0% found this document useful (0 votes)
55 views

CSS Module Q3

This document provides an overview of computer hardware and components for students taking a Computer System Servicing course. It discusses the definition of a computer and its basic components of hardware and software. It then covers the generations of computers from the first to fifth generation and the types of computers including supercomputers, mainframes, mini computers, workstations, and microcomputers. The document also discusses different computer components and the two main styles of computers - PCs and Macs. The intended learning outcomes are for students to be able to identify computer parts and components and explain classifications and generations of computers.

Uploaded by

hi022885
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

CSS Module Q3

This document provides an overview of computer hardware and components for students taking a Computer System Servicing course. It discusses the definition of a computer and its basic components of hardware and software. It then covers the generations of computers from the first to fifth generation and the types of computers including supercomputers, mainframes, mini computers, workstations, and microcomputers. The document also discusses different computer components and the two main styles of computers - PCs and Macs. The intended learning outcomes are for students to be able to identify computer parts and components and explain classifications and generations of computers.

Uploaded by

hi022885
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 60

COMPUTER

SYSTEM
SERVICING NCII
QUARTER 3

(COMPILATION OF LECTURES, DISCUSSIONS


AND SUPPLEMENTAL MATERIALS)
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Module Title: CSS NCII

Grade: 11

Time/ Schedule: Quarter 3 (Week 1 of 4)


Learning Outcomes: Assemble / Disassemble Computer Hardware

Topic: Computer Hardware and Components

Figure 1: Computer Hardware and Components

Learning Objectives:
At the end of this lesson, the students should be able to:

 Identify the different types and parts of the Computer.


 Explain the Classifications and Generations of Computer.
 Identify the Computer Components.

INTRODUCTION

2|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Being a modern-day kid, you must have used, seen, or read about computers. This is because they are an
integral part of our everyday existence. Be it school, banks, shops, railway stations, hospital or your own
home, computers are present everywhere, making our work easier and faster for us. As they are such
integral parts of our lives, we must know what they are and how they function. Let us start with defining
the term computer formally.

THE COMPUTER
Computer is an electronic device that receives input, stores or processes the input as per user instructions
and provides output in desired format.

A computer is a programmable device that stores, retrieves, and processes data. You can use a computer
to type documents, send email, play games, and browse the Web. You can also use it to edit or create
spreadsheets, presentations, and even videos.

The Basic components of Computer


 Hardware - is any part of your computer that has a physical structure. It is a tangible part of
computer.
Examples: keyboard, mouse

 Software - is any set of instructions that tells the hardware what to do and how to do it.
Examples: web browser, games, word processor.

COMPUTER SYSTEM DESIGN

GENERATIONS OF COMPUTERS
 First Generation (1940-1956) Vacuum Tubes
Vacuum tubes were larger components and resulted in first generation computers being quite
large in size, taking up a lot of space in a room.

 Second Generation (1956-1963) Transistors


Transistors were smaller than vacuum tubes and allowed computers to be smaller in size, faster in
speed, and cheaper to build.

 Third Generation (1964-1971) Integrated Circuits (IC)


IC's in computers helped reduce the size of computers even more compared to second-generation
computers, and make them faster.

 Fourth Generation (1972-2010) Microprocessor


Microprocessors, along with integrated circuits, helped make it possible for computers to fit
easily on a desk and for the introduction of the laptop.

 Fifth Generation (2010-present) Artificial Intelligence


AI (artificial intelligence), an exciting technology that has many potential applications around the
world. Leaps have been made in AI technology and computers, but there is still room for much
improvement.

TYPES OF COMPUTERS / CLASSIFICATIONS OF COMPUTERS

3|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Super Computer
Supercomputers are the biggest and fastest computers. They are designed to process huge
amount of data. A supercomputer can process trillions of instructions in a second. It has
thousands of interconnected processors. Supercomputers are particularly used in scientific and
engineering applications such as weather forecasting, scientific simulations and nuclear energy
research.

The supercomputers are very expensive and very large in size. It can be accommodated in large
air-conditioned rooms; some super computers can span an entire building. The most powerful
computers in terms of performance and data processing are the Supercomputers. These are
specialized and task specific computers used by large organizations.

Examples: Space Exploration, Earthquake Studies, Weather Forecasting, Nuclear Weapon


Testing

 Mainframe Computer
Mainframe computers are designed to support hundreds or thousands of users simultaneously.
They can support multiple programs at the same time. It means they can execute different
processes simultaneously.

Mainframe computers can be accommodated in large air-conditioned rooms because of its size.
Super-computers are the fastest computers with large data storage capacity, Mainframes can also
process & store large amount of data. Banks educational institutions & insurance companies use
mainframe computers to store data about their customers, students & insurance policy holders.

 Mini Computer
It is a midsize multiprocessing computer. It consists of two or more processors and can support 4
to 200 users at one time. Mainframe computers are used in institutes and departments for tasks
such as billing, accounting and inventory management. A minicomputer lies between the
mainframe and microcomputer as it is smaller than mainframe but larger than a microcomputer.

 Workstation
Workstation is a single user computer that is designed for technical or scientific applications. It
has a faster microprocessor, a large amount of RAM and high-speed graphic adapters. It generally
performs a specific job with great expertise; accordingly, they are of different types such as
graphics workstation, music workstation and engineering design workstation.

 Microcomputer
Microcomputer is also known as a personal computer. It is a general-purpose computer that is
designed for individual use. It has a microprocessor as a central processing unit, memory, storage
area, input unit and output unit.

The micro-computers are widely used & the fastest growing computers. These computers are the
cheapest among the other three types of computers. The Micro-computers are specially designed
for general usage like entertainment, education and work purposes.
Examples: Desktop, Laptops, PDA, Tablets, Smartphones.

DIFFERENT TYPES OF COMPUTERS


When most people hear the word computer, they think of a personal computer such as a desktop or
laptop. However, computers come in many shapes and sizes, and they perform many different functions

4|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
in our daily lives. When you withdraw cash from an ATM, scan groceries at the store, or use a calculator,
you're using a type of computer.

Figure 2: Different Types of Computer

Desktop Computers
Many people use desktop computers at work, home, and school. Desktop computers are designed to be
placed on a desk, and they're typically made up of a few different parts, including the computer case,
monitor, keyboard, and mouse.

Laptop Computers
The second type of computer you may be familiar with is a laptop computer, commonly called a laptop.
Laptops are battery-powered computers that are more portable than desktops, allowing you to use them
almost anywhere.

Tablet Computers
Tablet computers—or tablets—are handheld computers that are even more portable than laptops.
Instead of a keyboard and mouse, tablets use a touch-sensitive screen for typing and navigation. The
iPad is an example of a tablet.

Servers
A server is a computer that serves up information to other computers on a network. For example,
whenever you use the Internet, you're looking at something that's stored on a server. Many businesses also
use local file servers to store and share files internally.

OTHER TYPES OF COMPUTERS


Many of today's electronics are basically specialized computers, though we don't always think of them
that way. Here are a few common examples.

Smartphones
Many cell phones can do a lot of things computers can do, including browsing the Internet and playing
games.

Wearables
Wearable technology is a general term for a group of devices—including fitness trackers and
smartwatches—that are designed to be worn throughout the day.

Game Consoles
A game console is a specialized type of computer that is used for playing video games on your TV.

TVs
Many TVs now include applications—or apps—that let you access various types of online content. For
example, you can stream video from the Internet directly onto your TV.

5|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

THE TWO MAIN STYLE OF COMPUTERS


 PCs
This type of computer began with the original IBM PC that was introduced in 1981. Other
companies began creating similar computers, which were called IBM PC Compatible (often
shortened to PC). Today, this is the most common type of personal computer, and it typically
includes the Microsoft Windows operating system.

 MAC
The Macintosh computer was introduced in 1984, and it was the first widely sold personal
computer with a graphical user interface, or GUI (pronounced gooey). All Macs are made by one
company (Apple), and they almost always use the Mac OS X operating system.

COMPUTER COMPONENTS
Input Devices - Input device enables the user to send data, information, or control signals to a computer.
The Central Processing Unit (CPU) of a computer receives the input and processes it to produce the
output.
Examples: Keyboard, mouse, scanner

Output Devices - The output device displays the result of the processing of raw data that is entered in the
computer through an input device. There are a number of output devices that display output in different
ways such as text, images, hard copies, and audio or video.
Examples: Monitor, printer, Projector

Processor - A Central Processing Unit is also called a processor, central processor, or microprocessor.
It carries out all the important functions of a computer. It receives instructions from both the hardware
and active software and produces output accordingly. It stores all important programs like operating
systems and application software. CPU also helps Input and output devices to communicate with each
other. Owing to these features of CPU, it is often referred to as the brain of the computer.

Storage Devices - Alternatively referred to as digital storage, storage, storage media, or storage
medium, a storage device is any hardware capable of holding information either temporarily or
permanently.

TWO TYPES OF STORAGE DEVICE


 Primary or Temporary Storage - is a medium that holds memory for short periods of time
while a computer is running.
Example: RAM (Random Access Memory)

 Secondary or Long Term Storage - referred to as external memory, secondary memory, and
auxiliary storage, a secondary storage device is a non-volatile device that holds data until it is
deleted or overwritten.
Examples: Hard Disk Drive, Flash Disk Drive, Memory Card

6|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
HARDWARE

BASIC PARTS OF COMPUTERS

System Unit
It is referred to as a box, main unit, and system box, a system unit is the case that contains all the main
parts of a computer. It is also called Computer Case, Computer Chassis or Computer Tower.
Monitor
The monitor works with a video card, located inside the computer case, to display images and text on
the screen. Most monitors have control buttons that allow you to change your monitor's display settings,
and some monitors also have built-in speakers

Different Types of Monitors


 CRT (Cathode Ray Tube) - is the electron beams in a monitor moving across your screen either
interlaced or non-interlaced, hitting phosphor dots on the inside glass tube. The picture is an
example of the inside of a computer monitor that shows the CRT connected to the screen.

 LCD (Liquid Crystal Display) - is a flat display technology used in laptops, cell phones,
calculators, digital cameras, and flat screen displays. The LCD is made of two sheets of a flexible
polarizing material and a layer of liquid crystal solution between the two.

 LED (Light-Emitting Diode) - is a semiconductor that illuminates when an electrical charge


passes through it. LEDs are commonly green, amber, or red, but they can be an assortment of
other colors as they've become popular with case lighting.

Keyboard
A computer keyboard is one of the primary input devices used with a computer. Similar to an electric
typewriter, a keyboard is composed of buttons that create letters, numbers, and symbols, as well as other
functions.
 Parts of Keyboard: Function keys, control keys, typing (alphanumeric keys), navigation keys
and numeric keypad

Modem
A modem or broadband modem is a hardware device that connects a computer or router to a broadband
network.

Mouse
A computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user
interface) and can move and select text, icons, files, and folders on your computer. Commonly known as a
pointing device, it lets you point to objects on the screen, click on them, and move them.

Two Main Types of Mouse


 Optical Mouse - uses an electronic eye to detect movement and is easier to clean.
 Mechanical Mouse - uses a rolling ball to detect movement and requires regular cleaning to
work properly.

Types of Mouse
 Trackball - A trackball has a ball that can rotate freely. Instead of moving the device like a
mouse, you can roll the ball with your thumb to move the pointer.

7|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Touchpad - A touchpad—also called a trackpad—is a touch-sensitive pad that lets you control
the pointer by making a drawing motion with your finger. Touchpads are common on laptop
computers.
 Cordless or Wireless - The wireless mouse started to include Bluetooth, infrared radio waves,
and radio frequency technology.

Speaker
A computer speaker is an output hardware device that connects to a computer to generate sound. The
signal used to produce the sound that comes from a computer speaker is created by the computer's sound
card.

Scanner
A scanner or optical scanner is a hardware input device that optically "reads" and image and converts it
into a digital signal. A scanner may be used to convert a printed picture, drawing, or document (hard
copy) into a digital file which can be edited on a computer.

Printer
A printer is an external hardware output device that takes the electronic data stored on a computer or
other device and generates a hard copy of it.

Types of Printer
 3D printer - is a device that creates a physical object from a digital model by layering materials.
3D printers use materials, such as metal alloys, polymers, plastics, or even food ingredients.
 AIO (All-in-One) - also known as MFP (multifunction printer). AIO describes a hardware
device such as an All-in-One printer that is a printer, fax, and scanner all in one device.
 Inkjet Printer - The most popular printer for home computer users that prints by spraying
streams of quick-drying ink on paper. The ink is stored in disposable ink cartridges, and often a
separate cartridge is used for each of the major colors. These colors are usually CMYK (cyan,
magenta, yellow, and black).
 Laser Printer - Laser printers are often used for corporate, school, and other environments that
require print jobs to be completed quickly and in large quantities.
 Thermal Printer - A thermal impact printer or electrothermal printer is a printer that uses
heated pins to "burn" images onto heat-sensitive paper. A thermal printer, thermal transfer
printer, or thermal wax-transfer printer uses thermal wax ribbon to melt colored wax on paper
for a photo print.

8|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Module Title: CSS NCII


Grade: 11

Time/ Schedule: Quarter 3 (Week 2 of 4)


Learning Outcomes: Assemble / Disassemble Computer Hardware

Topic: Motherboard

Figure 3: Parts of the Motherboard

Learning Objectives:
At the end of this lesson, the students should be able to:

 Define what is motherboard


 Identify the different types of Motherboard.

9|INTEGRATED INNOVATION AND HOSPITALITY COLLEGES, INC.


COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Explain the parts and other peripheral devices inside and outside the motherboard.
 Demonstrate on how to assemble the Computer.

Motherboard
The motherboard is a printed circuit board and foundation of a computer that is the biggest board in a
computer chassis. The motherboard serves as a single platform to connect all of the parts of a computer
together. It can be considered as the backbone of a computer.

Form Factors
When referring to computer hardware, a form factor is a specification for its layout and physical
dimensions. Form factors help prevent incompatibilities between multiple hardware manufacturers.

Motherboard Form Factors


A motherboard form factor is a specification for its general shape and size. It helps to prevent
incompatibilities between many hardware manufactures. It also determines the types of power supply,
supported case, the physical layout and organization of the board, and the placement of mounting holes.

Figure 4: Motherboard Form Factors

There are different types of form factors of the motherboard, which are as follows:
 AT & Baby AT: Before 1997, a very large motherboard was used by IBM computers. Later,
with the time, the motherboard size was reduced and released an extended motherboard using AT
(Advanced Technology) form factor.
 ATX: It stands for Advanced Technology eXtended, which was first released by Intel in July
1995. It is a specification that is used to outline the motherboard and dimension to improve
standardization.
 BTX (Balanced Technology Extended): BTX is a motherboard form factor that was announced
for the replacement of the ATX on 17 September 2003. The BTX includes features such as a
more efficient layout to facilitate cooling, low profile, support for high-mass motherboard
components, and a scalable board to accommodate several system sizes.
 Micro ATX - It is an evolution of ATX. Its measures are 9.6 × 9.6 inches. The Micro-ATX
supports up to four expansion slots that can combine freely with ISA, PCI, PCI / ISA shared, and
AGP. Mounting holes changed from the Standard ATX, since the measurements are different, but
they are also compatible with most ATX cabinets. This type of motherboard form factor supports
both Intel and AMD processors. It is commonly used on Small Form Factor Desktop Computers.
 Mini-ITX - Mini ITX is a low-power consumption motherboard format of 6.7 × 6.7 inches. Its
dimensions are the most characteristic factor of this type of form factor. Although this type of
motherboard was designed with the aim of empowering teams of low consumption, at present

10 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
there are no limits and they have grown by giant steps in terms of benefits. Mini ITX is a standard
format for all types of equipment, such as vehicle embedded computers, industrial applications,
and IoT. The Mini-ITX is the first standard system of reduced format that is popularized,
reaching all types of projects and any equipment where it may be necessary.
 Nano-ITX - The Nano-ITX is another type of motherboard form factor, that measures 4.7 × 4.7
in. Nano-ITX are fully integrated boards designed to consume very low power. This type of
motherboard can be used in many applications, but it was specially designed for smart
entertainment, like PVRs, media centers, smart TVs, in-vehicle devices, and more.
 Pico-ITX - The Pico-ITX is the smallest type of motherboard form factor in this list. Its
measurements are 3.9 × 2.8 in and it is 75% smaller than the Mini-ITX. This motherboard was
designed and developed by VIA, to open up innovation for smaller and smarter IoT devices. The
Pico-ITX with an x86-based-platform and low-power consumption board is a great choice for
embedded systems applications, such as industrial automation, in-vehicle computers, digital
signage, and more.

CPU (Central Processing Unit)


The central processing unit (CPU), also called a processor, is located inside the computer case on the
motherboard. It is sometimes called the brain of the computer, and its job is to carry out commands.
Whenever you press a key, click the mouse, or start an application, you're sending instructions to the
CPU.

Two Manufacturer of CPU


 INTEL (Integrated Electronics) - Founded on July 18, 1968, by
Robert Noyce and Gordon Moore, Intel manufactures the Intel
computer processors, Overdrive CPU upgrades, and networking
devices. Its technologies have had a dominating influence on the
technology industry.
 AMD - Founded on May 1, 1969 by Jerry Sanders, AMD (Advanced
Micro Devices) is a manufacturer of Intel-compatible computer Figure 5: Intel and AMD
processors. Processor

MULTIMEDIA STORAGE DEVICES

RAM (Random Access Memory)


A hardware device generally located on the motherboard of a
computer and acts as an internal memory of the CPU. It allows
CPU store data, program, and program results when you
switch on the computer. It is the read and write memory of a
computer, which means the information can be written to it as
well as read from it.

Types of RAM
 SRAM – Static Random Access Memory uses
multiple transistors, typically four to six, for each
memory cell but doesn't have a capacitor in each cell.
It is used primarily for cache.
 DRAM - Dynamic Random Access Memory has
memory cells with a paired transistor and capacitor
requiring constant refreshing.
 FPM DRAM - Fast page mode Dynamic Random
Access Memory was the original form of DRAM. It
Figure 6: Different Types of RAM

11 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
waits through the entire process of locating a bit of data by column and row and then reading the
bit before it starts on the next bit. Maximum transfer rate to L2 cache is approximately 176
MBps.
 EDO RAM - Extended data-out Dynamic Random Access Memory does not wait for all of
the processing of the first bit before continuing to the next one. As soon as the address of the first
bit is located, EDO DRAM begins looking for the next bit. It is about five percent faster than
FPM. Maximum transfer rate to L2 cache is approximately 264 MBps.
 SDRAM - Synchronous Dynamic Random Access Memory takes advantage of the burst mode
concept to greatly improve performance. It does this by staying on the row containing the
requested bit and moving rapidly through the columns, reading each bit as it goes. The idea is that
most of the time the data needed by the CPU will be in sequence. SDRAM is about five percent
faster than EDO RAM and is the most common form in desktops today. Maximum transfer rate to
L2 cache is approximately 528 MBps.
 DDR SDRAM - Double Data Rate Synchronous Dynamic RAM is just like SDRAM except
that is has higher bandwidth, meaning greater speed. Maximum transfer rate to L2 cache is
approximately 1,064 MBps (for DDR SDRAM 133 MHZ).
 RDRAM - Rambus Dynamic Random Access Memory is a radical departure from the previous
DRAM architecture. Designed by Rambus, RDRAM uses a Rambus in-line memory module
(RIMM), which is similar in size and pin configuration to a standard DIMM. What makes
RDRAM so different is its use of a special high-speed data bus called the Rambus channel.
RDRAM memory chips work in parallel to achieve a data rate of 800 MHz, or 1,600 MBps.
Since they operate at such high speeds, they generate much more heat than other types of chips.

Hard Disk Drive (HDD)


HDD is an electro-mechanical storage device, which is an
abbreviation of Hard Disk Drive. It uses magnetic storage for storing
and retrieving the digital data. It is a non-volatile storage device.

Types of Storage Devices


 Internal Storage - devices are installed inside the system unit
or inside a desktop or laptop.
 External Storage - are portable storage device that usually
uses USB technology or E-SATA technology. Figure 7: HDD Connectors

Internal Storage
 Hard Disk Drive (HDD) - use magnetic storage disk inside to store data.
 Hybrid Hard Drive (HHD) - is a combination of hard disk drive and solid-state drive
technology.
 Solid State Drive (SSD) - used non-volatile memory to store data.

External Storage
 USB Flash Drive, Data Stick, Pen Drive – is a portable drive that is often size of your thumb
that connects to the computer USB port.
 CD, CD-R, CD-RW (compact Disc) – is a flat round storage medium the is read by laser in CD-
ROM.
 DVD, DVD-R, DVD-RW (digital versatile disc) – is a disc capable of storing a large amount of
data on one disc the size of standard compact disc.
 Blue Ray Disc – is an optical disc that is capable of storing 25GB.

Types of Connector Use

12 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 EIDE / PATA – Enhanced Integrated Drive Electronics / Parallel Advanced Technology
Attachement
 S-ATA – Serial Advanced Technology Attachment

Power Supply Unit (PSU) - is a hardware component of a computer that supplies all other components
with power.

Computer Ports
a hardware port or peripheral port is a hole or connection found on the front or back of a computer.

Types of Computer Ports


 PS/2 - PS/2 connector is developed by IBM for
connecting mouse and keyboard. It was introduced with
IBM’s Personal Systems/2 series of computers and
hence the name PS/2 connector. PS/2 connectors are
color coded as purple for keyboard and green for
mouse.
 Serial Port - is used to refer the interface that is
compliant to RS-232 standard. There are two types of
serial ports that are commonly found on a computer:
DB-25 and DE-9.
 Parallel Port - Parallel port is an interface between
computer and peripheral devices like printers with
parallel communication. The Centronics port is a 36
pins port that was developed as an interface for printers
and scanners and hence a parallel port is also called as a
Centronics port.
 Audio Ports - Audio ports are used to connect
Figure 8: Computer Ports or Back Panel
speakers or other audio output devices with the
computer. The audio signals can be either analogue or digital and depending on that the port and
its corresponding connector differ.
 Video Ports
 VGA Port (Video Graphics Array) - VGA port is found in many computers, projectors, video
cards and High Definition TVs. VGA port is the main interface between computers and older
CRT monitors. Even the modern LCD and LED monitors support VGA ports but the picture
quality is reduced. VGA carries analogue video signals up to a resolution of 648X480.
 DVI Port (Digital Video Interface) - DVI is a high-speed digital interface between a display
controller like a computer and a display device like a monitor. It was developed with an aim of
transmitting lossless digital video signals and replace the analogue VGA technology.
 HDMI Port (High Definition Multimedia Interface) - HDMI is a digital interface to connect
High Definition and Ultra High Definition devices like Computer monitors, HDTVs, Blu-Ray
players, gaming consoles, High Definition Cameras etc.
 USB Ports (Universal Serial Bus) - USB port can be used to transfer data, act as an interface for
peripherals and even act as power supply for devices connected to it. There are three kinds of
USB ports: Type A, Type B or mini USB and Micro USB.
 RJ-45 or Lan/Network Port (Register Jack) - Ethernet is a networking technology that is used
to connect your computer to Internet and communicate with other computers or networking
devices.

COMPUTER ASSEMBLY PROCEDURES STEP BY STEP


1. Open the Computer Case

13 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
a. Prepare the workspace before opening the computer case.
2. Install the Power Supply
a. Insert the power supply into the case.
b. Align the holes in the power supply with the holes in the case.
c. Secure the power supply to the case using the proper screws. Figure 9: Open Computer Case
3. Attach Component to the Motherboard
a. CPU on Motherboard
 The CPU and motherboard are sensitive to electrostatic
discharge.
 The CPU is secured to the socket on the motherboard with a
locking assembly.
 CAUTION: When handling a CPU, do not touch the CPU Figure 10: Install the
contacts. Power supply
b. Thermal compound
 It helps to keep the CPU cool.
 To install a used CPU, clean it and the base of the heat sink with isopropyl alcohol to
remove the old thermal compound.
c. Heat Sink/Fan Assembly
 The Heat Sink/Fan Assembly is a two-part cooling device.
 The heat sink draws heat away from the CPU.
d. Install RAM
 RAM provides temporary data storage for the CPU and should be installed in the
motherboard before the motherboard is placed in the computer case.

Figure 11a: Figure 11b: Figure 11c: Heat Sink Figure 11d:
Install RAM
CPU in Motherboard Thermal Compound

The Motherboard
a. After installing the previous components, the motherboard is now ready to install in the
computer case.
b. Plastic and metal standoffs are used to mount the motherboard and to prevent it from
touching the metal portions of the case.

Figure 12: Motherboard

4. Install Internal Drives


a. Drives that are installed in internal bays are called internal drives.
b. A hard disk drive (HDD) is an example of an internal drive.
c. HDD installation steps:

14 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Position the HDD so that it aligns with the 3.5-inch drive bay.
 Insert the HDD into the drive bay so that the screw holes in the drive line up with the
screw holes in the case.
 Secure the HDD to the case using the proper screws. Figure 13: Install Internal Drives
5. Install Drives in External Bays
a. Some devices that are installed in this type of drives are:
b. Drives in external bays allow access to the media without opening the
case.
 An optical drive is a storage device that reads and writes information
to CDs or DVDs.
 A floppy disk drive (FDD) is a storage device that reads and writes
information to a floppy disk. Figure 14: Install
6. Install Adapter Cards Drive in External
a. Adapter cards are installed to add functionality to a computer. Bays
b. Some examples of these adapters are:
 A NIC which enables a computer to connect to a network. It uses PCI and PCIe
expansion slots on the motherboard.
 A wireless NIC which enables a computer to connect to a wireless network. Wireless
NICs use PCI and PCIe expansion slots on the motherboard. Some wireless NICs are
installed externally with a USB connector.
 A video adapter card is the interface between a computer and a display monitor. An
upgraded video adapter card can provide better graphic capabilities for games and
graphic programs. Video adapter cards use PCI, AGP, and PCIe expansion slots on the
motherboard.
7. Connect Internal Cables
a. Power cables are used to distribute electricity from the power supply to the motherboard and
other components.
b. Data cables transmit data between the motherboard and storage devices, such as hard drives.
Some of examples of this type of cables are:
 PATA cable
 SATA cable
 Floppy drive data cable
c. Additional cables connect the buttons and link lights on the front of the computer case to the
motherboard.

Figure 15: Connect Internal Cables

8. Complete Physical Installation


a. Now that all the internal components and the power supply have been installed and connected
to the motherboard, the following tasks should be completed:
 Re-Attach the side panels: Most computer cases have two panels, one on each side.
Some computer cases have one three-sided cover that slides down over the case frame.

15 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Connect External Cables: These cables are normally connected to the back of the
computer. Here are some common external cable connections: Monitor, Keyboard,
Mouse, USB, Ethernet Power.
9. Boot the Computer for the First Time
a. When the computer is booted, the basic input/output system (BIOS) will perform a power-on
self-test (POST) to check on all of the internal components.
b. The BIOS contains a setup program used to configure settings for hardware devices. The
configuration data is saved to a special memory chip called a complementary metal-oxide
semiconductor (CMOS).
c. POST checks to see that all of the hardware in the computer is operating correctly. If a
device is malfunctioning, an error or a beep code alerts the technician that there is a problem.

Expansion Slots
An expansion slot is connection or port located inside a computer on the motherboard or riser board that
allows a computer hardware expansion card to be connected. Also known as a bus slot or expansion
port.

Different Types of Expansion Slots


 PCI – Network card, SCSI, Sound card, Video card
 PCI Express – Video card
 AGP – Video card
 ISA – Network card, Sound card, Video card
 AMR – Modem, Sound card
 CNR – Modem, Network card, Sound card
 EISA – SCSI, Network card, Video card
 VESA – Video card

PCI Express - The best type of expansion slot to have in your PC is the PCI Express, also written as
PCIe. Without boring you, the PCI Express type of expansion slot communicates with the motherboard,
and therefore with the microprocessor, both quickly and efficiently.

PCI - The PCI slot is the most common form of internal expansion for a PC. Some PCs have a mixture of
PCI and PCI Express slots. If so, go with PCI Express when you have that option.

AGP - This type of expansion slot was specifically designed to deal with graphics adapters. In fact, AGP
stands for Accelerated Graphics Port. Older PCs may sport this expansion slot, but the best video cards
use PCI Express.

ISA - The most ancient type of expansion slot is the ISA, which stands for (get this) Industry Standard
Architecture. That’s because it never really had a name until another, better type of expansion slot came
along. ISA slots hang around to be compatible with older expansion cards.

AMR - short for audio/modem riser, allows OEMs to make one card with the functionality of either a
Modem or audio or both as one card.
CNR - Short for Communication and Network Riser, CNR is a specification that supports Audio,
Modem, USB, and LAN interfaces of core logic chipsets.

16 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Different Types of Expansion Cards

 Video Card
Also known as a display adapter, graphics card, video
adapter, video board, or video controller, a video card is an
expansion card that connects to a computer motherboard. It is
used to create a picture on a display; without a video card, you
would not be able to see this page. Video cards are used by
gamers in place of integrated graphics due to their extra
processing power and video ram. Figure 18: AGP Video Card

 Sound Card
Is referred to as an audio output device, sound board, or audio card. A
sound card is an expansion card or IC for producing sound on a
computer that can be heard through speakers or headphones.
Figure 19: PCI-e Sound Card
 NIC - Short for network interface card, the NIC is also referred to as an
Ethernet card and network adapter. A NIC is a computer expansion
card for connecting to a network using an Ethernet cable with an RJ-45
connector.

Figure 20: PCI-e Network Card or


LAN Card
GRAPHICAL USER INTERFACE
A graphical user interface (GUI) GUI (pronounced gooey). A GUI lets you use your mouse to click
icons, buttons, and menus, and everything is clearly displayed on the screen using a combination of
graphics and text.
Graphical user interfaces would become the standard of user-centered design in software application
programming, providing users the capability to intuitively operate computers and other electronic devices
through the direct manipulation of graphical icons such as buttons, scroll bars, windows, tabs, menus,
cursors, and the mouse pointing device. Many modern graphical user interfaces feature touchscreen and
voice-command interaction capabilities.

Figure 21: GUI for Smartphones Figure 22: GUI for Windows PC Figure 23: GUI
for MAC PC

Module Title: CSS NCII

17 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Grade: 11

Time/ Schedule: Quarter 3 (Week 3 of 4)


Learning Outcomes: Prepare Installer

Topic: Computer Software

Figure 24: Different types of Software

Learning Objectives:
At the end of this lesson, the students should be able to:

 Identify the Major Classes of Software.


 Explain the different Operating System in Desktop and Mobile Phones.
 Explain the different categories of software.
 Explain the booting process.
 Define Driver and Explain Each type.
 Demonstrate on how to prepare bootable flash drive and preparing drivers.

SOFTWARE
Software is a collection of computer programs and related data that tells the instruction to a computer on
how to do or what to do.

Major Classes of Software

18 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

1. System Software - System Software is a set of programs that control and manage the operations
of computer hardware. It also helps application programs to execute correctly.
System Software are designed to control the operation and extend the processing functionalities
of a computer system. System software makes the operation of a computer more fast, effective,
and secure. Example: Operating system, programming language, Communication software, etc.

Types of System Software


 Operating Systems - Operating system software helps you for the effective utilization of
all hardware and software components of a computer system.
 Programming language Translators - Transforms the instructions prepared by
developers in a programming language into a form that can be interpreted or compiled
and executed by a computer system.
 Communication Software - Communication software allows us to transfer data and
programs from one computer system to another.
 Utility Programs - Utility programs are a set of programs that help users in system
maintenance tasks, and in performing tasks of routine nature.

2. Application Software - Application Software is a program that does real work for the user. It is
mostly created to perform a specific task for a user. Application Software acts as a mediator
between the end-user and System Software. It is also known as an application package.

Types of Application Software


 Word-processing Software - It makes use of a computer for creating, modifying,
viewing, storing, retrieving, and printing documents.
 Spreadsheet Software - Spreadsheet software is a numeric data-analysis tool that allows
you to create a computerized ledger.
 Database Software - A database software is a collection of related data that is stored and
retrieved according to user demand.
 Graphics Software - It allows computer systems for creating, editing, drawings, graphs,
etc.
 Education Software - Education software allows a computer to be used as a learning and
teaching tool.
 Entertainment Software - This type of app allows a computer to be used as an
entertainment tool.

COMPUTER OPERATING SYSTEMS

Operating Systems
An operating system is the most important software that runs on a computer. It manages the computer's
memory and processes, as well as all of its software and hardware. It also allows you to communicate
with the computer without knowing how to speak the computer's language. Without an operating
system, a computer is useless.
Examples of Operating Systems

1. Microsoft Windows OS - Microsoft created the Windows operating system in the mid-1980s.
There have been many different versions of Windows, but the most recent ones are Windows 10
(released in 2015), Windows 8 (2012), Windows 7 (2009), and Windows Vista (2007).
Windows comes pre-loaded on most new PCs, which helps to make it the most popular
operating system in the world.

19 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Figure 25: Windows Operating System Evolution

Different Types of Windows Operating System Version

Windows Version Description


The very first version of Windows, Windows 1.0, was a basic interface that
used "gadgets," like the calendar and calculator, but it gained little popularity.
Windows 1.0
Released in 1985, the system had basic functionality and introduced the first
version of MS Paint and a primitive word processor.
Released in 1987, the next version of Windows wasn't much better than the
first. While it did introduce two current staples – Excel and Word – to users,
Windows 2.0 this version came under fire when Macintosh sued Microsoft for mimicking
the look and feel of their current operating system. The lawsuit was
eventually dropped.
The third time's the charm, they say, and that adage was proven with
Windows' third release. The introduction of virtual memory, improved
Windows 3.0 graphics, and the ability to multitask helped propel Windows to sell 10 million
copies. In fact, while it was released in 1990, Windows 3.0 wasn't
discontinued until 2001.
A pseudo-release for Microsoft, Windows 3.1 contained necessary fixes and
improved font functionality. Meanwhile, Microsoft continued to develop a
Windows 3.1 new release, Windows NT, hoping it could be released as a continuation of
Windows 3.0 and 3.1. Unfortunately, issues with driver support and software
meant that it was time for a new version altogether.
Marking the change from 16-bit to 32-bit, Windows 95 was designed for
increased compatibility and ultimate user-friendliness. As it became clear that
consumer computers would become the future, Windows 95 was offered on
Windows 95 newer computers only because it lacked some backwards compatibility at
first. Newer releases and patches later made the version easier to use on
older machines, but by 1995, Microsoft had achieved a more widespread
interest in home computers. Codename: Chicago
The follow-up to Windows 3.0, Windows 4.0 was released in 1996 with minor
Windows 4.0
improvements and is not considered a major Windows release.
As consumer computers became more widespread, Windows 98 included
improved hardware and hardware drivers, Internet Explorer, and eventually,
Windows 98 Internet connection sharing. Released in 1998, with a new release in 1999,
Microsoft 98 was the first release designed specifically for consumers, as
opposed to the business or technology set. Codename: Memphis
Windows ME Windows ME (Millennial Edition) was also released, offering the system
recovery tool to help return a crashed computer to its last known operating

20 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
settings. Codename: Millenium
Windows 2000 made everyone's lives easier by increasing the number of plug
and play devices compatible with the operating system. Windows ME
Windows 2000
(Millennial Edition) was also released, offering the system recovery tool to
help return a crashed computer to its last known operating settings.
The system designed for ease and stability, Windows XP was released in 2001,
offering plenty of ease and functionality for laptop and desktop users. The
Windows XP operating system was designed to offer users help through a comprehensive
help center, and it gave users the ability to consume a number of different
types of media. Codename: Whistler
Widely considered a flop in technology circles, Windows Vista was released in
2006. It had high system requirements and suffered issues with performance
Windows Vista and security. The operating system also tended to drain laptop batteries. The
version lasted only for three years, during which some users downgraded
back to XP to avoid the pitfalls of Vista. Codename: Longhorn
For this current release of Windows, Microsoft learned its mistakes with Vista
and created an operating system with speed, stability and minimal system
Windows 7 requirements. Microsoft ditched the gadget bar from Vista, replacing it with a
cleaner feel. This version was released in 2009. Codename: Blackcomb,
Vienna
This latest Windows release is getting a lot of attention. With its redesigned
Metro-style user interface and Windows Store, this version is, once again,
redefining what Windows is. It also comes with integrated antivirus
protection, a virtual hard disk and a new platform based on HTML5 and
Windows 8
JavaScript. It promises faster boot time, touchscreen compatibility and the
ability to create a bootable USB flash drive. It may not be enough to get
people to switch from Windows 7, but at least it's a glimpse into the future of
the Windows operating system. Codename: Midori, 8.1: Blue
Windows 10 was released on September 30, 2014. It is the very latest version
of Windows and in the company that has installed all the features that they
were unable to do in the earlier version. Additionally, many new features are
being implemented continuously, which allows users to get all the latest
Windows 10 updates.
Windows 10 has brought the Start Menu in it, which is giving it a balanced
look, along with a traditional desktop computer user, it is also a very favorite
choice. It has included many interesting features as you can switch to the
keyboard mode, mouse mode, tablet mode.

2. MacOS - is an operating system designed for the Apple Macintosh computer. macOS
(previously called OS X) is a line of operating systems created by Apple. It comes preloaded on
all Macintosh computers, or Macs. Some of the specific versions include Mojave (released in
2018), High Sierra (2017), and Sierra (2016).

21 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Figure 26: MAC Operating System Evolution

Different Types of Mac Operating System Version

MAC Version Description


The Mac OS X Public Beta, code-named Kodiak, was an early, test version of
Mac OS X Public Beta the Mac OS X operating system released to the public on September 13, 2000
for USD $29.95. This version was used to gain feedback from users.
Mac OS X 10.0, code-named Cheetah, is the first official release of Apple
Mac OS X 10.0 Inc.’s operating system Mac OS X. Apple released this version on March 24,
2001. It was priced at $129.
Mac OS X 10.1, code-named Puma, is the second major release of Apple Inc.’s
operating system Mac OS X. It was released on September 25, 2001. Apple
Mac OS X 10.1
released 10.1 as a free upgrade CD for 10.0 users, in addition to the US$129
boxed version for people running Mac OS 9.
Mac OS X version 10.2 Jaguar, is the third major release of Apple Inc.’s
Mac OS X 10.2 operating system Mac OS X . It was released on August 23, 2002 and the first
release to use its code name as part of the branding.
Mac OS X version 10.3 Panther, is the fourth major release of Apple Inc.’s
operating system Mac OS X. It was released on October 24, 2003. Apple
Mac OS X 10.3
charged USD 129.00 for a single-user license and USD 199.00 for a Family
Pack (5 user, 1 household) license.
Mac OS X version 10.4 Tiger, is the fifth major update to Mac OS X for Apple’s
Mac OS X 10.4
Macintosh computers, and was released on April 29, 2005.
Mac OS X version 10.5 Leopard, is the sixth major update to Mac OS X for
Apple’s Macintosh computers, and was released on October 26, 2007.
Mac OS X 10.5
Leopard was the last OS released by Apple to support both the Intel and
PowerPC architectures.
Mac OS X 10.6 Snow Leopard is the seventh major release of Mac OS X,
Apple’s desktop and server operating system for Macintosh computers. On
Mac OS X 10.6 August 28, 2009, it was released worldwide, and was made available for
purchase from Apple’s website and its retail stores at the price of US$29 for a
single-user license.
Mac OS X 10.7 Lion (marketed as OS X Lion) is the eighth major release of
Mac OS X, Apple’s desktop and server operating system for Macintosh
Mac OS X 10.7
computers. It was released on July 20, 2011. Apple reported over 1 million
Lion sales on the first day of its release.
Mac OS X 10.8 OS X 10.8, also known as “Mountain Lion”, is a Macintosh operating system
developed by Apple Inc. Its goal was to start incorporating features found in

22 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
iOS to the Macintosh User Interface. It was released on July 25, 2012 from the
Mac App Store for $19.99.
OS X version 10.9, also known as “Mavericks”, is the tenth major release of
OS X, Apple Inc’s desktop and server operating system for Macintosh
computers. OS X Mavericks was released on October 22, 2013, as a free
Mac OS X 10.9 update through the Mac App Store. Mavericks marks the beginning of a
change in the naming scheme of OS X, departing from the use of big cats and
moving to names based on places in California. The new naming scheme also
removes the “Mac” prefix from the name.
OS X version 10.10, also known as “Yosemite”, is the eleventh major release
of OS X, Apple Inc’s desktop and server operating system for Macintosh
Mac OS X 10.10
computers. OS X Yosemite was released to the public on October 16, 2014, as
a free update through the Mac App Store.
OS X version 10.11, “El Capitan”, is the twelfth major release of OS X, Apple
Inc.’s desktop and server operating system for Macintosh computers. El
Mac OS X 10.11 Capitan was named after a rock formation in Yosemite National Park. OS X El
Capitan was released on September 30, 2015, as a free upgrade through the
Mac App Store.
macOS 10.12 Sierra is the thirteenth major release of OS X, renamed macOS,
Apple’s desktop and server operating system for Macintosh computers. It was
Mac OS X 10.12 released September 20, 2016 as a free upgrade through the Mac App Store.
Sierra was named after the entire Sierra Nevada mountain range that includes
Yosemite National Park and Lake Tahoe.
macOS 10.13 High Sierra is the fourteenth major release of OS X, renamed
macOS, Apple’s desktop and server operating system for Macintosh
Mac OS X 10.13 computers. It was released on September 25, 2017, as a free upgrade through
the Mac App Store. High Sierra was named after the High Sierras in the Sierra
Nevada mountain range.
macOS 10.14 Mojave, released on September 24, 2018, is the fifteenth major
release of OS X, renamed macOS, Apple’s desktop and server operating
Mac OS X 10.14
system for Macintosh computers. Mojave was named after the Mojave
Desert.
macOS 10.15 Catalina, released on October 7, 2019, is the sixteenth major
release of OS X, renamed macOS, Apple’s desktop and server operating
Mac OS X 10.15
system for Macintosh computers. Catalina was named after Santa Catalina
Island, located in Southern California.

3. Linux - Linux (pronounced LINN-ux) is a family of open-source operating systems, which


means they can be modified and distributed by anyone around the world. This is different from
proprietary software like Windows, which can only be modified by the company that owns it.
The advantages of Linux are that it is free, and there are many different distributions—or
versions—you can choose from.

23 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Figure 27: Linux Operating System Evolution

Different Types of Linux Operating System Version

Linux Version Description


Slackware is oriented toward simplicity and software purity. Provides no
Slackware
graphical installation procedure July 1993 Developed by: Patrick Volkerding.
The Debian Project's policies focus on collaborative software development
Debian and testing processes. New release every two years. September 1993
Developed by: Ian Murdock and the Debian Project
"Software und System-Entwicklung", meaning "Software and systems
development". Often includes YaST setup and configuration tool 1994
SUSE
Developed by: Roland Dyroff, Thomas Fehr, Burchard Steinbild, and Hubert
Mantel
In 2003 Red Hat Linux merged with the community-based Fedora Project.
Introduced a graphical installer called Anaconda and Lokkit for configuring the
Red Hat
firewall capabilities. May 1995 Developed by: Bob Young, Marc Ewing and
Red Hat Inc.
Can be used to copy files easily from hard drives with inaccessible operating
Knoppix systems. Designed to be booted straight from CD, DVD or USB. September
2000 Developed by: Klaus Knopper
Gentoo package management is designed to be modular, portable, and easy
to maintain. Not a binary software distribution, source code is compiled
Gentoo
locally and optimized for the specific type of computer. March 2002
Developed by: Daniel Robbins and Gentoo Foundation
The development team focused on elegance, code correctness, and
minimalism. The user is expected to make significant effort to understand the
Arch
systems function. March 2002 Developed by: Judd Vinet, Aaron Griffin and
the Arch Linux team
Focuses on innovation, integrating new technologies early on and working
closely with Linux communities. Linus Torvalds uses Fedora on all of his
Fedora
computers. November 2003 Developed by: Fedora Project (owned by Red
Hat)
The project is affiliated with Red Hat but aspires to be more public, open, and
inclusive. Provides a free, enterprise-class, community- supported computing
CentOS
platform. 2004 Developed by: David Parsley, Lance Davis and the CentOS
Project
Ubuntu Committed to open source development; encouraged to use free software,
study how it works, improve upon it, and distribute it. Named after the

24 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Southern African philosophy of ubuntu (literally, "human-ness"). October
2004 Developed by: Mark Shuttleworth and Canonical Ltd.
Lightweight and secure by default while still being useful for general-purpose
Alpine tasks. Compiles all packages with stack-smashing protection. 2006 Developed
by: Alpine Linux development team
Based on Red Hat Enterprise Linux (RHEL), repackaged and freely distributed
Oracle by Oracle. Oracle Linux supports KVM and Xen. October 2006 Developed by:
Oracle Corporation
Collection of software for audio production, graphic design, video editing and
general-purpose applications. Documentation is in Spanish. December 2006
Musix
Developed by: Marcos Germán Guglielmetti. And teams from Argentina,
Spain, Mexico and Brazil.
Android is designed primarily for touchscreen mobile devices such as
Android smartphones and tablet computers. The most widely used mobile OS.
September 2008 Developed by: Google, and Open Handset Alliance
A secure, and sustainable operating system, designed to set up a stable and
Mageia trustable governance to direct collaborative projects. Uses all major desktop
environments June 2011 Developed by: Former employees of Mandriva

Mobile Operating System


A mobile operating system is an operating system that helps to run other application software on mobile
devices. It is the same kind of software as the famous computer operating systems like Linux and
Windows, but now they are light and simple to some extent.

Platforms of Mobile OS
1. Android OS: The Android operating system is the most popular operating system today. It is a
mobile OS based on the Linux Kernel and open-source software. The android operating system
was developed by Google. The first Android device was launched in 2008.

Figure 28: Android Operating System

2. BlackBerry OS: The BlackBerry operating system is a mobile operating system


developed by Research in Motion (RIM). This operating system was designed
specifically for BlackBerry handheld devices. This operating system is beneficial
for the corporate users because it provides synchronization with Microsoft
Exchange, Novell GroupWise email, Lotus Domino, and other business
Figure 29: Blackberry
software when used with the BlackBerry Enterprise Server.

25 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
3. iPhone OS / iOS: The iOS was developed by the Apple Inc for the use on its device. The iOS
operating system is the most popular operating system today. It is a very secure operating system.
The iOS operating system is not available for any other mobiles.
4. Symbian OS: Symbian operating system is a mobile operating system that provides Figure 30: IOS
a high-level of integration with communication. The Symbian
operating system is based on the java language. It combines
middleware of wireless communications and personal information
management (PIM) functionality. The Symbian operating system was
developed by Symbian Ltd in 1998 for the use of mobile phones.
Nokia was the first company to release Symbian OS on its mobile Figure 31: Symbian OS
phone at that time.

5. Windows Mobile OS: The window mobile OS is a mobile operating system that
was developed by Microsoft. It was designed for the pocket PCs and smart
mobiles.

Different Types of Android Operating System Versions

Code name Version numbers API level Release date Figure 32: Windows Mobile
No codename 1.0 1 September 23, 2008
No codename 1.1 2 February 9, 2009
Cupcake 1.5 3 April 27, 2009
Donut 1.6 4 September 15, 2009
Eclair 2.0 - 2.1 5-7 October 26, 2009
Froyo 2.2 - 2.2.3 8 May 20, 2010
Gingerbread 2.3 - 2.3.7 9 - 10 December 6, 2010
Honeycomb 3.0 - 3.2.6 11 - 13 February 22, 2011
Ice Cream Sandwich 4.0 - 4.0.4 14 - 15 October 18, 2011
Jelly Bean 4.1 - 4.3.1 16 - 18 July 9, 2012
KitKat 4.4 - 4.4.4 19 - 20 October 31, 2013
Lollipop 5.0 - 5.1.1 21- 22 November 12, 2014
Marshmallow 6.0 - 6.0.1 23 October 5, 2015
Nougat 7.0 24 August 22, 2016
Nougat 7.1.0 - 7.1.2 25 October 4, 2016
Oreo 8.0 26 August 21, 2017
Oreo 8.1 27 December 5, 2017
Pie 9.0 28 August 6, 2018
Android 10 10.0 29 September 3, 2019

Application Software
Application software allows end-user to Accomplish one or more tasks. As a user of technology,
application software or ‘apps’ are what you engage with the most. These types of computer software are
productive end-user programs that help you perform tasks. Following are some examples of application
software that allow you to do specific work:

 MS Excel: It is spreadsheet software that you can use for presenting and analyzing data.
 Photoshop: It is a photo editing application software by Adobe. You can use it to visually
enhance, catalogue and share your pictures.

26 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Skype: It is an online communication app that you can use for video chat, voice calling and
instant messaging.

Types of Application Software

Application Software Type Examples


Word processing software: Tools that are used to create Microsoft Word, WordPad, AppleWorks
word sheets and type documents etc. and Notepad
Spreadsheet software: Software used to compute Apple Numbers, Microsoft Excel and
quantitative data. Quattro Pro
Database software: Used to store data and sort Oracle, MS Access and FileMaker Pro
information.
Application Suites: A collection of related programs sold OpenOffice, Microsoft Office
as a package.
Multimedia software: Tools used for a mixture of audio, Real Player, Media Player
video, image and text content.
Communication Software: Tools that connect systems MS NetMeeting, IRC, ICQ
and allow text, audio, and video-based communication.
Internet Browsers: Used to access and view websites. Netscape Navigator, MS Internet Explorer,
and Google Chrome
Email Programs: Software used for emailing. Microsoft Outlook, Gmail, Apple Mail

Categories of Software

Freeware - Freeware software is any software that is available to use for free. They can be downloaded
and installed over the internet without any cost. Some well-known examples of freeware are:
 Google Chrome
 Skype
 Instagram
 Snapchat
 Adobe reader
Although they all fall under the category of Application or end-user software, they can further be
categorized as freeware because they are free for you to use.

Shareware - shareware, on the other hand, are software applications that are paid programs, but are made
available for free for a limited period of time known as ‘trial period’. You can use the software without
any charges for the trial period but you will be asked to purchase it for use after the trial ends. Shareware
allows you to test drive the software before you actually invest in purchasing it. Some examples of
Shareware that you must be familiar with are:
 Adobe PhotoShop
 Adobe Illustrator
 Netflix App
 Matlab
 McAfee Antivirus

Open Source Software

27 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
This is a type of software that has an open-source code that is available to use for all users. It can be
modified and shared with anyone for any purpose. Common examples of open source software used by
programmers are:
 LibreOffice
 PHP
 GNU Image Manipulation Program (GIMP)

Closed Source Software


These are the types of software that are non-free for the programmers. For this software, the source code
is the intellectual property of software publishers. It is also called ‘proprietary software’ since only the
original authors can copy, modify and share the software. Following are some of the most common
examples of closed-source software:
 .NET
 Java
 Android
 Microsoft Office
 Adobe PhotoShop

Utility Software
Utility software is considered a subgroup of system software. They manage the performance of your
hardware and application software installed on your computer, to ensure they work optimally. Some
features of utility software include:
 Antivirus and security software
 File compressor
 Disk cleaner
 Disk defragmentation software
 Data backup software

What is Booting?
The term “Booting” refers to the process in which your computer runs a set of instruction when the
power is switched ON. This process loads the Operating System into the computer main memory. Once
after this has been done, you can able to see the windows desktop and run applications.

What happens during the booting?


Note: I’ve given a general overview of booting process. The process may change for different operating
systems.
1. When you switch ON your computer, the BIOS software is built into the computer through a
ROM (Read Only Memory), is the first code run by a computer.
2. When the computer starts up, the first job for the BIOS is the Power-On-Self-Test (POST), which
initializes and identifies system devices such as the CPU, RAM, video display card, keyboard and
mouse, hard disk drive, optical disc drive and other hardware.
3. If everything is fine, then BIOS locates, MBR (Master Boot Record) present in the hard disk.
This MBR is written when the Windows is installed to your computer.
4. Master Boot Records contains information, whether a disk is bootable and the instructions to load
the operating system. It loads the MBR data in a specific RAM space and then starts to load
Operating System, giving the control to it. This process is known as booting, or booting up,
which is short for bootstrapping.

Types of Booting

28 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Cold Booting – When you are booting your computer after shutdown, then it is known as Cold
Booting.
 Warm Booting – When you restarting your computer, then it is called as Warm Booting.

Creating USB Bootable Flash Drive using Rufus Software


Download Windows 10 and make sure that you have a minimum of 8GB USB storage to create the
media.
To create bootable media using the easiest way; you will need a
program called Rufus which is a small utility to create bootable media
for MBR and GPT Partitions.

Rufus doesn’t install’s itself as it is a standalone utility. Download it


via Google.
1. After Rufus and the ISO has been downloaded; open rufus and
choose the Device (USB) which should be used as your
bootable media.
2. Then, choose GPT partition scheme for UEFI and leave the
File System & Cluster Size to default settings; remember to
label the drive.
3. Check Create a bootable disk and ensure that the ISO Image is
selected from the drop down, use the small drive icon to locate
and choose the image.
4. Next, choose Start to finish. Figure 33: Creating Bootable
Flash drive using Rufus
Create a Bootable USB Flash Drive using Diskpart Utility

Diskpart can be used to create a partition larger than 2Gb on the USB flash drive so larger files can be
used. Diskpart is a Disk Partition utility available within Windows.
Please follow the steps in the next section on how to use Diskpart to create a bootable Windows USB
flash drive:

Note: You will need a 4Gb minimum USB flash drive and your Windows re-installation DVD

Using Diskpart
1. Insert your USB flash drive (4Gb + preferable) into your system
Warning: All data on the USB flash drive will be lost, make sure you save any data before proceeding.
2. Navigate to the Command Prompt. Select Start & type CMD in
the search field, right click on CMD.exe and select Run as
administrator Alternatively, navigate to Start > All programs
> Accessories > right click on Command Prompt and select Run
as administrator
3. A User Account Control (UAC) dialog Window may appear.
Click Yes to Continue.
4. When the Command Prompt opens, enter the following
commands followed by Enter
5. DISKPART - This will start the utility
6. LIST DISK - This will show the disk number of your USB flash
drive. In the image below the USB flash drive shows as Disk 2.
7. SELECT DISK X (Replace X with your USB flash drive
number, we are using 2 in this example) Figure 34: Instruction number 2
8. CLEAN - This wipes the drive using Diskpart

29 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
9. CREATE PARTITION PRIMARY- Creates partition
10. SELECT PARTITION 1- Selects partition 1
11. ACTIVE- Marks the current partition as active
12. FORMAT FS=NTFS QUICK - This formats
the partition
13. ASSIGN- Assigns a drive letter.
14. EXIT
Insert your Windows DVD into the optical drive. From
the command prompt, enter the following:
g: <enter> (Where "g" is your DVD drive letter)
cd boot <enter> (changes to boot directory)
Figure 35: Instructions 5-14
G:\boot bootsect /nt60 d: <enter> (Where "d" is your USB drive
using Diskpart
letter)
Copy all files from the Windows CD to the USB flash drive using xcopy
cd\ <enter>
G:\xcopy g:\*.* /s/h/f f:\ <enter>
This will copy the Windows installation files onto the USB flash drive, it may take several minutes.
xcopy switches are as follows:

/s - Copies directories and subdirectories except empty


ones.
/h - Copies hidden and system files.
/f - Displays full source and destination filenames while
copying.

To display the full list of switches, type xcopy /?


<enter> Figure 36: Using CMD CD Boot
This will make the USB drive bootable and when
selected at start up, will boot straight into the Windows installation.
Device Driver / Driver

Device Driver
in computing refers to a special kind of software program or a specific type of software application which
controls a specific hardware device that enables different hardware devices for communication with the
computer’s Operating System. A device driver communicates with the computer hardware by computer
subsystem or computer bus connected to the hardware.

Device Drivers are very essential for a computer system to work properly because without device driver
the particular hardware fails to work accordingly means it fails in doing a particular function/action for
which it has been created.

In a
very

30 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
common way, most term it as only a Driver also when someone says Hardware Driver that also refers
to this Device Driver.

Working of Device Driver


Device Drivers depend upon the Operating System’s instruction to access the device and performing any
particular action. After the action they also shows their reactions by delivering output or status/message
from hardware device to the Operating system. For Example a printer driver tells the printer in which
format to print after getting instruction from OS, similarly A sound card driver is there due to which 1’s
and 0’s data of MP3 file is converted to audio signals and you enjoy the music. Card reader, controller,
modem, network card, sound card, printer, video card, USB devices, RAM, Speakers etc. need Device
Drivers to operate.

Types of Device Driver

1. Kernel-mode Device Driver –This Kernel-mode device driver includes some generic hardware
which loads with operating System as part the OS these are BIOS, motherboard, processor and
some other hardware which are part of kernel software. These includes the minimum system
requirement device drivers for each operating system.
2. User-mode Device Driver – Other than the devices which are brought by kernel for working of
the system the user also brings some devices for use during the using of a system that devices
need device drivers to functions those drivers falls under User mode device driver. For example,
user needs any plug and play action that comes under this.

Virtual Device Driver


There are also virtual device drivers (VxD), which manages the virtual device. Sometimes we use same
hardware virtually at that time virtual driver controls/manages the data flow from different application
used by different users to the same hardware.
It is essential for a computer to have the required device drivers for all its parts to keep the system
running efficiently. Many device drivers are provided by manufactures from beginning and also, we can
later include any required device driver for our system.

Prepare for Installation of Driver(s)


Before installation/reformatting, check first all the device drivers needed in installation process. Failure to
do so, it may lead to different errors that may cause the computer and its connected devices to work
improperly. The following errors may occur if device drivers are not properly installed.
1. Some I/O ports are not usable.
Example: sd card, reader
2. Not able to print, if printer’s driver is not installed.
3. Poor video display.
4. No sounds input and output (mic and speakers are not working properly).
5. Devices are not possible to work properly according to its specification.

31 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Example: Printer is not able to print a document without the presence of its required driver.

Choosing the Right Driver


1. Check the specific required drivers for its equivalent devices.
2. Create an all-in-one driver. (Driver Pack)

Preparing Driver for Installation


1. Check the installation driver disc attached in a newly purchased computer.
2. If you don’t have driver disc, try to identify and specification of computer, including its brand
name and code then search over the internet the equivalent needed drivers.
3. If the internet connection is not available, make sure that you prepared the all-in-one (AIO)
Driver Pack Solution app for you to install the required drivers for your installation.

Module Title: CSS NCII


Grade: 11

Time/ Schedule: Quarter 3 (Week 3 of 4)


Learning Outcomes: Install Operating System and Drivers for Peripheral Devices

Topic: Installing Windows Operating System

Figure 39: Different Types of Operating Systems in PC

Learning Objectives:
At the end of this lesson, the students should be able to:

32 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

 Explain the Windows Operating System Installation


 Perform installation of Windows Operating System and Server.
 Discuss the different Steps in Installing Windows Operating System and Server.
 Demonstrate Installation of Windows 2008 Server R2 Using bootable flash drive.

WINDOWS 10 CLEAN INSTALLATION PROCESS

Warning: This is a friendly reminder that this process will erase everything on your computer. It's always
recommended to make a temporary full backup of your PC before proceeding.

To do a clean installation of Windows 10, use these steps:


1. Start the device with Windows 10 USB media.
2. On prompt, press any key to boot from the device.
3. On the "Windows Setup," click the Next button.
Quick tip: Usually, it's unnecessary, but if your language, time and currency, and keyboard are
different from the default selections, make sure to select the correct settings before continue.
4. Click the Install now button.
5. Type the product key if this is your first time installing Windows 10. If you're reinstalling the OS,
click the I don't have a product key option to continue (assuming that your device was already
activated).

Figure 40: Step 3 Figure 41: Step 4 Figure 42: Step 5

6. Click the Next button.


7. Select the edition of Windows 10 (If applicable). This selection must match the edition your
product key activates.
8. Click the Next button.
9. Select the I accept the license terms option to continue.
10. Click the Next button.
11. Click on the Custom: Install Windows only (Advanced) option to continue with a clean
installation.

Figure 43: Step 7 Figure 44: Step 9 Figure 45: Step 11

33 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

12. Select the partition with the current installation (usually "Drive 0"), and click the Delete button.
Quick tip: If "Drive 0" has multiple partitions, you have to select and delete each of the partitions
to allow the setup to use the entire drive for the new clean installation. Windows 10 will create
the required partitions automatically during the process. It's not necessary to delete the partitions
on secondary drives.
13. Click the Yes button.
14. Select the empty drive (Drive 0 Unallocated Space).
15. Click the Next button.

Figure 46: Step 13 Figure 47: Step 14


Once you complete the steps, the setup will install Windows 10 on the computer.

Windows Out-of-Box Experience


After the setup, you need to continue with the out-of-box experience to create a new account and
configure your preferences.

This guide follows the out-of-box experience available with Windows 10 version 2004 (May 2020
Update), but depending on the release you are trying to install; the steps may be slightly different.

To complete the OOBE on a new install of Windows 10, use these steps:

1. Select your Region option.


2. Click the Yes button.
3. Select your keyboard layout option.
4. Click the Yes button.
5. Click the Skip button (unless you need to add a second keyboard layout).
Quick note: If you're not using a wired network connection, you'll need to sign in to the wireless
network, and then proceed with the account settings.

Figure 48: Step 1 Figure 49: Step 3 Figure 50: Step

6. Click the Set up for personal use option.

34 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
7. Click the Next button.
8. Type your Microsoft account information to create an account.
Quick note: The recommended process is to use a Microsoft account. However, if you want to
use a traditional local account, you'll need to click the Offline account option from the bottom-
left corner, and then continue with the on-screen directions.
9. Click the Next button.
10. Type your Microsoft account password. Or if you use your phone to sign in to Microsoft services,
you can click the Use the Microsoft Authenticator app instead option (if available).
11. Click the Next button.

Figure 51: Step 6 Figure 52: Step 8 Figure 53:


Step 10
12. Click the Create PIN button.
13. Create your new four-digit Windows Hello PIN.
Quick tip: If you want to continue using a traditional password, click the Cancel button to skip
the process.
14. Select your privacy settings (and don't forget to scroll down the page to review all the settings).
15. Click the Accept button.

Figure 54: Step 12 Figure 55: Step 13


Figure 56: Step 15

16. Click the No, thanks button to skip the Microsoft 365 setup (if applicable).
Quick tip: If you have an Office product key, you can click the I have a product key option, and
then the apps will install automatically on your device.
17. Click the Accept button to allow Microsoft to collect personal information to make Cortana more
personal. If you're not interested in the digital assistant, click the Not now button to continue

35 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Figure 57: Step 16 Figure 58: Step 17

After you complete the steps, the settings you selected will apply to the clean installation, and you should
be able to see the default desktop experience.
INSTALLING WINDOWS SERVER 2008 R2 (USING BOOTABLE FLASH DRIVE)

Requirements:
1. Flash Drive - recommended size is 8gb.
2. RUFUS - bootable flash drive creator. Download it here -RUFUS 1.4.9
3. Image file of Window Server 2008 R2.
4. Computer compatible with Windows Server 2008 R2 (Refer to your motherboard manual for this)
5. Lot of time and patience.

Steps:
1. Insert the bootable flash drive on your desktop computer and access the BIOS and look for the
boot setting option. Other BIOS might look different so just look for any option relating to boot.
Below the pictures show two options in boot settings: one is Boot Device Priority and the other
one is Hard Drive Option. Choose Hard Disk Drive Option.
2. Select USB drive as your priority drive to boot.
3. Go back to Boot device priority and Choose USB drive as 1st Boot Device.
4. Save the configuration and choose OK.

Figure 59: Step 1 Figure 60: Step 2

36 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Figure 61: Step 3 Figure 62: Step 4


5. Press any key when the message "Press any key to boot from USB appear.
6. After booting on the Windows 2008 installer, the Windows starting up will appear.

Figure 63: Step 5 Figure 64: Step 7


7. The next screen is the Windows Setup dialog box where you can change the Language, Time, and
keyboard format. Just click next to proceed on next window.
8. On this window, you have the option “Repair your computer” if you have already an existing
Operating System that needs to be repaired but since we are doing a Clean Install, we will ignore
that option and just click Install now to proceed
9. Setup is Starting Window appear. Just wait until the next screen shows.
10. Select the operating system you want to install. Select the Windows Server 2008 R2 Standard
X64
11. License Terms. On this screen, check “I accept the license terms” and click Next.
12. Which type of Installation do you want?. Since we are doing clean install, select “Custom: Install
Windows only (advanced).
13. Where do you want to install Windows?. Here, remember the requirements of Windows Server
2008 in hard disk drive, so in allocating disk space for drive C. make sure that it will meet the
recommended space and will have a free space for future installation of other applications. Click
New to create new partition.
14. After clicking the New option, enter the size of first partition or allocation for Drive C.
15. Select the remaining partition and click new.
16. Click apply to create the remaining partition. This will create the Drive D.
17. Make sure that the Windows Server 2008 will be installed on drive C. Select the drive you
allocated for drive C then click Next.
18. Installing Windows: This screen will appear after clicking next on partitioning window. Just wait
until the setup finish all the listed tasks.
19. Installing Windows: Your computer will restart after it finish some tasks. A problem or error will
show if there is a problem on your installer or on your drives.
20. Installing Windows: Your computer will restart after it finish some tasks. A problem or error will
show if there is a problem on your installer or on your drives.
21. Installing Windows: When you see that the Completing installation is the next task to be done,
that is a sign that it will redirect you to Windows Server 2008 desktop.
22. Setup will restart after the Installation is done.

37 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
23. The Windows will now load the operating system after the restart.
24. Setup is preparing your computer for first use. On this screen, wait until the desktop appear.
25. Before logging on, Windows Server 2008 will allow you to create the user’s password that you
will use every time you log on.
26. After creating a password, click the right arrow button or press enter to continue.
27. Click OK after changing the password.
28. Preparing your desktop. Just wait until the next screen appear.
29. Press CTRL + ALT + DELETE key to start logging on.
30. Type the administrator password that you created.
31. The Initial Configuration Tasks window will appear on the desktop. The next thing to do is to
check the drivers on device manager if properly installed.

Figure 65: Step 30 Figure 66: Step 31

References:

https://edu.gcfglobal.org/en/computerbasics/what-is-a-computer/1/
http://byte-notes.com/four-types-computers/
https://www.javatpoint.com/types-of-computer
https://www.computerhope.com/issues/ch001921.htm
https://www.lanner-america.com/blog/types-motherboard-form-factors/
https://www.geeksforgeeks.org/different-types-ram-random-access-memory/
https://computer.howstuffworks.com/ram.htm
https://sir-sherwin.blogspot.com/2010/06/parts-of-system-unit.html
https://www.computerhope.com/jargon/p/power-supply.htm
https://www.computerhope.com/jargon/p/port.htm
https://www.electronicshub.org/types-of-computer-ports/#PS/2
https://www.lifewire.com/operating-systems-2625912
https://edu.gcfglobal.org/en/computerbasics/understanding-operating-systems/1/
https://www.matsuk12.us/cms/lib/ak01000953/centricity/domain/2740/ite_pc_v41_chapter3.pdf
https://www.computerhope.com/jargon/v/video-card.htm
https://asmed.com/comptia-a-pc-expansion-slots/
https://www.computerhope.com/jargon/c/cnr.htm
https://www.computerhope.com/jargon/a/amr.htm
https://www.omnisci.com/technical-glossary/graphical-user-interface
https://www.guru99.com/difference-system-software-application-software.html
http://technology350.blogspot.com/2015/01/brief-history-of-windows.html
https://medium.com/@CMadu/evolution-of-mac-os-4b7b5eeb02b5
https://www.slideshare.net/DamianGordon1/operating-systems-versions-of-linux
https://www.javatpoint.com/mobile-operating-system
https://www.javatpoint.com/android-versions
http://www.tokeepmypcup.com/definitions/what_is_booting/
https://appuals.com/how-to-create-windows-10-bootable-usb-using-rufus/

38 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
https://www.dell.com/support/article/en-ph/sln153364/create-a-bootable-usb-flash-drive-using-the-
diskpart-utility?lang=en
https://www.geeksforgeeks.org/device-driver-and-its-purpose/
https://www.goodcore.co.uk/blog/types-of-software/
https://edu.gcfglobal.org/en/computerbasics/understanding-applications/1/
https://www.golurn.com/COC1_LO2/content/assets/1w3LhevVoWrJmqLU_KS52WkcjTcuyEXzp-
DRIVER.pdf
https://www.windowscentral.com/how-do-clean-installation-windows-10
https://sir-sherwin.blogspot.com/2010/08/software.html#win7

Videos:
Computer Basics - https://youtu.be/Cu3R5it4cQs
Inside a Computer - https://youtu.be/HB4I2CgkcCo\
Setting up Desktop Computer - https://youtu.be/RnM3u99xIf4
Understanding Operating System - https://youtu.be/fkGCLIQx1MI

-end-

Prepared by: mpt

Module Title: CSS NCII


Grade: 11

Time/ Schedule: Quarter 3 (Week 5 of 8)


Learning Outcomes: Install Application Software

Topic: Installing and Configuring Systems

Learning Objectives:
At the end of this lesson, the students should be able to:

 Know how to install application software.


 Identify the different antivirus software.
 Install device drivers.

INSTALLING SOFTWARE ON WINDOWS PC


Computer allows to do amazing things like digital photo editing, sophisticated computer gaming, video
streaming—all of these things are possible because of different types of software. Developers always
create a new software application, that allows you to do more with your computer.
How to Install from a CD or DVD
Many software titles, games, and utilities have an AutoPlay feature. This feature automatically starts a
setup screen for the software when the CD or DVD is inserted. If your program contains this feature,
follow the steps that appear after inserting the disc into the computer.

If AutoPlay is disabled on your computer or unavailable on the software disc, follow these steps.

1. Open My Computer.
2. In the My Computer window, open the drive that contains the installation files. For example, if
the files are on the CD-ROM drive, open the D: drive or letter of your CD-ROM drive.

39 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
3. In the drive that contains your files, locate either the executable setup (i.e., "setup.exe") or install
file. Double-clicking this file starts the installation process. If there are multiple setups or install
files, locate the executable file or double-click each setup or install file until you find the file that
starts the installation.

Install a CD on a Computer with No Disc Drive


Many new computers no longer have disc drives. If the computer does not have a disc drive, try finding
the software online. Computer drivers, software for hardware devices, games, and other programs are
available for download and can be installed from a download. If you have the product key, it doesn't
matter where you get the program.

If the program is not available for download, copy all the CD or DVD contents to another drive on
another computer. For example, you could copy the contents of the disc to a USB flash drive and then
install the program from the USB flash drive.

How to Install from a Download


1. Download the program from the website providing the program.
2. Open the download folder.
3. If the file you downloaded is an executable file, double-click the file icon to start the setup
process. If the downloaded file is compressed (e.g., .zip), you must extract the file's contents
before setup can begin. Fortunately, this function is built into most versions of Windows.
4. Once the files are extracted, double-click the setup or install file to install the program.

How to Install from USB Flash Drive


1. Open Windows Explorer or My Computer and find the USB drive that is often the last drive
letter.
2. Once the drive is opened, find the setup or executable file, and double-click the file icon to start
the setup process.

Installing Software from the Web


The installation file will be saved to your computer in .exe format. Pronounced dot e-x-e, this is the
standard extension for installation files on Windows computers. You can follow the steps below to install
an application from an .exe file.
1. Locate and download an .exe file.
2. Locate and double-click the .exe file. (It will usually be in your Downloads folder.
3. A dialog box will appear. Follow the instructions to install the software.
4. The software will be installed. You can now open the application from the Start menu (Windows
7) or the Start Screen (Windows 8).

The Windows Store


You can download and install software from the Windows Store. The Windows Store is meant to
simplify the process of locating and installing software from third-party developers—when you find an
app in the Windows store, you won't have to do any extra work to install it.

INSTALLING SOFTWARE ON MAC


Modern Apple computers, like the iMac and MacBook, don't have CD-ROM or DVD drives.
Consequently, the following section shows you how to install from a download

40 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Install from Download
1. Click the Finder icon on the Dock at the bottom of the screen.
2. On the left side of the window that appears, under the Favorites section, click the DOWNLOAD
selector.
3. Locate the program you'd like to install and double-click it.
4. Follow the guided instructions to install the program.
5. Once the program is installed, drag it to the Applications folder and delete the installation file (in
this case, FileZilla_3.49_macosx-x86.app.tar.bz2).
6. Click the APPLICATION selector to see the program you installed.

Installing from the Web


The installation file will usually be saved to your computer in the .dmg format. Pronounced dot d-m-g,
this is the standard extension for installation files on Mac computers. You can follow the steps below to
install an application from a .dmg file.
1. Locate and download a .dmg file.
2. Locate and select the .dmg file. (It will usually be in your Downloads folder.)
3. A dialog box will appear. Click and drag the icon to your Applications folder.
4. The application is now installed. You can double-click the icon to open the program.
5. On the desktop, there will probably be a disk drive icon with the name of the application. This is
known as a volume, and it is not needed after the application has been installed. You can simply
drag it into the Trash on the dock.
 Some applications will use the .pkg extension instead of .dmg—in this case, you can
simply follow the instructions to install the software.

The MAC App Store


If you're using macOS, you can download and install software from the Mac App Store. The Mac App
Store is meant to simplify the process of locating and installing software from third-party developers—
when you find an app, you won't have to do any extra work to install it.

SOFTWARE UPDATE
An update is new, improved, or fixed software, which replaces older versions of the same software. For
example, updating your operating system brings it up-to-date with the latest drivers, system utilities, and
security software. Updates are often provided by the software publisher free of additional charge.
Updating a Program
There is no standard for how software programs are updated. The following is a list of ways a program
may be updated:

 Online programs - Any program that connects to the Internet should automatically check for
updates when it is first run.
 Help menu - Pressing the F1 key or accessing the help menu from the file menu should have the
option to check for updates.
 Operating system - All operating systems today are updated using software included with the
operating system.
 OEM program - An OEM computer (e.g., Dell or HP) often include assistant programs to assist
with checking and downloading any updates for the pre-installed programs included with the
computer. For example, HP includes the HP support assistant program for managing updates.

Causes If Don’t Update the Program


Several things can happen if you do not update, below are the most common symptoms you would
encounter if you do not update, such as:

41 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Fix errors - Most updates fix errors, and if you don't update, you'll get those errors.
 Security vulnerabilities - Updates also patch security holes, if you don't update your information
may be compromised.
 Fix conflicts - It is not uncommon to discover conflicts with other programs and hardware. If you
don't update, conflicts may happen and cause problems with other programs.

UPDATING OPERATING SYSTEMS


Windows
1. To update Windows, first open the Control Panel. If you don't know where the Control Panel. In
the search bar in the Control Panel, type update. Under Windows Update, click Check for
updates.
2. It may take a moment for Windows to search for updates. Once it does, if there are any updates
available it will prompt you to install them.
3. It may take a while to install all the updates. It's safe to leave the computer and do something else
while it finishes. Once it's done, Windows will probably prompt you to restart the computer. If
you need to do anything else after this, Windows will prompt you; otherwise, you're up to date!

MacOS
To update macOS, open the App Store, then click Updates at the top. macOS updates will be at
the top of the list of available updates. On the right side of the screen, there are buttons to update
individual apps or to apply all available updates.

VIRTUALIZATION SOFTWARE
Virtualization software allows you to run two or more operating systems using only one PC; also called a
hypervisor, is what allows one computer or server to host multiple operating systems.
Examples: VMware Workstation Player, VirtualBox, Parallels Desktop, QEMU, Citrix Hypervisor, Xen
Project, Microsoft Hyper-V,

DISK MANAGEMENT
Disk Management is a Microsoft Windows utility first introduced in Windows XP. It enables users to
view and manage the disk drives installed in their computer and the partitions associated with those
drives.

Opening Windows Disk Management


1. Click Start and access the Run option. You can also press Windows key + R on the keyboard to
open the Run option.
2. Type diskmgmt.msc and press Enter. or
3. Open the Control Panel.
4. Double-click on Administrative Tools if in Classic View or click Performance and
Maintenance and then Administrative Tools if in Category View. Note: If you do not have
admin rights to the computer, this is not available.
5. Once in the Administrative Tools window, double-click Computer Management and then click
Disk Management under the Storage section.

ANTIVIRUS SOFTWARE
Antivirus software is a type of utility used for scanning and removing viruses from your computer. While
many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers
from viruses and remove any viruses that are found.

42 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Driver Software Update Procedure

Update Driver Using Windows Update


To quickly update device drivers using Windows Update, use these steps:
1. Open Settings.
2. Click on Update & Security.
3. Click on Windows Update.
4. Click the Check for updates button.

Update Driver Using Device Manager


Installing Driver from Microsoft
To update a device driver with Device Manager on Windows 10, use these steps:
1. Open Start.
2. Search for Device Manager and click the top result to open the tool.
3. Double-click the branch with the hardware you want to update.
4. Right-click the hardware and select the Update driver option.
5. Click the Search automatically for updated driver software option.
After you complete the steps, if a newer update is available, Device Manager will download and install
the package automatically similar to Windows Update using the Microsoft servers.

Installing Driver from Manufacturer


1. Open Start.
2. Search for Device Manager and click the top result to open the tool.
3. Double-click the branch with the hardware you want to update.
4. Right-click the hardware and select the Update driver option.
5. Click the Browse my computer for driver software option.
6. Click the Browse button.
7. Select the main folder with the driver files you have extracted earlier.
8. Click the OK button.
9. Check the Include subfolders option to allow the wizard to find the correct ".inf" file with the
instructions to update the driver.
10. Click the Next button.
Once you complete the steps, the wizard will detect and install the new driver on your computer to
improve the overall experience with fixes, new functionalities, or new support depending on the update
and device.

Application Software License Agreements


A software license agreement is the legal contract between the licensor and/or author and the purchaser
of a piece of software which establishes the purchaser's rights.

A free software license agreement gives the purchaser the rights to modify and redistribute the software
and related components, while a proprietary software license agreement forbids this.

Stress Testing
Stress Testing is a type of software testing that verifies stability & reliability of software application.

43 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Module Title: CSS NCII
Grade: 11

Time/ Schedule: Quarter 3 (Week 6 of 8)


Learning Outcomes: Install Network Cable

Topic: Setting-up Computer Networks

Learning Objectives:
At the end of this lesson, the students should be able to:

 Define computer networks.


 Identify the different types of computer networks and cables.
 Identify tools that use in networking.
 Demonstrate on how to make a straight and crossover network cable.

COMPUTER NETWORKS CONCEPTS

Computer Networks
A computer networks consists of two or more computing devices that are connected in order to share the
components of your network (its resources) and the information you store; is a group of two or more
computers that linked together.

Different Types of Computer Networks


1. LAN (Local Area Network) – A type of computer network within a specific area or vicinity. For
example, computers inside the school connected to one another is considered as LAN.
2. MAN (Metropolitan Area Network) – A type of computer network within the town or city.
3. WAN (Wide Area Network) – This type of computer network is the largest because it is a global
interconnection of computers. An example of this is the Internet.

Network Media
Network media is the actual path over which an electrical signal travels as it moves from one component
to another.

Two Types of Network Transmission


 Bounded/Guided Transmission
 Unbound Transmission

Bounded/Guided Transmission Media


It is the transmission media in which signals are confined to a specific path using wire or cable. The types
of Bounded/ Guided are twisted-pair cable, coaxial cable, fiber-optic cable, and wireless.

Unbounded Transmission Media


Unbound transmission media extend beyond the limiting confines of cabling. They provide an excellent
Communication Networks alternative for WANS. The lack of physical restrictions provides larger
bandwidth as well as wide area capabilities. Unbound media typically operate at very high frequencies.
The three types of unbound transmission media are: Radio wave, Micro wave, Infrared.

44 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Twisted-Pair Cable
Twisted-pair cable is a type of cabling that is used for
telephone communications and most modern Ethernet
networks; a pair of wires forms a circuit that can
transmit data; pairs are twisted to provide protection
against crosstalk, the noise generated by adjacent pairs.
When electrical current flows through a wire, it creates a
small, circular magnetic field around the wire.

Two Basic Types of Twisted-Pair Cables


Unshielded Twisted-Pair (UTP) Cable
UTP cable is a medium that is composed of pairs of wires; is used in a variety of networks.
Each of the eight individual copper wires in UTP cable is covered by an insulating material, the wires in
each pair are twisted around each other.
UTP cable often is installed using a Registered Jack 45 (RJ-45) connector.

The RJ- 45 is an eight-wire connector used commonly to connect computers onto a local-area network
(LAN), especially Ethernets. Although UTP was once considered to be slower at transmitting data than
other types of cable, this is no longer true. In fact, UTP is considered the fastest copper-based medium
today.

Commonly used types of UTP cabling are as follows:


 Category 1 – Used for telephone communications. Not suitable for transmitting data.
 Category 2 – Capable of transmitting data at speeds up to 4 megabits per second (Mbps).
 Category 3 – Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps.
 Category 4 – Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps.
 Category 5 – Can transmit data at speeds up to 100 Mbps.
 Category 5e – Used in networks running at speeds up to 1000 Mbps (1 gigabit per second
[Gbps]).
 Category 6 – Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge
(AWG) copper wires. Category 6 cable is currently the fastest standard for UTP.

Shielded Twisted-Pair (STP) Cable


STP cable combines the techniques of shielding, cancellation, and wire twisting. Each pair of wires is
wrapped in a metallic foil. The four pairs of wires then are wrapped in an overall metallic braid or foil,
usually 150-ohm cable; reduces electrical noise both within the cable (pair-to-pair coupling, or crosstalk)
and from outside the cable; is installed with STP data connector, which is created especially for the STP
cable; can also use the same RJ connectors that UTP uses.

STP is primarily used in Europe. The following summarizes the features of STP cable:
Speed and throughput – 10 to 100 Mbps
Average cost per node – Moderately expensive
Media and connector size – Medium to large
Maximum cable length – 100 m (short)

Coaxial Cable
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single inner wire made of
two conducting elements. One of these elements, located in the center of the cable, is a copper conductor.
Surrounding the copper conductor is a layer of flexible insulation; Coaxial Cable supports 10 to 100

45 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Mbps and is relatively inexpensive, although it is more costly than UTP on a
per-unit length. However, coaxial cable can be cheaper for a physical bus
topology because less cable will be needed; can be cabled over longer distances
than twisted-pair cable. For example, Ethernet can run approximately 100 meters
(328 feet) using twisted- pair cabling. Using coaxial cable increases this distance
to 500m (1640.4 feet).

Fiber Optics
Fiber Optics is sending signals down hair-thin strands of glass or plastic
fiber. The light is “guided” down the center of the fiber called the “core”.
The core is surrounded by an optical material called the “cladding” that
traps the light in the core using an optical technique called “total internal
reflection.” The core and cladding are usually made of ultra-pure glass.
The fiber is coated with a protective plastic covering called the “primary
buffer coating” that protects it from moisture and other damage. More
protection is provided by the “cable” which has the fibers and strength
members inside an outer covering called a “jacket”.

Wireless Communication
Wireless communication uses radio frequencies (RF) or infrared (IR) waves to transmit data between
devices on a LAN. For wireless LANs, a key component is the wireless hub, or access point, used for
signal distribution

Wi-Fi (Wireless Fidelity)


Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to
connect to the network; used to provide Internet access to devices that are within the range of a wireless
network that is connected to the Internet.

Computer Network Components


Bridge
A bridge is a device that connects two LANs, or two segments of
the same LAN that use the same protocol. Sometimes called
“transparent bridges, they work at the OSI model Layer 2.
Simply put, they are not concerned with protocols. Their main
job is to pass data to a destination address that is predetermined
in the data packet.

Hubs
A hub is a common connection point for devices in a network. A hub has multiple ports. When a data
packet arrives at a hub, it is copied and distributed to all of its ports so that all nodes on the LAN can see
the packets.

There are three types of hubs:


 Passive Hub - this hub serves as a conduit for the data, enabling it to go from one device to
another.
 Intelligent Hub (also known as manageable hubs) - this hub includes additional features that
enable administrators to monitor traffic through the hub.
 Switching Hub - this hub reads the destination address of each packet
and then forwards the data packet to the appropriate port.

46 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Switches
A switch is a device that filters and forwards data packets between networks. Switches operate at the data
layer, and sometimes at the network layer.

Routers
A router is a device that forward data packets over networks. Most commonly, a
router is connected to at least two networks (normally LANs or WANs). Routers are
located at gateways, the place where two networks are connected. Routers do little
data filtering; they mainly deliver the data.

Gateways
A gateway is a node on a network that serves as an entrance to another network. The gateway routes
traffic from a computer to an outside network that is serving the web pages. For example, the gateway for
a home computer is the ISP provider that connects the user to the Internet.
In a corporate environment, the gateway often acts as a proxy server and a firewall. Gateways are similar
to routers and switches in that they forward data to the destination and provide the path for which the data
will travel to the destination.

Repeater
A repeater is an object that increases a signal's strength, so it can be transmitted and received over a
greater distance without a loss in quality. These devices are commonly used with networks to help the
lines running between network devices reach farther destinations.

Modem
Modem is short for "Modulator-Demodulator." It is a hardware component that allows a computer or
another device, such as a router or switch, to connect to the Internet. It converts or "modulates" an analog
signal from a telephone or cable wire to digital data (1s and 0s) that a computer can recognize.

Patch Panels
Patch panels are network ports held together within telecommunication
closets that connect incoming and outgoing local area network (LAN) lines
or other communication, electronic and electrical systems.

Computer Networking Tools


UTP Cables
Unshielded twisted pair (UTP) cables are widely used in the computer and telecommunications industry
as Ethernet cables and telephone wires. In an UTP cable, conductors which form a single circuit are
twisted around each other in order to cancel out electromagnetic interference (EMI) from external
sources. Unshielded means no additional shielding like meshes or aluminum foil, which add bulk, are
used.

RJ45
RJ45 is a type of connector commonly used for Ethernet networking. It looks similar
to a telephone jack, but is slightly wider. Since Ethernet cables have an RJ45
connector on each end, Ethernet cables are sometimes also called RJ45 cables.
The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking
interface. The "45" simply refers to the number of the interface standard. Each RJ45 connector has eight
pins, which means an RJ45 cable contains eight separate wires.

47 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Crimp Tool
A crimp tool looks similar to a pair of pliers but is actually used to conjoin two
pieces of metal by deforming one, or sometimes both, of them in such a way
that it causes them to hold each other.

Punch Down Tool


A punch down tool, which can also be referred to as a krone tool, is a hand
tool that is used to connect the wires within an Ethernet cable to one of the
following:
 Patch panel
 Punch down block
 Keystone module
 Surface mount box
The name “punch down” is given as the wires are punched into place under force. Punch down tools are
relatively basic in that they only consist of three distinct parts: a handle, a spring-based mechanism, and a
slotted blade that is removable. When the tool is used to connect a wire, the blade is used to cut off the
excess wire and leave a neat and tidy installation.

Wire Stripper
A wire stripper is also a hand tool and is designed to remove the protective covering
from an Ethernet cable, exposing the inner wires.

Cable Tester
A cable tester is a device used to test both the strength and connectivity of a
particular type of cable. The tester is able to tell you if a cable is set up and
connected correctly, and give you an idea of the strength of the cable across the
entire length. Within networking, the more commonly found cable tester is used to
test Cat5, Cat5e and Cat6 Ethernet cables.

Wire Cutters
The purpose of a wire cutter is pretty self-explanatory; they are simply used to cut through a cable and its
wires. They are most commonly used to cut copper (Ethernet cable is made of copper), iron, brass,
aluminum and steel wire.

NETWORK CABLE
Straight Through and Crossover Cable
Common Ethernet network cable are straight and crossover cable. This Ethernet network cable is made of
4 pair high performance cable that consists twisted pair conductors that used for data transmission. Both
end of cable is called RJ45 connector.
The cable can be categorized as Cat 5, Cat 5e, Cat 6 UTP cable. Cat 5 UTP cable can support 10/100
Mbps Ethernet network, whereas Cat 5e and Cat 6 UTP cable can support Ethernet network running at
10/100/1000 Mbps. You might hear about Cat 3 UTP cable, it's not popular anymore since it can only
support 10 Mbps Ethernet network.
Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only difference is each
type will have different wire arrangement in the cable for serving different purposes.

Straight Through Cable


You usually use straight cable to connect different type of devices. This type of cable will be used most of
the time and can be used to:

48 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
1. Connect a computer to a switch/hub's normal port.
2. Connect a computer to a cable/DSL modem's LAN port.
3. Connect a router's WAN port to a cable/DSL modem's LAN port.
4. Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5. Connect 2 switches/hubs with one of the switch/hubs using an uplink port and the other one using
normal port.

Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover
cable can be used to:
1. Connect 2 computers directly.
2. Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding
network).
3. Connect 2 switches/hubs by using normal port in both switches/hubs.

MAKING A NETWORK CABLE


1. Unroll the required length of network cable and add a little extra wire, just in case.
2. Carefully remove the outer jacket of the cable.
3. Inspect the newly revealed wires for any cuts or scrapes that expose the copper wire inside.
4. Untwist the pairs so they will lay flat between your fingers.
5. Arrange the wires based on the wiring specifications you are following.
6. You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires are switched.
7. Press all the wires flat and parallel between your thumb and forefinger.
8. Keep the wires flat and in order as you push them into the RJ-45 plug with the flat surface of the
plug on top.

49 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
9. Place the wired plug into the crimping tool.
10. Repeat all of the above steps with the other end of the cable.
11. Test the cable to ensure that it will function in the field.

To Understand more of computer network cabling please visit the following link credits by ICT Tech
Tips:
https://www.youtube.com/watch?v=XBV2dMXs6zw

PATCH PANEL
A patch panel is a passive component that compliments the
switch. The panel is designed to group multiple network ports
in a single location which helps organize the wiring. Labeling
the cables connected to a patch panel makes it is easier to
identify signal flow as well as diagnose and troubleshoot any
technical issues. In contrast, an Ethernet switch is an active
component that receives, processes, and forwards data to
multiple devices such as computers, servers, as well as other
Ethernet IP devices such as security cameras. Devices can be
networked together by connecting them to the switch through
the patch panel.

Patch Panel Vs. Switch


When connecting devices in data centers, two common
components include a patch panel and a network switch. A well-
designed structured cabling system can make installation of a
patch panel and an Ethernet switch effortless. Once mounted on
the server rack, the use of horizontal cable management can keep everything neat and tidy.

Steps in installing patch panel and switch


1. Determine where the patch panel and switch should be installed.
Evaluate the operating environment, a place where the equipment and components can be
maintained well and accessed easily. Unobstructed airflow and vents are crucial.
2. Build or purchase pre-terminated patch cords.
Determine patch cord lengths as well as the quantity needed for the installation. If improper
lengths are chosen, cables with excessive slack will not only increase material and installation
cost but also hinder cable management.
3. Map out the ports.
Determine which switch port is connecting to which patch panel port, by doing this can reduce
installation time.
4. Mount the patch panel and switch.
Ensure the server rack accommodates the size of your components (EIA standard 19" width is
most common).
5. Connect the patch panel to the switch.
With the prepared patch cords, follow the port mapping created in step 3 and patch the cables.
6. Install cable management.
Using horizontal and vertical cable management and cable ties to organize cables can help make
future changes and upgrades easy.
7. Label cable.
Tag both ends of each cable the same; this can assist in troubleshooting your end-to-end
connectivity between the patch panel and the switch.

50 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Raceways
A raceway is essentially any rigid enclosed or semi-enclosed channel that
protects, routes and hides cables and wires. Surface raceway is an excellent
choice for concealing unsightly wires in a number of settings: home theaters,
offices, conference rooms, workstations, and more.

Different Style of Raceway


Latching Raceway. Latching raceway is identifiable by its hinged or sliding
cover that fully encloses the cables within the channel; is a discreet way to
conceal and fully enclose household wires.

J Channel Raceway. J Channel or J Hook raceways are so-named because a cross section is shaped
roughly like the letter “J”; cables are inserted by dropping them through the top, where the curve of the
“J” hooks around to keep them in place.

Corner Duct Raceway. Corner duct is similar to latching raceway, but features a unique quarter round
shape that allows it to blend in to wall and/or ceiling junctions for a complete and finished look; It utilizes
a sliding cover to completely conceal cables, and can be utilized horizontally or vertically on pretty much
any corner, even mimicking the look of crown molding to further disguise its purpose.

Power Raceway. Power raceway incorporates a power source directly into the raceway; can be composed
of plastic or metal; usually holds communication cabling including voice/data wiring, fiber optics, or
other low voltage cables.

Specialty Raceways
Wire Guard – for utility poles or the outer walls of buildings.
Cable Runway or Panduit's Fiber Runner – for cable support system
Extruded aluminum raceways – durable and rugged for outdoor industrial use
Metal Over floor Raceways – offer a semi-permanent solution for low voltage cabling, allowing
pedestrians, wheelchairs, carts and other traffic to roll right on over it.

Modular Box
It is a surface mounted box used in a commercial and industrial building to cleanly
attach network cables. It is commonly used in a structured network.

To Understand more of computer Modular box please visit the following link
credits to Mr. Ismael Balana of Golurn.com:

References:
https://www.golurn.com/COC2_LO1/content/assets/PWFieUTUvFZ3acZJ_OqMP_7ykEYvdPMsQ-
MODULAR.pdf

51 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Module Title: CSS NCII
Grade: 11

Time/ Schedule: Quarter 3 (Week 7 of 8)


Learning Outcomes: Set Network Configuration

Topic: Network Topology

Learning Objectives:
At the end of this lesson, the students should be able to:

 Define network topology.


 Identify the different types of computer networks topology.
 Know the different Advantages and Disadvantages of each topology.

NETWORK TOPOLOGY
Network topology is the way a network is arranged, including the physical or logical description of how
links and nodes are set up to relate to each other; refers to how various nodes, devices, and connections on
your network are physically or logically arranged in relation to each other; is the arrangement with which
computer systems or network devices are connected to each other; defines the structure of the network of
how all the components are interconnected to each other.

Why Network Topology is important?


The layout of your network is important for several reasons. Above all, it plays an essential role in how
and how well your network functions. Choosing the right topology for your company’s operational model
can increase performance while making it easier to locate faults, troubleshoot errors, and more effectively
allocate resources across the network to ensure optimal network health. A streamlined and properly
managed network topology can increase energy and data efficiency, which can in turn help to reduce
operational and maintenance costs.
The design and structure of a network are usually shown and manipulated in a software-created network
topology diagram. These diagrams are essential for a few reasons, but especially for how they can provide
visual representations of both physical and logical layouts, allowing administrators to see the connections
between devices when troubleshooting.

Topologies may define both physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.

Two Categories of Network Topology


 Physical – The physical network topology refers to the actual connections (wires, cables, etc.) of
how the network is arranged. Setup, maintenance, and provisioning tasks require insight into the
physical network; is the geometric representation of all the nodes in a network.
 Logical – The logical network topology is a higher-level idea of how the network is set up,
including which nodes connect to each other and in which ways, as well as how data is
transmitted through the network. Logical network topology includes any virtual and cloud
resources.

52 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Types of Network Topology

Bus Topology
 The bus topology is designed in such a way that all the stations
are connected through a single cable known as a backbone cable.
 Each node is either connected to the backbone cable by drop
cable or directly connected to the backbone cable.
 When a node wants to send a message over the network, it puts a
message over the network.
 All the stations available in the network will receive the message
whether it has been addressed or not.
 The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks. The
configuration of a bus topology is quite simpler as compared to other topologies.
 The backbone cable is considered as a "single lane" through which the message is broadcast to all
the stations.
 The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).

Advantages:
 Low-cost cable. In bus topology, nodes are directly connected to the cable without passing
through a hub. Therefore, the initial cost of installation is low.
 Moderate data speeds. Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
 Familiar technology. Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily available.
 Limited failure. A failure in one node will not have any effect on other nodes.

Disadvantages:
 Extensive cabling. A bus topology is quite simpler, but still, it requires a lot of cabling.
 Difficult troubleshooting. It requires specialized test equipment to determine the cable faults. If
any fault occurs in the cable, then it would disrupt the communication for all the nodes.
 Signal interference. If two nodes send the messages simultaneously, then the signals of both the
nodes collide with each other.
 Reconfiguration difficult. Adding new devices to the network would slow down the network.
 Attenuation. Attenuation is a loss of signal leads to communication issues. Repeaters are used to
regenerate the signal.

Ring Topology
 Ring topology is like a bus topology, but with connected ends.
 The node that receives the message from the previous
computer will retransmit to the next node.
 The data flows in one direction, i.e., it is unidirectional.
 The data flows in a single loop continuously known as an
endless loop.
 It has no terminated ends, i.e., each node is connected to other
node and having no termination point.
 The data in a ring topology flow in a clockwise direction.
 The most common access method of the ring topology is
token passing.

53 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
o Token passing. It is a network access method in which token is passed from one node to
another node.
o Token. It is a frame that circulates around the network.
Advantages:
 Network Management. Faulty devices can be removed from the network without bringing the
network down.
 Product availability. Many hardware and software tools for network operation and monitoring
are available.
 Cost. Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is
very low.
 Reliable. It is a more reliable network because the communication system is not dependent on the
single host computer.

Disadvantages:
 Difficult troubleshooting. It requires specialized test equipment to determine the cable faults. If
any fault occurs in the cable, then it would disrupt the communication for all the nodes.
 Failure. The breakdown in one station leads to the failure of the overall network.
 Reconfiguration difficult: Adding new devices to the network would slow down the network.
 Delay. Communication delay is directly proportional to the number of nodes. Adding new
devices increases the communication delay.

Star Topology
 Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
 The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
 Coaxial cable or RJ-45 cables are used to connect the computers.
 Hubs or Switches are mainly used as connection devices in a physical
star topology.
 Star topology is the most popular topology in network
implementation.

Advantages:
 Efficient troubleshooting. Troubleshooting is quite efficient in a star topology as compared to
bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star
topology, all the stations are connected to the centralized network. Therefore, the network
administrator has to go to the single station to troubleshoot the problem.
 Network control. Complex network control features can be easily implemented in the star
topology. Any changes made in the star topology are automatically accommodated.
 Limited failure. As each station is connected to the central hub with its own cable, therefore
failure in one cable will not affect the entire network.
 Familiar technology. Star topology is a familiar technology as its tools are cost-effective.
 Easily expandable. It is easily expandable as new stations can be added to the open ports on the
hub.
o Cost effective. Star topology networks are cost-effective as it uses inexpensive coaxial
cable.
o High data speeds. It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one
of the most popular Star topology networks.

54 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Disadvantages:
 A Central point of failure. If the central hub or switch goes down, then all the connected nodes
will not be able to communicate with each other.
 Cable. Sometimes cable routing becomes difficult when a significant amount of routing is
required.

Tree Topology
 Tree topology combines the characteristics of bus topology and
star topology.
 A tree topology is a type of structure in which all the computers
are connected with each other in hierarchical fashion.
 The top-most node in tree topology is known as a root node, and
all other nodes are the descendants of the root node.
 There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.

Advantages:
 Support for broadband transmission. Tree topology is mainly used to provide broadband
transmission, i.e., signals are sent over long distances without being attenuated.
 Easily expandable. We can add the new device to the existing network. Therefore, we can say
that tree topology is easily expandable.
 Easily manageable. In tree topology, the whole network is divided into segments known as star
networks which can be easily managed and maintained.
 Error detection. Error detection and error correction are very easy in a tree topology.
 Limited failure. The breakdown in one station does not affect the entire network.
 Point-to-point wiring. It has point-to-point wiring for individual segments.

Disadvantages:
 Difficult troubleshooting. If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
 High cost. Devices required for broadband transmission are very costly.
 Failure. A tree topology mainly relies on main bus cable and failure in main bus cable will
damage the overall network.
 Reconfiguration difficult. If new devices are added, then it becomes difficult to reconfigure.

Mesh Topology
 Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections.
 There are multiple paths from one computer to another computer.
 It does not contain the switch, hub or any central computer which
acts as a central point of communication.
 The Internet is an example of the mesh topology.
 Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern.
 Mesh topology is mainly used for wireless networks.
 Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.

55 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Two Categories of Mesh Topology
 Full Mesh Topology – In a full mesh topology, each computer is connected to all the computers
available in the network.
 Partial Mesh Topology – In a partial mesh topology, not all but certain computers are connected
to those computers with which they communicate frequently.

Advantages:
 Reliable. The mesh topology networks are very reliable as if any link breakdown will not affect
the communication between connected computers.
 Fast Communication. Communication is very fast between the nodes.
 Easier Reconfiguration. Adding new devices would not disrupt the communication between
other devices.

Disadvantages:
 Cost. A mesh topology contains a large number of connected devices such as a router and more
transmission media than other topologies.
 Management. Mesh topology networks are very large and very difficult to maintain and manage.
If the network is not monitored carefully, then the communication link failure goes undetected.
 Efficiency. In this topology, redundant connections are high that reduces the efficiency of the
network.

Hybrid Topology
 The combination of various different topologies is known as Hybrid topology.
 A Hybrid topology is a connection between different links and
nodes to transfer the data.
 When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are
connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.

Advantages:
 Reliable. If a fault occurs in any part of the network will not affect the functioning of the rest of
the network.
 Scalable. Size of the network can be easily expanded by adding new devices without affecting the
functionality of the existing network.
 Flexible. This topology is very flexible as it can be designed according to the requirements of the
organization.
 Effective. Hybrid topology is very effective as it can be designed in such a way that the strength
of the network is maximized and weakness of the network is minimized.

Disadvantages:
 Complex design. The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.
 Costly Hub. The Hubs used in the Hybrid topology are very expensive as these hubs are different
from usual Hubs used in other topologies.
 Costly infrastructure. The infrastructure cost is very high as a hybrid network requires a lot of
cabling, network devices, etc.

56 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII

Module Title: CSS NCII


Grade: 11

Time/ Schedule: Quarter 3 (Week 78 of 8)


Learning Outcomes: Set Network Configuration

Topic: Transmission Modes

Learning Objectives:
At the end of this lesson, the students should be able to:

 Define Transmission modes.


 Identify the three categories of Transmission modes.
 Know the difference between simples, half-duplex, and full-duplex mode of transmission.
TRANSMISSION MODES
 The way in which data is transmitted from one device to another device is known as
transmission mode.
 The transmission mode is also known as the communication mode.
 Each communication channel has a direction associated with it, and transmission media provide
the direction. Therefore, the transmission mode is also known as a directional mode.
 The transmission mode is defined in the physical layer.

Three Categories of Transmission Modes


 Simplex Mode
 Half-duplex Mode
 Full-duplex Mode

Simplex Mode

  In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
 A device can only send the data but cannot receive it or it can receive the data but cannot send the
data.
 This transmission mode is not very popular as mainly communications require the two-way
exchange of data. The simplex mode is used in the business field as in sales that do not require
any corresponding reply.
 The radio station is a simplex channel as it transmits the signal to the listeners but never allows
them to transmit back.
 Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the
data from the user and monitor can only be used to display the data on the screen.
 The main advantage of the simplex mode is that the full capacity of the communication channel
can be utilized during transmission.

57 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Advantage:
the station can utilize the entire bandwidth of the communication channel, so that more data can be
transmitted at a time.

Disadvantage:
Communication is unidirectional, so it has no inter-communication between devices.

Half-Duplex Mode

 




 In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the
data as well.
 Messages flow in both the directions, but not at the same time.
 The entire bandwidth of the communication channel is utilized in one direction at a time.
 In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then the
receiver requests the sender to retransmit the data.
 A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and
another party listens. After a pause, the other speaks and first party listens. Speaking
simultaneously will create the distorted sound which cannot be understood.

Advantage:
Both the devices can send and receive the data and also can utilize the entire bandwidth of the
communication channel during the transmission of data.

Disadvantage:
When one device is sending the data, then another has to wait, this causes the delay in sending the data at
the right time.

Full-Duplex Mode
 In Full duplex mode, the communication is
bi-directional, i.e., the data flow in both the
directions.
 Both the stations can send and receive the
message simultaneously.

58 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
 Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and
another channel has traffic flowing in the opposite direction.
 The Full-duplex mode is the fastest mode of communication between devices.
 The most common example of the full-duplex mode is a telephone network. When two people are
communicating with each other by a telephone line, both can talk and listen at the same time.

Advantage:
Both the stations can send and receive the data at the same time.

Disadvantage:
If there is no dedicated path exists between the devices, then the capacity of the communication channel
is divided into two parts.

Difference Between Simplex, Half-Duplex, and Full-Duplex Mode


Basis for
Simplex mode Half-duplex mode Full-duplex mode
comparison
In simplex mode, the In half-duplex mode, In full-duplex mode, the
Direction of communication is the communication is communication is bidirectional.
communication unidirectional. bidirectional, but one at
a time.
A device can only send the Both the devices can Both the devices can send and
data but cannot receive it or send and receive the receive the data simultaneously.
Send/Receive
it can only receive the data data, but one at a time.
but cannot send it.
The performance of half- The performance of The Full-duplex mode has better
duplex mode is better than full-duplex mode is performance among simplex and
Performance the simplex mode. better than the half- half-duplex mode as it doubles the
duplex mode. utilization of the capacity of the
communication channel.
Examples of Simplex mode Example of half-duplex Example of the Full-duplex mode is
Example are radio, keyboard, and is Walkie-Talkies. a telephone network.
monitor.

References:
https://www.computerhope.com/issues/ch000561.htm#download
https://edu.gcfglobal.org/en/basic-computer-skills/installing-software-on-your-windows-pc/1/
https://www.computerhope.com/jargon/u/update.htm
https://edu.gcfglobal.org/en/basic-computer-skills/how-to-update-your-software/1/
https://blog.capterra.com/virtualization-software/
https://www.computerhope.com/jargon/d/diskmana.htm
https://techterms.com/definition/antivirus
https://www.windowscentral.com/how-properly-update-device-drivers-windows-10
https://www.techopedia.com/definition/27130/software-license-agreement
https://www.guru99.com/stress-testing-tutorial.html
https://mybay.baycollege.edu/ICS/icsfs/NetFund_PPT_2.3_B.pdf?target=578103c3-a955-4549-9477-836356bfc2b5
https://www.slideshare.net/uncleRhyme/networkmedia-presentation1
https://techterms.com/definition/modem
https://www.techopedia.com/definition/2249/patch-panel
https://www.techopedia.com/definition/13454/unshielded-twisted-pair-cable-utp
https://homenetworkgeek.com/6-network-installation-tools-you-should-own/

59 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
https://techterms.com/definition/rj45
https://www.wikihow.com/Make-a-Network-Cable
https://www.cablesys.com/updates/install-network-patch-panel-switch/
https://www.cableorganizer.com/surface-raceways/
https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
https://www.dnsstuff.com/what-is-network-topology
https://www.javatpoint.com/computer-network-transmission-modes

60 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.

You might also like