mounted” by the Operating System.
• Burning the image directly to DVD making sure to specify the source
type as “image”. Once the burning of the image is complete, the physical
media can be inserted into the computer and will be recognized like any other
DVD. You must have a writable DVD drive. See the Creating Bootable DVD
Media section below.
Note: Burning the file to a disk as a “data disk” will simply end up with
an .img or .iso file on the disk, which cannot be used for the installation.
To prepare physical media from a bootable installation image, you require the
following:
45
application, follow the steps for that application LAUNCHING THE BURNING
SOFTWARE
46
1. In the Active@ISO Burner window, click on
the locator box as shown by the red arrow
Commons.wikimedia.org
4. Click Options:
Check: Commons.wikimedia.org
Commons.wikimedia.org
47
TASK SHEET. 1.2-2
Performance Objective In the Computer Lab, given all the software and a
computer, the learner must be able to create a an installation disk for Drivers,
Applications and Utilities 15 Minutes.
Equipment:
1.Computer
2.Installation Software (Drivers, Application Software and Utilities)
3. PPE
Steps/Procedure:
Read Information Sheet No. 1.2-3 and find out how much you can
remember. Do Task Sheet 1.2-3 to know how much you have learned.
48
To be able Create a Windows bootable USB from an ISO image we must
have a 8GB or higher USB and a Windows 10 ISO image downloaded on your
computer.
3
5
49
TASK SHEET. 1.2-3
Performance Objective In the Computer Lab, given all the software and
a computer, the trainee must be able to create a bootable Windows in
USB Drive in 25 Minutes.
Equipment:
1.Computer
2.Installation Software (Windows ISO File, Rufus, ISO Burner)
3. PPE
Steps/Procedure:
Read Information Sheet No. 1.3-1 and find out how much you can
remember. Do Self-Check 1.3-1 to know how much you have learned.
50
Installing Windows Operating System
Installing Windows 10
In order to install your copy of the Windows 10 operating system please make sure
to have the following items:
*NOTE: Please make sure to back up all of your important data before proceeding
with this installation.
Boot your computer after popping in the Windows 10 DVD into the DVD Drive/
bootable
USB Drive. In most cases if you do this you'll automatically boot in to the Windows
10 Installation DVD. Bootable USB Drive. But in some cases if the Boot device order
is changed in the BIOS it may boot in to your older OS, instead of our DVD/USB
Drive. In that case you'll need to change the BIOS settings to get it done.
Before the starting installation make sure what type of PC you are using( 32bit or 64
bit) To do this:
1. Right Click on This PC and click Properties:
2. You will then get the necessary information you need.
51
Step 2. You will see a prompt that says ‘Press any key to continue’. When you see
this press any key immediately. *NOTE: The following screen shots may differ from
what you may see during your installation. Step 3: Starting windows with windows
logo will appear
52
Step 8. “Where do you want to install Windows?”
Make sure the partition is highlighted.
Note: Deleting all the partition will erase all data in the system
Step 11. The next screen will show “Installing Windows” This process will take
approximately 25-20 minutes after which the system will reboot.
Note: Do not press any key during this boot up process so as not to disturb
the rest of the installation process.
53
Step 14. The next screen will prompt you to create a password for your account
(optional)
At this point windows installation will be setting up you computer for its first run.
54
TASK SHEET. 1.3-1
Performance Objective In the Computer Lab, given all the software and
a computer, the trainee must be able to Install Windows Operating
system, Drivers, Applications and Utilities in 1 hour
Equipment:
1.Computer
2.Installation Software (Windows Operating System Installer,
Drivers, Application Software and Utilities) 3. PPE
Steps/Procedure:
55
What I Need To Know?
Read Information Sheet No. 1.3-2 and find out how much you can
remember. Do Self-Check 1.3-2 to know how much you have learned.
Device driver
Before searching for the drivers or software of a device, make sure you know
the manufacturer and model of the device.You can often find the drivers available for
download from the manufacturer's web page or the drivers and utilities CD shipped
with your computer. You can find a listing of computer manufacturers in the internet.
56
➢ Sound card drivers
➢ Video drivers
➢ BIOS updates
After reinstalling Windows or your operating system you may find that you
have to reinstall many if not all of the drivers for your computer components.
Microsoft Windows and all other operating systems will not require you install drivers
in order. As long as you are installing the correct drivers for your computer you
should have no issues installing the drivers in any order.
follow this link for Tips and Tricks in installing and updating device drivers.
https://www.youtube.com/watch?v=BDtwfRnEl7I
57
What I Need To Know?
Read Information Sheet No. 1.4-1 and find out how much you can
remember. Do Self-Check 1.4-1 to know how much you have learned.
Both the Microsoft Windows and the Apple Macintosh operating systems use
the concept of a desktop. The desktop is an on-screen work area with common
graphical elements such as icons, buttons, menus, links, windows, and dialog boxes.
A software application can be started by clicking its program name on a menu, or list
of commands.
58
show. You can use a clip gallery to enhance your presentation with clip art images,
pictures, video clips, and audio clips.
7. Power users often use software that allows them to work with graphics and
multimedia. Computer-aided design (CAD) software assists in creating
engineering, architectural, and scientific designs. Desktop publishing (DTP) software
is used to design and produce sophisticated documents. DTP is developed
specifically to support page layout, which is the process of arranging text and
graphics in a document. Paint software is used to draw graphical images with
various on-screen tools. Image editing software provides the capability to modify
existing images. Video editing software and audio editing software can be used to
modify video and audio segments.
59
11. One of the main reasons people use computers is to communicate and share
information. E-mail software is used to create, send, receive, forward, store, print,
and delete e-mail (electronic mail). A Web browser is a software application used to
access and view Web pages. A chat client is software that allows you to connect to a
chat room, which permits users to chat via the computer.
12. A newsreader is a software program used to participate in a newsgroup,
which is an online area on the Web where users conduct written discussion about a
particular subject. An instant messenger is a software program installed to use
instant messaging (IM), a real-time communications service that notifies you when
one or more people are online and then allows you to exchange messages or files.
Groupware is a software application that helps groups of people on a network work
together and share information. A videoconference is a meeting between two or
more geographically separated people who use a network or the Internet to transmit
audio and video data.
A Web application is a software application that exists on a Web site. To access the
Web application, you visit the Web site that offers the program.
Many software applications and Web sites provide learning aids. Online Help is the
electronic equivalent of a user manual. Usually integrated into an application
software package, online Help often is context-sensitive, meaning that the Help
information is related to the current task being attempted. Most online Help also
provide links to Web sites that have a FAQs page. FAQs (Frequently Asked
Questions) supply answers to common queries. Many books are available to help
you learn to use the features of a personal computer application package. A wizard
is an automated assistant that helps complete a task by asking questions and then
performing actions based on the answers.
➢ productivity software,
➢ graphics design/multimedia software, ➢
home/personal/educational software, ➢ and
communications software.
An application can belong to more than one category. For example, an e-mail
program can be considered both productivity software and communications
software.
60
Anti-Virus
Overview
Browser Hijacker
One type of virus is called a browser hijacker. This works in a way that it takes over
parts of the internet browser you are using and redirects it to certain sites. Its
purpose is to increase advertisement revenue by bringing traffic to certain web
pages.
Directory Virus
A second type of virus is known as a Directory Virus and are also called File System
Virus or Cluster Virus. This virus works by changing the path that indicates the files
location by infecting the directory of your computer. These infect the entire directory
but are usually found in a location in the disk. An example is Dir-2 virus. These
make it difficult to locate your files and may seem that files have disappeared.
Trojan
Trojan or Trojan horse is sent to your computer by a program that it is hidden inside .
A trojan disguises itself to make one believe it is an important or useful program.
These are often in highly desirable downloads like games, free software, and even
movies or music. Trojans are different that other viruses, because they don’t
multiply or spread. However, they are very dangerous because they can capture
your login information on sites that you input your information.
Memory Resident Virus are put on your computers memory. When the operating
system runs the virus gets activated and every file that was opened gets infected.
Even after execution of the malicious code the virus stays hidden in the RAM. This
61
virus corrupts programs and files that are used in any way. Randex, Meve and
MrKlunky are some, just to name a few.
Overwrite Virus
Another type is Overwrite Virus. This virus takes a file and infects it and the
information in it is deleted, once that happens the file is partially useless or totally.
The file size is not changed even though the content has been replaced. The file
needs to be deleted, and you will lose the content originally in it.
Anti-Virus Tips
1.Obtain anti-virus software only from known, trusted sources and vendors. It is a
common ploy of cyber attackers to distribute fake anti-virus programs that are really
malware.
2. Make sure you have the latest version of your anti-virus software installed, that
your annual subscription is paid for and active and that your anti-virus is configured
to update automatically. If your computer has been offline or powered off for a while,
your anti-virus software will need to update itself when you turn it back on or
reconnect it to the Internet. Do not postpone these updates.
3. Make sure your anti-virus automatically scans portable media, such as USB
sticks, and ensure real-time protection is on.
4.Pay attention to the on-screen warnings and alerts generated by your anti-virus
software. Most alerts include the option of getting more information or a
recommendation about what to do next. If you get an alert on a work-supplied
computer, be sure to contact the help desk or your supervisor immediately.
5.Do not disable or uninstall your anti-virus software because you feel it is slowing
down your computer, blocking a website or preventing you from installing an app or
program. Disabling your anti-virus will expose you to unnecessary risk and could
result in a serious security incident. If problems persist on a work computer, contact
your help desk. If the problems persist on your personal computer, try contacting the
anti-virus vendor, visiting their website for more information or replacing your anti-
virus with another product.
6.Do not install multiple anti-virus programs on your computer at the same time.
Doing so will most likely cause the programs to conflict with each other and may
actually reduce the security of your computer.
7.Learn to recognize the warnings that your anti-virus software produces. Cyber
attackers can set up malicious websites that post very realistic but fake anti-virus
62
warnings and offer to help you “fix” your computer. Clicking on the links or buttons on
these websites can actually harm your computer.
Visit: https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw
Read Information Sheet No. 1.5-1 and find out how much you can
remember. Do Self-Check 1.5-1 to know how much you have learned.
You were introduced with all the necessary knowledge and skills on installation of
computer devices and operating system. Now, after executing the correct
procedures I am sure that installation is a very easy task for you. Those skills will be
very essential for the next lesson.
In the next phase of your learning it will focus in conducting test on the 588 installed
computer components. After reading all the required topics and performing the
essential skills you must be able to:
✓ Follow OHS policies and procedures in conducting tests;
✓ Check circuits and systems being isolated using specified testing procedures;
✓ Test devices, systems and/or installation to determine its conformity with the
requirements;
✓ Undertake final inspections on the installed devices, systems to ensure
conformity with the requirements;
✓ Accomplish technical reports on the tests conducted; and
✓ Follow procedures in forwarding documentation to appropriate personnel
and/or authority on the test conducted.
63
✓ take reasonable care of your own health and safety when moving
heavy components
✓ not cause any electrical hazards
✓ make sure that workstations meet safety requirements.
You need to adhere to health and safety regulations as they will help to protect you
and others and will avoid any unnecessary legal action for reckless and unsafe
working practices. If you identify any health and safety problems, you should tell
yourline manager or the health and safety representative immediately.
The most basic test is to switch the system on to check it starts without errors. ICT
professionals are also likely to use tools and utilities to check that all is well with the
system after an installation.
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include
the following:
➢ Digital multimeter is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays
the information on an LCD or LED.
Commons.wikimedia.org
64
Commons.wikimedia.org
Software Tools
Like hardware tools, there are a variety of software tools that can be used to
643 help technicians pinpoint and troubleshoot problems. Many of these tools are
free and several come with the Windows operating system.
Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able to
use a range of software tools to diagnose problems, maintain hardware, and
protect the data stored on a computer.
You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
Use the Windows 10 boot disk for troubleshooting and repairing corrupted files.
The Windows 10 boot disk repairs Windows system files, restores damaged or
lost files, and reinstalls the operating system.
Test procedures
A test procedure is a set of steps to guide you through what needs to be done to
thoroughly test the installation. It is designed to help you work more effectively
and to make sure you test everything that needs testing.
65
Test procedures are created in-house and could include these steps:
1. Gathering test information. The first step is to run the tests required by the
procedure and find out what happens. You should record all the results of your
tests in a log so that you know which pass and which fail, thereby requiring
further action.
2. Validating the test information. The next step is to check the data you
gathered from the tests to make sure it is correct. This is usually done by running
the tests again.
3. Responding to test information. This step is important because you need to
be able to recognize when a test shows problems or is successful. For example,
if ping is used to test a network connection then ‘Request timed out’ shows the
test was not successful.
66
➢ Each of the serial and parallel port interface cables must be firmly attached to
an appropriate connector on the back of the computer as well as to the
interface connector on the device. The captive screws that secure these
connectors at each end of the interface cable must be secure enough to
ensure a firm connection.
6. Verify that the video interface cable is firmly attached to the video connector on
the back panel or to a video expansion card, and also to the connector on the
back of the monitor. For proper connection of the video monitor, see the
documentation for the monitor.
7. Inspect all external monitor controls for any obvious damage or improper
settings. For proper settings of the video monitor controls, see the documentation
for the monitor.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys
are sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and indicators, and
all user-accessible data storage devices for any signs of physical damage. Does
the inspection reveal any problems?
To observe problem indications during the boot routine, perform the following
steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.
67
Does the fan run
normally? o Yes.
Proceed to step 3.
o No. Troubleshoot the system power supply.
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the
upper-right corner of the keyboard. After all three indicators flash momentarily,
and following a long pause (approximately 30 seconds), the Num Lock
indicator should light up and remain on (unless the Num Lock option is set to
Off in the System Setup program). Do these indicators flash on and off within
approximately 10 seconds after the boot routine starts? o Yes. Proceed to
step 4.
o No. Troubleshoot the system power supply. If the troubleshooting
procedure indicates that the system power supply is operational,
troubleshoot the memory.
4. During the boot routine, observe the system for any of the following indications:
o Beep codes — A beep code is a series of beeps that indicates an error
condition.
NOTICE: Before you proceed with the internal visual inspection described in this
section, ensure that the user has saved all open files and exited all open application
programs if possible.
68
1. Turn off the system, including any attached peripherals, and disconnect all the 779
AC power cables from electrical outlets.
CAUTION: The heat sink assembly can get extremely hot during system
operations. Be sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp
edges on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly
or assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of
each chip.
6. Check all cable connectors inside the computer to verify that they are firmly 788
attached to their appropriate connectors.
8. Reconnect the computer and any attached peripherals to their power sources, 791
and turn them on.
Is your PC healthy? Don't be too sure. Think back to when you heard a kerklunk
sound coming from the hard drive. Or maybe you remember the last time your
Internet connection was down.
The best way to find out what's wrong is to take a proactive approach: Check under
your PC's hood with the following mostly free diagnostic tools, and see if anything is
amiss-before disaster strikes.
69
Three Major Components of Computer
System: o Hardware o Software
o Firmware
4. Power supply
o Power cord
o Fuse
70
Check for virus signature updates
Check for spyware updates
1. First, it will check all the basic components including among other things the
system clock, the processor, RAM, the keyboard controller and the Video
2. After the video has been tested the BIOS will then indicate any errors
encountered by displaying either a numeric code or a text message on the screen.
When a device fails the first part of the POST, the BIOS will send a series of beeps
from the PC's speaker (internal) to inform the PC user that there is a problem these
beeps are coded allowing the user to diagnose the troublesome component. When
the POST has been completed successfully, the PC will make a short beep to let the
user know everything is as it should be.
71
Three (3) major brands of BIOS chip
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS
Commons.wikimedia.org
72
Phoenix BIOS ERROR BEEP
CODES
Commons.wikimedia.org
Commons.wikimedia.org
73
Self-Check1.5-1
74
Post-Test
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
a. RAM
b. Operating system
c. CPU
d. HDD
75
6. Identify the malwares.
a. trojan
b. virus
c. spyware
d. all of the choices
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
76
c. Internet
d. Cable Commons.wikimedia.org
a. Onsite Software
b. Operating System
c. Only Read Software
d. On-demand System
Commons.wikimedia.org
Generalization
This module gave you the opportunity to develop your knowledge, hone your
skills, behavior and motivations required in Installing and Configuring Computer
Systems that is in line with the industry standards.
You learned to Assemble computer hardware, Prepare installer, Install
operating system and drivers for peripherals/devices, install application software and
conduct testing and documentation.
This will prepare you to move on to the next lessons to improve and gain
important knowledge and skills in Setting up Computer Networks.
77
Glossary of Terms
Soldering - is a term that describes the process of joining two pieces of metal using
a filler metal.
Memory - Memory is a temporary storage area that holds data and instructions for
an electronic device to function.
Motherboard -A motherboard is a printed circuit board containing the components of
an electronic device.
Processor -This is the hardware within a computer that executes programs.
Microprocessor-A microprocessor is a central processing unit, or CPU, contained
on a single integrated circuit.
Power Supply -The power supply converts main AC current to low-voltage regulated
DC current used to power an electronic device.
Expansion Card -An expansion card is a circuit board that can be added to the
motherboard to give extra memory for processing data.
RAM-Random Access Memory, or RAM, is the term given to computer data
storage used to store frequently accessed data to increase the speed of the system.
78
USB-USB stands for Universal Serial Bus. It is used to connect a computer to
devices and peripherals.
Serial Ports-A serial port is a communication interface that transfers one bit of data
in or out to modems, terminals, and peripherals.
Parallel Ports- A parallel port is a communication interface that transfers several bits
of data simultaneously to peripherals.
Disk Cleanups -Disk cleanups are designed to free up disk space on a computer’s
hard drive.
Antivirus Software -Antivirus software detects and destroys computer viruses. A
computer virus is code that is capable of copying itself to corrupt a system or destroy
data.
Antimalware-Antimalware is software that protects a computer from infections that
are aimed at stealing data from the user or computer.
79
Author
Alexis V. Larosa
Teacher II
Alubijid National Comprehensive High School-Senior High School
Division of Misamis Oriental
80
Key Answers
81
SELF-CHECK 1.1-1
SELF-CHECK 1.1-2
82
SELF-SCHECK 1.1-5
Self-Check 1.1-6
83
Self -Check 1.2 -1
Self -Check1.5 -1
References
1. http://www.workcover.nsw.gov.au/OHS/default.htm
2. www.cengageasia.com
3. www.wikipedia.com
4. commons.wikimedia.org
Video clips
http://PCitYourself.com
https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw
5S –
84
http://www.kaizenworld.com/_Media/5s-explanation_med_hr.jpeg
http://www.canstockphoto.com/images-photos/
http://www.netanimations.net/computers.htm
3R –
http://www.ecocentric.co.in/site/wp-content/uploads/2013/07/reduce-reuse-recycle.jpg
http://www.neptunoeng.com/images/3r.png
http://ogs.ny.gov/Global/Images/BU/BA/RPM/Rx3.gif11/2/15
http://www.mymcpl.org/_uploaded_resources/go_green_0.jpg
Effects of contaminants -
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
http://media.salon.com/2015/01/discarded_computers_resize.jpg
85