CSS Module Q3
CSS Module Q3
SYSTEM
SERVICING NCII
QUARTER 3
Grade: 11
Learning Objectives:
At the end of this lesson, the students should be able to:
INTRODUCTION
THE COMPUTER
Computer is an electronic device that receives input, stores or processes the input as per user instructions
and provides output in desired format.
A computer is a programmable device that stores, retrieves, and processes data. You can use a computer
to type documents, send email, play games, and browse the Web. You can also use it to edit or create
spreadsheets, presentations, and even videos.
Software - is any set of instructions that tells the hardware what to do and how to do it.
Examples: web browser, games, word processor.
GENERATIONS OF COMPUTERS
First Generation (1940-1956) Vacuum Tubes
Vacuum tubes were larger components and resulted in first generation computers being quite
large in size, taking up a lot of space in a room.
The supercomputers are very expensive and very large in size. It can be accommodated in large
air-conditioned rooms; some super computers can span an entire building. The most powerful
computers in terms of performance and data processing are the Supercomputers. These are
specialized and task specific computers used by large organizations.
Mainframe Computer
Mainframe computers are designed to support hundreds or thousands of users simultaneously.
They can support multiple programs at the same time. It means they can execute different
processes simultaneously.
Mainframe computers can be accommodated in large air-conditioned rooms because of its size.
Super-computers are the fastest computers with large data storage capacity, Mainframes can also
process & store large amount of data. Banks educational institutions & insurance companies use
mainframe computers to store data about their customers, students & insurance policy holders.
Mini Computer
It is a midsize multiprocessing computer. It consists of two or more processors and can support 4
to 200 users at one time. Mainframe computers are used in institutes and departments for tasks
such as billing, accounting and inventory management. A minicomputer lies between the
mainframe and microcomputer as it is smaller than mainframe but larger than a microcomputer.
Workstation
Workstation is a single user computer that is designed for technical or scientific applications. It
has a faster microprocessor, a large amount of RAM and high-speed graphic adapters. It generally
performs a specific job with great expertise; accordingly, they are of different types such as
graphics workstation, music workstation and engineering design workstation.
Microcomputer
Microcomputer is also known as a personal computer. It is a general-purpose computer that is
designed for individual use. It has a microprocessor as a central processing unit, memory, storage
area, input unit and output unit.
The micro-computers are widely used & the fastest growing computers. These computers are the
cheapest among the other three types of computers. The Micro-computers are specially designed
for general usage like entertainment, education and work purposes.
Examples: Desktop, Laptops, PDA, Tablets, Smartphones.
Desktop Computers
Many people use desktop computers at work, home, and school. Desktop computers are designed to be
placed on a desk, and they're typically made up of a few different parts, including the computer case,
monitor, keyboard, and mouse.
Laptop Computers
The second type of computer you may be familiar with is a laptop computer, commonly called a laptop.
Laptops are battery-powered computers that are more portable than desktops, allowing you to use them
almost anywhere.
Tablet Computers
Tablet computers—or tablets—are handheld computers that are even more portable than laptops.
Instead of a keyboard and mouse, tablets use a touch-sensitive screen for typing and navigation. The
iPad is an example of a tablet.
Servers
A server is a computer that serves up information to other computers on a network. For example,
whenever you use the Internet, you're looking at something that's stored on a server. Many businesses also
use local file servers to store and share files internally.
Smartphones
Many cell phones can do a lot of things computers can do, including browsing the Internet and playing
games.
Wearables
Wearable technology is a general term for a group of devices—including fitness trackers and
smartwatches—that are designed to be worn throughout the day.
Game Consoles
A game console is a specialized type of computer that is used for playing video games on your TV.
TVs
Many TVs now include applications—or apps—that let you access various types of online content. For
example, you can stream video from the Internet directly onto your TV.
MAC
The Macintosh computer was introduced in 1984, and it was the first widely sold personal
computer with a graphical user interface, or GUI (pronounced gooey). All Macs are made by one
company (Apple), and they almost always use the Mac OS X operating system.
COMPUTER COMPONENTS
Input Devices - Input device enables the user to send data, information, or control signals to a computer.
The Central Processing Unit (CPU) of a computer receives the input and processes it to produce the
output.
Examples: Keyboard, mouse, scanner
Output Devices - The output device displays the result of the processing of raw data that is entered in the
computer through an input device. There are a number of output devices that display output in different
ways such as text, images, hard copies, and audio or video.
Examples: Monitor, printer, Projector
Processor - A Central Processing Unit is also called a processor, central processor, or microprocessor.
It carries out all the important functions of a computer. It receives instructions from both the hardware
and active software and produces output accordingly. It stores all important programs like operating
systems and application software. CPU also helps Input and output devices to communicate with each
other. Owing to these features of CPU, it is often referred to as the brain of the computer.
Storage Devices - Alternatively referred to as digital storage, storage, storage media, or storage
medium, a storage device is any hardware capable of holding information either temporarily or
permanently.
Secondary or Long Term Storage - referred to as external memory, secondary memory, and
auxiliary storage, a secondary storage device is a non-volatile device that holds data until it is
deleted or overwritten.
Examples: Hard Disk Drive, Flash Disk Drive, Memory Card
System Unit
It is referred to as a box, main unit, and system box, a system unit is the case that contains all the main
parts of a computer. It is also called Computer Case, Computer Chassis or Computer Tower.
Monitor
The monitor works with a video card, located inside the computer case, to display images and text on
the screen. Most monitors have control buttons that allow you to change your monitor's display settings,
and some monitors also have built-in speakers
LCD (Liquid Crystal Display) - is a flat display technology used in laptops, cell phones,
calculators, digital cameras, and flat screen displays. The LCD is made of two sheets of a flexible
polarizing material and a layer of liquid crystal solution between the two.
Keyboard
A computer keyboard is one of the primary input devices used with a computer. Similar to an electric
typewriter, a keyboard is composed of buttons that create letters, numbers, and symbols, as well as other
functions.
Parts of Keyboard: Function keys, control keys, typing (alphanumeric keys), navigation keys
and numeric keypad
Modem
A modem or broadband modem is a hardware device that connects a computer or router to a broadband
network.
Mouse
A computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user
interface) and can move and select text, icons, files, and folders on your computer. Commonly known as a
pointing device, it lets you point to objects on the screen, click on them, and move them.
Types of Mouse
Trackball - A trackball has a ball that can rotate freely. Instead of moving the device like a
mouse, you can roll the ball with your thumb to move the pointer.
Speaker
A computer speaker is an output hardware device that connects to a computer to generate sound. The
signal used to produce the sound that comes from a computer speaker is created by the computer's sound
card.
Scanner
A scanner or optical scanner is a hardware input device that optically "reads" and image and converts it
into a digital signal. A scanner may be used to convert a printed picture, drawing, or document (hard
copy) into a digital file which can be edited on a computer.
Printer
A printer is an external hardware output device that takes the electronic data stored on a computer or
other device and generates a hard copy of it.
Types of Printer
3D printer - is a device that creates a physical object from a digital model by layering materials.
3D printers use materials, such as metal alloys, polymers, plastics, or even food ingredients.
AIO (All-in-One) - also known as MFP (multifunction printer). AIO describes a hardware
device such as an All-in-One printer that is a printer, fax, and scanner all in one device.
Inkjet Printer - The most popular printer for home computer users that prints by spraying
streams of quick-drying ink on paper. The ink is stored in disposable ink cartridges, and often a
separate cartridge is used for each of the major colors. These colors are usually CMYK (cyan,
magenta, yellow, and black).
Laser Printer - Laser printers are often used for corporate, school, and other environments that
require print jobs to be completed quickly and in large quantities.
Thermal Printer - A thermal impact printer or electrothermal printer is a printer that uses
heated pins to "burn" images onto heat-sensitive paper. A thermal printer, thermal transfer
printer, or thermal wax-transfer printer uses thermal wax ribbon to melt colored wax on paper
for a photo print.
Topic: Motherboard
Learning Objectives:
At the end of this lesson, the students should be able to:
Motherboard
The motherboard is a printed circuit board and foundation of a computer that is the biggest board in a
computer chassis. The motherboard serves as a single platform to connect all of the parts of a computer
together. It can be considered as the backbone of a computer.
Form Factors
When referring to computer hardware, a form factor is a specification for its layout and physical
dimensions. Form factors help prevent incompatibilities between multiple hardware manufacturers.
There are different types of form factors of the motherboard, which are as follows:
AT & Baby AT: Before 1997, a very large motherboard was used by IBM computers. Later,
with the time, the motherboard size was reduced and released an extended motherboard using AT
(Advanced Technology) form factor.
ATX: It stands for Advanced Technology eXtended, which was first released by Intel in July
1995. It is a specification that is used to outline the motherboard and dimension to improve
standardization.
BTX (Balanced Technology Extended): BTX is a motherboard form factor that was announced
for the replacement of the ATX on 17 September 2003. The BTX includes features such as a
more efficient layout to facilitate cooling, low profile, support for high-mass motherboard
components, and a scalable board to accommodate several system sizes.
Micro ATX - It is an evolution of ATX. Its measures are 9.6 × 9.6 inches. The Micro-ATX
supports up to four expansion slots that can combine freely with ISA, PCI, PCI / ISA shared, and
AGP. Mounting holes changed from the Standard ATX, since the measurements are different, but
they are also compatible with most ATX cabinets. This type of motherboard form factor supports
both Intel and AMD processors. It is commonly used on Small Form Factor Desktop Computers.
Mini-ITX - Mini ITX is a low-power consumption motherboard format of 6.7 × 6.7 inches. Its
dimensions are the most characteristic factor of this type of form factor. Although this type of
motherboard was designed with the aim of empowering teams of low consumption, at present
10 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
there are no limits and they have grown by giant steps in terms of benefits. Mini ITX is a standard
format for all types of equipment, such as vehicle embedded computers, industrial applications,
and IoT. The Mini-ITX is the first standard system of reduced format that is popularized,
reaching all types of projects and any equipment where it may be necessary.
Nano-ITX - The Nano-ITX is another type of motherboard form factor, that measures 4.7 × 4.7
in. Nano-ITX are fully integrated boards designed to consume very low power. This type of
motherboard can be used in many applications, but it was specially designed for smart
entertainment, like PVRs, media centers, smart TVs, in-vehicle devices, and more.
Pico-ITX - The Pico-ITX is the smallest type of motherboard form factor in this list. Its
measurements are 3.9 × 2.8 in and it is 75% smaller than the Mini-ITX. This motherboard was
designed and developed by VIA, to open up innovation for smaller and smarter IoT devices. The
Pico-ITX with an x86-based-platform and low-power consumption board is a great choice for
embedded systems applications, such as industrial automation, in-vehicle computers, digital
signage, and more.
Types of RAM
SRAM – Static Random Access Memory uses
multiple transistors, typically four to six, for each
memory cell but doesn't have a capacitor in each cell.
It is used primarily for cache.
DRAM - Dynamic Random Access Memory has
memory cells with a paired transistor and capacitor
requiring constant refreshing.
FPM DRAM - Fast page mode Dynamic Random
Access Memory was the original form of DRAM. It
Figure 6: Different Types of RAM
11 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
waits through the entire process of locating a bit of data by column and row and then reading the
bit before it starts on the next bit. Maximum transfer rate to L2 cache is approximately 176
MBps.
EDO RAM - Extended data-out Dynamic Random Access Memory does not wait for all of
the processing of the first bit before continuing to the next one. As soon as the address of the first
bit is located, EDO DRAM begins looking for the next bit. It is about five percent faster than
FPM. Maximum transfer rate to L2 cache is approximately 264 MBps.
SDRAM - Synchronous Dynamic Random Access Memory takes advantage of the burst mode
concept to greatly improve performance. It does this by staying on the row containing the
requested bit and moving rapidly through the columns, reading each bit as it goes. The idea is that
most of the time the data needed by the CPU will be in sequence. SDRAM is about five percent
faster than EDO RAM and is the most common form in desktops today. Maximum transfer rate to
L2 cache is approximately 528 MBps.
DDR SDRAM - Double Data Rate Synchronous Dynamic RAM is just like SDRAM except
that is has higher bandwidth, meaning greater speed. Maximum transfer rate to L2 cache is
approximately 1,064 MBps (for DDR SDRAM 133 MHZ).
RDRAM - Rambus Dynamic Random Access Memory is a radical departure from the previous
DRAM architecture. Designed by Rambus, RDRAM uses a Rambus in-line memory module
(RIMM), which is similar in size and pin configuration to a standard DIMM. What makes
RDRAM so different is its use of a special high-speed data bus called the Rambus channel.
RDRAM memory chips work in parallel to achieve a data rate of 800 MHz, or 1,600 MBps.
Since they operate at such high speeds, they generate much more heat than other types of chips.
Internal Storage
Hard Disk Drive (HDD) - use magnetic storage disk inside to store data.
Hybrid Hard Drive (HHD) - is a combination of hard disk drive and solid-state drive
technology.
Solid State Drive (SSD) - used non-volatile memory to store data.
External Storage
USB Flash Drive, Data Stick, Pen Drive – is a portable drive that is often size of your thumb
that connects to the computer USB port.
CD, CD-R, CD-RW (compact Disc) – is a flat round storage medium the is read by laser in CD-
ROM.
DVD, DVD-R, DVD-RW (digital versatile disc) – is a disc capable of storing a large amount of
data on one disc the size of standard compact disc.
Blue Ray Disc – is an optical disc that is capable of storing 25GB.
12 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
EIDE / PATA – Enhanced Integrated Drive Electronics / Parallel Advanced Technology
Attachement
S-ATA – Serial Advanced Technology Attachment
Power Supply Unit (PSU) - is a hardware component of a computer that supplies all other components
with power.
Computer Ports
a hardware port or peripheral port is a hole or connection found on the front or back of a computer.
13 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
a. Prepare the workspace before opening the computer case.
2. Install the Power Supply
a. Insert the power supply into the case.
b. Align the holes in the power supply with the holes in the case.
c. Secure the power supply to the case using the proper screws. Figure 9: Open Computer Case
3. Attach Component to the Motherboard
a. CPU on Motherboard
The CPU and motherboard are sensitive to electrostatic
discharge.
The CPU is secured to the socket on the motherboard with a
locking assembly.
CAUTION: When handling a CPU, do not touch the CPU Figure 10: Install the
contacts. Power supply
b. Thermal compound
It helps to keep the CPU cool.
To install a used CPU, clean it and the base of the heat sink with isopropyl alcohol to
remove the old thermal compound.
c. Heat Sink/Fan Assembly
The Heat Sink/Fan Assembly is a two-part cooling device.
The heat sink draws heat away from the CPU.
d. Install RAM
RAM provides temporary data storage for the CPU and should be installed in the
motherboard before the motherboard is placed in the computer case.
Figure 11a: Figure 11b: Figure 11c: Heat Sink Figure 11d:
Install RAM
CPU in Motherboard Thermal Compound
The Motherboard
a. After installing the previous components, the motherboard is now ready to install in the
computer case.
b. Plastic and metal standoffs are used to mount the motherboard and to prevent it from
touching the metal portions of the case.
14 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Position the HDD so that it aligns with the 3.5-inch drive bay.
Insert the HDD into the drive bay so that the screw holes in the drive line up with the
screw holes in the case.
Secure the HDD to the case using the proper screws. Figure 13: Install Internal Drives
5. Install Drives in External Bays
a. Some devices that are installed in this type of drives are:
b. Drives in external bays allow access to the media without opening the
case.
An optical drive is a storage device that reads and writes information
to CDs or DVDs.
A floppy disk drive (FDD) is a storage device that reads and writes
information to a floppy disk. Figure 14: Install
6. Install Adapter Cards Drive in External
a. Adapter cards are installed to add functionality to a computer. Bays
b. Some examples of these adapters are:
A NIC which enables a computer to connect to a network. It uses PCI and PCIe
expansion slots on the motherboard.
A wireless NIC which enables a computer to connect to a wireless network. Wireless
NICs use PCI and PCIe expansion slots on the motherboard. Some wireless NICs are
installed externally with a USB connector.
A video adapter card is the interface between a computer and a display monitor. An
upgraded video adapter card can provide better graphic capabilities for games and
graphic programs. Video adapter cards use PCI, AGP, and PCIe expansion slots on the
motherboard.
7. Connect Internal Cables
a. Power cables are used to distribute electricity from the power supply to the motherboard and
other components.
b. Data cables transmit data between the motherboard and storage devices, such as hard drives.
Some of examples of this type of cables are:
PATA cable
SATA cable
Floppy drive data cable
c. Additional cables connect the buttons and link lights on the front of the computer case to the
motherboard.
15 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Connect External Cables: These cables are normally connected to the back of the
computer. Here are some common external cable connections: Monitor, Keyboard,
Mouse, USB, Ethernet Power.
9. Boot the Computer for the First Time
a. When the computer is booted, the basic input/output system (BIOS) will perform a power-on
self-test (POST) to check on all of the internal components.
b. The BIOS contains a setup program used to configure settings for hardware devices. The
configuration data is saved to a special memory chip called a complementary metal-oxide
semiconductor (CMOS).
c. POST checks to see that all of the hardware in the computer is operating correctly. If a
device is malfunctioning, an error or a beep code alerts the technician that there is a problem.
Expansion Slots
An expansion slot is connection or port located inside a computer on the motherboard or riser board that
allows a computer hardware expansion card to be connected. Also known as a bus slot or expansion
port.
PCI Express - The best type of expansion slot to have in your PC is the PCI Express, also written as
PCIe. Without boring you, the PCI Express type of expansion slot communicates with the motherboard,
and therefore with the microprocessor, both quickly and efficiently.
PCI - The PCI slot is the most common form of internal expansion for a PC. Some PCs have a mixture of
PCI and PCI Express slots. If so, go with PCI Express when you have that option.
AGP - This type of expansion slot was specifically designed to deal with graphics adapters. In fact, AGP
stands for Accelerated Graphics Port. Older PCs may sport this expansion slot, but the best video cards
use PCI Express.
ISA - The most ancient type of expansion slot is the ISA, which stands for (get this) Industry Standard
Architecture. That’s because it never really had a name until another, better type of expansion slot came
along. ISA slots hang around to be compatible with older expansion cards.
AMR - short for audio/modem riser, allows OEMs to make one card with the functionality of either a
Modem or audio or both as one card.
CNR - Short for Communication and Network Riser, CNR is a specification that supports Audio,
Modem, USB, and LAN interfaces of core logic chipsets.
16 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Different Types of Expansion Cards
Video Card
Also known as a display adapter, graphics card, video
adapter, video board, or video controller, a video card is an
expansion card that connects to a computer motherboard. It is
used to create a picture on a display; without a video card, you
would not be able to see this page. Video cards are used by
gamers in place of integrated graphics due to their extra
processing power and video ram. Figure 18: AGP Video Card
Sound Card
Is referred to as an audio output device, sound board, or audio card. A
sound card is an expansion card or IC for producing sound on a
computer that can be heard through speakers or headphones.
Figure 19: PCI-e Sound Card
NIC - Short for network interface card, the NIC is also referred to as an
Ethernet card and network adapter. A NIC is a computer expansion
card for connecting to a network using an Ethernet cable with an RJ-45
connector.
Figure 21: GUI for Smartphones Figure 22: GUI for Windows PC Figure 23: GUI
for MAC PC
17 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Grade: 11
Learning Objectives:
At the end of this lesson, the students should be able to:
SOFTWARE
Software is a collection of computer programs and related data that tells the instruction to a computer on
how to do or what to do.
18 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
1. System Software - System Software is a set of programs that control and manage the operations
of computer hardware. It also helps application programs to execute correctly.
System Software are designed to control the operation and extend the processing functionalities
of a computer system. System software makes the operation of a computer more fast, effective,
and secure. Example: Operating system, programming language, Communication software, etc.
2. Application Software - Application Software is a program that does real work for the user. It is
mostly created to perform a specific task for a user. Application Software acts as a mediator
between the end-user and System Software. It is also known as an application package.
Operating Systems
An operating system is the most important software that runs on a computer. It manages the computer's
memory and processes, as well as all of its software and hardware. It also allows you to communicate
with the computer without knowing how to speak the computer's language. Without an operating
system, a computer is useless.
Examples of Operating Systems
1. Microsoft Windows OS - Microsoft created the Windows operating system in the mid-1980s.
There have been many different versions of Windows, but the most recent ones are Windows 10
(released in 2015), Windows 8 (2012), Windows 7 (2009), and Windows Vista (2007).
Windows comes pre-loaded on most new PCs, which helps to make it the most popular
operating system in the world.
19 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
20 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
settings. Codename: Millenium
Windows 2000 made everyone's lives easier by increasing the number of plug
and play devices compatible with the operating system. Windows ME
Windows 2000
(Millennial Edition) was also released, offering the system recovery tool to
help return a crashed computer to its last known operating settings.
The system designed for ease and stability, Windows XP was released in 2001,
offering plenty of ease and functionality for laptop and desktop users. The
Windows XP operating system was designed to offer users help through a comprehensive
help center, and it gave users the ability to consume a number of different
types of media. Codename: Whistler
Widely considered a flop in technology circles, Windows Vista was released in
2006. It had high system requirements and suffered issues with performance
Windows Vista and security. The operating system also tended to drain laptop batteries. The
version lasted only for three years, during which some users downgraded
back to XP to avoid the pitfalls of Vista. Codename: Longhorn
For this current release of Windows, Microsoft learned its mistakes with Vista
and created an operating system with speed, stability and minimal system
Windows 7 requirements. Microsoft ditched the gadget bar from Vista, replacing it with a
cleaner feel. This version was released in 2009. Codename: Blackcomb,
Vienna
This latest Windows release is getting a lot of attention. With its redesigned
Metro-style user interface and Windows Store, this version is, once again,
redefining what Windows is. It also comes with integrated antivirus
protection, a virtual hard disk and a new platform based on HTML5 and
Windows 8
JavaScript. It promises faster boot time, touchscreen compatibility and the
ability to create a bootable USB flash drive. It may not be enough to get
people to switch from Windows 7, but at least it's a glimpse into the future of
the Windows operating system. Codename: Midori, 8.1: Blue
Windows 10 was released on September 30, 2014. It is the very latest version
of Windows and in the company that has installed all the features that they
were unable to do in the earlier version. Additionally, many new features are
being implemented continuously, which allows users to get all the latest
Windows 10 updates.
Windows 10 has brought the Start Menu in it, which is giving it a balanced
look, along with a traditional desktop computer user, it is also a very favorite
choice. It has included many interesting features as you can switch to the
keyboard mode, mouse mode, tablet mode.
2. MacOS - is an operating system designed for the Apple Macintosh computer. macOS
(previously called OS X) is a line of operating systems created by Apple. It comes preloaded on
all Macintosh computers, or Macs. Some of the specific versions include Mojave (released in
2018), High Sierra (2017), and Sierra (2016).
21 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
22 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
iOS to the Macintosh User Interface. It was released on July 25, 2012 from the
Mac App Store for $19.99.
OS X version 10.9, also known as “Mavericks”, is the tenth major release of
OS X, Apple Inc’s desktop and server operating system for Macintosh
computers. OS X Mavericks was released on October 22, 2013, as a free
Mac OS X 10.9 update through the Mac App Store. Mavericks marks the beginning of a
change in the naming scheme of OS X, departing from the use of big cats and
moving to names based on places in California. The new naming scheme also
removes the “Mac” prefix from the name.
OS X version 10.10, also known as “Yosemite”, is the eleventh major release
of OS X, Apple Inc’s desktop and server operating system for Macintosh
Mac OS X 10.10
computers. OS X Yosemite was released to the public on October 16, 2014, as
a free update through the Mac App Store.
OS X version 10.11, “El Capitan”, is the twelfth major release of OS X, Apple
Inc.’s desktop and server operating system for Macintosh computers. El
Mac OS X 10.11 Capitan was named after a rock formation in Yosemite National Park. OS X El
Capitan was released on September 30, 2015, as a free upgrade through the
Mac App Store.
macOS 10.12 Sierra is the thirteenth major release of OS X, renamed macOS,
Apple’s desktop and server operating system for Macintosh computers. It was
Mac OS X 10.12 released September 20, 2016 as a free upgrade through the Mac App Store.
Sierra was named after the entire Sierra Nevada mountain range that includes
Yosemite National Park and Lake Tahoe.
macOS 10.13 High Sierra is the fourteenth major release of OS X, renamed
macOS, Apple’s desktop and server operating system for Macintosh
Mac OS X 10.13 computers. It was released on September 25, 2017, as a free upgrade through
the Mac App Store. High Sierra was named after the High Sierras in the Sierra
Nevada mountain range.
macOS 10.14 Mojave, released on September 24, 2018, is the fifteenth major
release of OS X, renamed macOS, Apple’s desktop and server operating
Mac OS X 10.14
system for Macintosh computers. Mojave was named after the Mojave
Desert.
macOS 10.15 Catalina, released on October 7, 2019, is the sixteenth major
release of OS X, renamed macOS, Apple’s desktop and server operating
Mac OS X 10.15
system for Macintosh computers. Catalina was named after Santa Catalina
Island, located in Southern California.
23 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
24 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Southern African philosophy of ubuntu (literally, "human-ness"). October
2004 Developed by: Mark Shuttleworth and Canonical Ltd.
Lightweight and secure by default while still being useful for general-purpose
Alpine tasks. Compiles all packages with stack-smashing protection. 2006 Developed
by: Alpine Linux development team
Based on Red Hat Enterprise Linux (RHEL), repackaged and freely distributed
Oracle by Oracle. Oracle Linux supports KVM and Xen. October 2006 Developed by:
Oracle Corporation
Collection of software for audio production, graphic design, video editing and
general-purpose applications. Documentation is in Spanish. December 2006
Musix
Developed by: Marcos Germán Guglielmetti. And teams from Argentina,
Spain, Mexico and Brazil.
Android is designed primarily for touchscreen mobile devices such as
Android smartphones and tablet computers. The most widely used mobile OS.
September 2008 Developed by: Google, and Open Handset Alliance
A secure, and sustainable operating system, designed to set up a stable and
Mageia trustable governance to direct collaborative projects. Uses all major desktop
environments June 2011 Developed by: Former employees of Mandriva
Platforms of Mobile OS
1. Android OS: The Android operating system is the most popular operating system today. It is a
mobile OS based on the Linux Kernel and open-source software. The android operating system
was developed by Google. The first Android device was launched in 2008.
25 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
3. iPhone OS / iOS: The iOS was developed by the Apple Inc for the use on its device. The iOS
operating system is the most popular operating system today. It is a very secure operating system.
The iOS operating system is not available for any other mobiles.
4. Symbian OS: Symbian operating system is a mobile operating system that provides Figure 30: IOS
a high-level of integration with communication. The Symbian
operating system is based on the java language. It combines
middleware of wireless communications and personal information
management (PIM) functionality. The Symbian operating system was
developed by Symbian Ltd in 1998 for the use of mobile phones.
Nokia was the first company to release Symbian OS on its mobile Figure 31: Symbian OS
phone at that time.
5. Windows Mobile OS: The window mobile OS is a mobile operating system that
was developed by Microsoft. It was designed for the pocket PCs and smart
mobiles.
Code name Version numbers API level Release date Figure 32: Windows Mobile
No codename 1.0 1 September 23, 2008
No codename 1.1 2 February 9, 2009
Cupcake 1.5 3 April 27, 2009
Donut 1.6 4 September 15, 2009
Eclair 2.0 - 2.1 5-7 October 26, 2009
Froyo 2.2 - 2.2.3 8 May 20, 2010
Gingerbread 2.3 - 2.3.7 9 - 10 December 6, 2010
Honeycomb 3.0 - 3.2.6 11 - 13 February 22, 2011
Ice Cream Sandwich 4.0 - 4.0.4 14 - 15 October 18, 2011
Jelly Bean 4.1 - 4.3.1 16 - 18 July 9, 2012
KitKat 4.4 - 4.4.4 19 - 20 October 31, 2013
Lollipop 5.0 - 5.1.1 21- 22 November 12, 2014
Marshmallow 6.0 - 6.0.1 23 October 5, 2015
Nougat 7.0 24 August 22, 2016
Nougat 7.1.0 - 7.1.2 25 October 4, 2016
Oreo 8.0 26 August 21, 2017
Oreo 8.1 27 December 5, 2017
Pie 9.0 28 August 6, 2018
Android 10 10.0 29 September 3, 2019
Application Software
Application software allows end-user to Accomplish one or more tasks. As a user of technology,
application software or ‘apps’ are what you engage with the most. These types of computer software are
productive end-user programs that help you perform tasks. Following are some examples of application
software that allow you to do specific work:
MS Excel: It is spreadsheet software that you can use for presenting and analyzing data.
Photoshop: It is a photo editing application software by Adobe. You can use it to visually
enhance, catalogue and share your pictures.
26 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Skype: It is an online communication app that you can use for video chat, voice calling and
instant messaging.
Categories of Software
Freeware - Freeware software is any software that is available to use for free. They can be downloaded
and installed over the internet without any cost. Some well-known examples of freeware are:
Google Chrome
Skype
Instagram
Snapchat
Adobe reader
Although they all fall under the category of Application or end-user software, they can further be
categorized as freeware because they are free for you to use.
Shareware - shareware, on the other hand, are software applications that are paid programs, but are made
available for free for a limited period of time known as ‘trial period’. You can use the software without
any charges for the trial period but you will be asked to purchase it for use after the trial ends. Shareware
allows you to test drive the software before you actually invest in purchasing it. Some examples of
Shareware that you must be familiar with are:
Adobe PhotoShop
Adobe Illustrator
Netflix App
Matlab
McAfee Antivirus
27 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
This is a type of software that has an open-source code that is available to use for all users. It can be
modified and shared with anyone for any purpose. Common examples of open source software used by
programmers are:
LibreOffice
PHP
GNU Image Manipulation Program (GIMP)
Utility Software
Utility software is considered a subgroup of system software. They manage the performance of your
hardware and application software installed on your computer, to ensure they work optimally. Some
features of utility software include:
Antivirus and security software
File compressor
Disk cleaner
Disk defragmentation software
Data backup software
What is Booting?
The term “Booting” refers to the process in which your computer runs a set of instruction when the
power is switched ON. This process loads the Operating System into the computer main memory. Once
after this has been done, you can able to see the windows desktop and run applications.
Types of Booting
28 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Cold Booting – When you are booting your computer after shutdown, then it is known as Cold
Booting.
Warm Booting – When you restarting your computer, then it is called as Warm Booting.
Diskpart can be used to create a partition larger than 2Gb on the USB flash drive so larger files can be
used. Diskpart is a Disk Partition utility available within Windows.
Please follow the steps in the next section on how to use Diskpart to create a bootable Windows USB
flash drive:
Note: You will need a 4Gb minimum USB flash drive and your Windows re-installation DVD
Using Diskpart
1. Insert your USB flash drive (4Gb + preferable) into your system
Warning: All data on the USB flash drive will be lost, make sure you save any data before proceeding.
2. Navigate to the Command Prompt. Select Start & type CMD in
the search field, right click on CMD.exe and select Run as
administrator Alternatively, navigate to Start > All programs
> Accessories > right click on Command Prompt and select Run
as administrator
3. A User Account Control (UAC) dialog Window may appear.
Click Yes to Continue.
4. When the Command Prompt opens, enter the following
commands followed by Enter
5. DISKPART - This will start the utility
6. LIST DISK - This will show the disk number of your USB flash
drive. In the image below the USB flash drive shows as Disk 2.
7. SELECT DISK X (Replace X with your USB flash drive
number, we are using 2 in this example) Figure 34: Instruction number 2
8. CLEAN - This wipes the drive using Diskpart
29 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
9. CREATE PARTITION PRIMARY- Creates partition
10. SELECT PARTITION 1- Selects partition 1
11. ACTIVE- Marks the current partition as active
12. FORMAT FS=NTFS QUICK - This formats
the partition
13. ASSIGN- Assigns a drive letter.
14. EXIT
Insert your Windows DVD into the optical drive. From
the command prompt, enter the following:
g: <enter> (Where "g" is your DVD drive letter)
cd boot <enter> (changes to boot directory)
Figure 35: Instructions 5-14
G:\boot bootsect /nt60 d: <enter> (Where "d" is your USB drive
using Diskpart
letter)
Copy all files from the Windows CD to the USB flash drive using xcopy
cd\ <enter>
G:\xcopy g:\*.* /s/h/f f:\ <enter>
This will copy the Windows installation files onto the USB flash drive, it may take several minutes.
xcopy switches are as follows:
Device Driver
in computing refers to a special kind of software program or a specific type of software application which
controls a specific hardware device that enables different hardware devices for communication with the
computer’s Operating System. A device driver communicates with the computer hardware by computer
subsystem or computer bus connected to the hardware.
Device Drivers are very essential for a computer system to work properly because without device driver
the particular hardware fails to work accordingly means it fails in doing a particular function/action for
which it has been created.
In a
very
30 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
common way, most term it as only a Driver also when someone says Hardware Driver that also refers
to this Device Driver.
1. Kernel-mode Device Driver –This Kernel-mode device driver includes some generic hardware
which loads with operating System as part the OS these are BIOS, motherboard, processor and
some other hardware which are part of kernel software. These includes the minimum system
requirement device drivers for each operating system.
2. User-mode Device Driver – Other than the devices which are brought by kernel for working of
the system the user also brings some devices for use during the using of a system that devices
need device drivers to functions those drivers falls under User mode device driver. For example,
user needs any plug and play action that comes under this.
31 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Example: Printer is not able to print a document without the presence of its required driver.
Learning Objectives:
At the end of this lesson, the students should be able to:
32 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Warning: This is a friendly reminder that this process will erase everything on your computer. It's always
recommended to make a temporary full backup of your PC before proceeding.
33 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
12. Select the partition with the current installation (usually "Drive 0"), and click the Delete button.
Quick tip: If "Drive 0" has multiple partitions, you have to select and delete each of the partitions
to allow the setup to use the entire drive for the new clean installation. Windows 10 will create
the required partitions automatically during the process. It's not necessary to delete the partitions
on secondary drives.
13. Click the Yes button.
14. Select the empty drive (Drive 0 Unallocated Space).
15. Click the Next button.
This guide follows the out-of-box experience available with Windows 10 version 2004 (May 2020
Update), but depending on the release you are trying to install; the steps may be slightly different.
To complete the OOBE on a new install of Windows 10, use these steps:
34 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
7. Click the Next button.
8. Type your Microsoft account information to create an account.
Quick note: The recommended process is to use a Microsoft account. However, if you want to
use a traditional local account, you'll need to click the Offline account option from the bottom-
left corner, and then continue with the on-screen directions.
9. Click the Next button.
10. Type your Microsoft account password. Or if you use your phone to sign in to Microsoft services,
you can click the Use the Microsoft Authenticator app instead option (if available).
11. Click the Next button.
16. Click the No, thanks button to skip the Microsoft 365 setup (if applicable).
Quick tip: If you have an Office product key, you can click the I have a product key option, and
then the apps will install automatically on your device.
17. Click the Accept button to allow Microsoft to collect personal information to make Cortana more
personal. If you're not interested in the digital assistant, click the Not now button to continue
35 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
After you complete the steps, the settings you selected will apply to the clean installation, and you should
be able to see the default desktop experience.
INSTALLING WINDOWS SERVER 2008 R2 (USING BOOTABLE FLASH DRIVE)
Requirements:
1. Flash Drive - recommended size is 8gb.
2. RUFUS - bootable flash drive creator. Download it here -RUFUS 1.4.9
3. Image file of Window Server 2008 R2.
4. Computer compatible with Windows Server 2008 R2 (Refer to your motherboard manual for this)
5. Lot of time and patience.
Steps:
1. Insert the bootable flash drive on your desktop computer and access the BIOS and look for the
boot setting option. Other BIOS might look different so just look for any option relating to boot.
Below the pictures show two options in boot settings: one is Boot Device Priority and the other
one is Hard Drive Option. Choose Hard Disk Drive Option.
2. Select USB drive as your priority drive to boot.
3. Go back to Boot device priority and Choose USB drive as 1st Boot Device.
4. Save the configuration and choose OK.
36 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
37 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
23. The Windows will now load the operating system after the restart.
24. Setup is preparing your computer for first use. On this screen, wait until the desktop appear.
25. Before logging on, Windows Server 2008 will allow you to create the user’s password that you
will use every time you log on.
26. After creating a password, click the right arrow button or press enter to continue.
27. Click OK after changing the password.
28. Preparing your desktop. Just wait until the next screen appear.
29. Press CTRL + ALT + DELETE key to start logging on.
30. Type the administrator password that you created.
31. The Initial Configuration Tasks window will appear on the desktop. The next thing to do is to
check the drivers on device manager if properly installed.
References:
https://edu.gcfglobal.org/en/computerbasics/what-is-a-computer/1/
http://byte-notes.com/four-types-computers/
https://www.javatpoint.com/types-of-computer
https://www.computerhope.com/issues/ch001921.htm
https://www.lanner-america.com/blog/types-motherboard-form-factors/
https://www.geeksforgeeks.org/different-types-ram-random-access-memory/
https://computer.howstuffworks.com/ram.htm
https://sir-sherwin.blogspot.com/2010/06/parts-of-system-unit.html
https://www.computerhope.com/jargon/p/power-supply.htm
https://www.computerhope.com/jargon/p/port.htm
https://www.electronicshub.org/types-of-computer-ports/#PS/2
https://www.lifewire.com/operating-systems-2625912
https://edu.gcfglobal.org/en/computerbasics/understanding-operating-systems/1/
https://www.matsuk12.us/cms/lib/ak01000953/centricity/domain/2740/ite_pc_v41_chapter3.pdf
https://www.computerhope.com/jargon/v/video-card.htm
https://asmed.com/comptia-a-pc-expansion-slots/
https://www.computerhope.com/jargon/c/cnr.htm
https://www.computerhope.com/jargon/a/amr.htm
https://www.omnisci.com/technical-glossary/graphical-user-interface
https://www.guru99.com/difference-system-software-application-software.html
http://technology350.blogspot.com/2015/01/brief-history-of-windows.html
https://medium.com/@CMadu/evolution-of-mac-os-4b7b5eeb02b5
https://www.slideshare.net/DamianGordon1/operating-systems-versions-of-linux
https://www.javatpoint.com/mobile-operating-system
https://www.javatpoint.com/android-versions
http://www.tokeepmypcup.com/definitions/what_is_booting/
https://appuals.com/how-to-create-windows-10-bootable-usb-using-rufus/
38 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
https://www.dell.com/support/article/en-ph/sln153364/create-a-bootable-usb-flash-drive-using-the-
diskpart-utility?lang=en
https://www.geeksforgeeks.org/device-driver-and-its-purpose/
https://www.goodcore.co.uk/blog/types-of-software/
https://edu.gcfglobal.org/en/computerbasics/understanding-applications/1/
https://www.golurn.com/COC1_LO2/content/assets/1w3LhevVoWrJmqLU_KS52WkcjTcuyEXzp-
DRIVER.pdf
https://www.windowscentral.com/how-do-clean-installation-windows-10
https://sir-sherwin.blogspot.com/2010/08/software.html#win7
Videos:
Computer Basics - https://youtu.be/Cu3R5it4cQs
Inside a Computer - https://youtu.be/HB4I2CgkcCo\
Setting up Desktop Computer - https://youtu.be/RnM3u99xIf4
Understanding Operating System - https://youtu.be/fkGCLIQx1MI
-end-
Learning Objectives:
At the end of this lesson, the students should be able to:
If AutoPlay is disabled on your computer or unavailable on the software disc, follow these steps.
1. Open My Computer.
2. In the My Computer window, open the drive that contains the installation files. For example, if
the files are on the CD-ROM drive, open the D: drive or letter of your CD-ROM drive.
39 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
3. In the drive that contains your files, locate either the executable setup (i.e., "setup.exe") or install
file. Double-clicking this file starts the installation process. If there are multiple setups or install
files, locate the executable file or double-click each setup or install file until you find the file that
starts the installation.
If the program is not available for download, copy all the CD or DVD contents to another drive on
another computer. For example, you could copy the contents of the disc to a USB flash drive and then
install the program from the USB flash drive.
40 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Install from Download
1. Click the Finder icon on the Dock at the bottom of the screen.
2. On the left side of the window that appears, under the Favorites section, click the DOWNLOAD
selector.
3. Locate the program you'd like to install and double-click it.
4. Follow the guided instructions to install the program.
5. Once the program is installed, drag it to the Applications folder and delete the installation file (in
this case, FileZilla_3.49_macosx-x86.app.tar.bz2).
6. Click the APPLICATION selector to see the program you installed.
SOFTWARE UPDATE
An update is new, improved, or fixed software, which replaces older versions of the same software. For
example, updating your operating system brings it up-to-date with the latest drivers, system utilities, and
security software. Updates are often provided by the software publisher free of additional charge.
Updating a Program
There is no standard for how software programs are updated. The following is a list of ways a program
may be updated:
Online programs - Any program that connects to the Internet should automatically check for
updates when it is first run.
Help menu - Pressing the F1 key or accessing the help menu from the file menu should have the
option to check for updates.
Operating system - All operating systems today are updated using software included with the
operating system.
OEM program - An OEM computer (e.g., Dell or HP) often include assistant programs to assist
with checking and downloading any updates for the pre-installed programs included with the
computer. For example, HP includes the HP support assistant program for managing updates.
41 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Fix errors - Most updates fix errors, and if you don't update, you'll get those errors.
Security vulnerabilities - Updates also patch security holes, if you don't update your information
may be compromised.
Fix conflicts - It is not uncommon to discover conflicts with other programs and hardware. If you
don't update, conflicts may happen and cause problems with other programs.
MacOS
To update macOS, open the App Store, then click Updates at the top. macOS updates will be at
the top of the list of available updates. On the right side of the screen, there are buttons to update
individual apps or to apply all available updates.
VIRTUALIZATION SOFTWARE
Virtualization software allows you to run two or more operating systems using only one PC; also called a
hypervisor, is what allows one computer or server to host multiple operating systems.
Examples: VMware Workstation Player, VirtualBox, Parallels Desktop, QEMU, Citrix Hypervisor, Xen
Project, Microsoft Hyper-V,
DISK MANAGEMENT
Disk Management is a Microsoft Windows utility first introduced in Windows XP. It enables users to
view and manage the disk drives installed in their computer and the partitions associated with those
drives.
ANTIVIRUS SOFTWARE
Antivirus software is a type of utility used for scanning and removing viruses from your computer. While
many types of antivirus (or "anti-virus") programs exist, their primary purpose is to protect computers
from viruses and remove any viruses that are found.
42 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Driver Software Update Procedure
A free software license agreement gives the purchaser the rights to modify and redistribute the software
and related components, while a proprietary software license agreement forbids this.
Stress Testing
Stress Testing is a type of software testing that verifies stability & reliability of software application.
43 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Module Title: CSS NCII
Grade: 11
Learning Objectives:
At the end of this lesson, the students should be able to:
Computer Networks
A computer networks consists of two or more computing devices that are connected in order to share the
components of your network (its resources) and the information you store; is a group of two or more
computers that linked together.
Network Media
Network media is the actual path over which an electrical signal travels as it moves from one component
to another.
44 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Twisted-Pair Cable
Twisted-pair cable is a type of cabling that is used for
telephone communications and most modern Ethernet
networks; a pair of wires forms a circuit that can
transmit data; pairs are twisted to provide protection
against crosstalk, the noise generated by adjacent pairs.
When electrical current flows through a wire, it creates a
small, circular magnetic field around the wire.
The RJ- 45 is an eight-wire connector used commonly to connect computers onto a local-area network
(LAN), especially Ethernets. Although UTP was once considered to be slower at transmitting data than
other types of cable, this is no longer true. In fact, UTP is considered the fastest copper-based medium
today.
STP is primarily used in Europe. The following summarizes the features of STP cable:
Speed and throughput – 10 to 100 Mbps
Average cost per node – Moderately expensive
Media and connector size – Medium to large
Maximum cable length – 100 m (short)
Coaxial Cable
Coaxial cable consists of a hollow outer cylindrical conductor that surrounds a single inner wire made of
two conducting elements. One of these elements, located in the center of the cable, is a copper conductor.
Surrounding the copper conductor is a layer of flexible insulation; Coaxial Cable supports 10 to 100
45 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Mbps and is relatively inexpensive, although it is more costly than UTP on a
per-unit length. However, coaxial cable can be cheaper for a physical bus
topology because less cable will be needed; can be cabled over longer distances
than twisted-pair cable. For example, Ethernet can run approximately 100 meters
(328 feet) using twisted- pair cabling. Using coaxial cable increases this distance
to 500m (1640.4 feet).
Fiber Optics
Fiber Optics is sending signals down hair-thin strands of glass or plastic
fiber. The light is “guided” down the center of the fiber called the “core”.
The core is surrounded by an optical material called the “cladding” that
traps the light in the core using an optical technique called “total internal
reflection.” The core and cladding are usually made of ultra-pure glass.
The fiber is coated with a protective plastic covering called the “primary
buffer coating” that protects it from moisture and other damage. More
protection is provided by the “cable” which has the fibers and strength
members inside an outer covering called a “jacket”.
Wireless Communication
Wireless communication uses radio frequencies (RF) or infrared (IR) waves to transmit data between
devices on a LAN. For wireless LANs, a key component is the wireless hub, or access point, used for
signal distribution
Hubs
A hub is a common connection point for devices in a network. A hub has multiple ports. When a data
packet arrives at a hub, it is copied and distributed to all of its ports so that all nodes on the LAN can see
the packets.
46 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Switches
A switch is a device that filters and forwards data packets between networks. Switches operate at the data
layer, and sometimes at the network layer.
Routers
A router is a device that forward data packets over networks. Most commonly, a
router is connected to at least two networks (normally LANs or WANs). Routers are
located at gateways, the place where two networks are connected. Routers do little
data filtering; they mainly deliver the data.
Gateways
A gateway is a node on a network that serves as an entrance to another network. The gateway routes
traffic from a computer to an outside network that is serving the web pages. For example, the gateway for
a home computer is the ISP provider that connects the user to the Internet.
In a corporate environment, the gateway often acts as a proxy server and a firewall. Gateways are similar
to routers and switches in that they forward data to the destination and provide the path for which the data
will travel to the destination.
Repeater
A repeater is an object that increases a signal's strength, so it can be transmitted and received over a
greater distance without a loss in quality. These devices are commonly used with networks to help the
lines running between network devices reach farther destinations.
Modem
Modem is short for "Modulator-Demodulator." It is a hardware component that allows a computer or
another device, such as a router or switch, to connect to the Internet. It converts or "modulates" an analog
signal from a telephone or cable wire to digital data (1s and 0s) that a computer can recognize.
Patch Panels
Patch panels are network ports held together within telecommunication
closets that connect incoming and outgoing local area network (LAN) lines
or other communication, electronic and electrical systems.
RJ45
RJ45 is a type of connector commonly used for Ethernet networking. It looks similar
to a telephone jack, but is slightly wider. Since Ethernet cables have an RJ45
connector on each end, Ethernet cables are sometimes also called RJ45 cables.
The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking
interface. The "45" simply refers to the number of the interface standard. Each RJ45 connector has eight
pins, which means an RJ45 cable contains eight separate wires.
47 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Crimp Tool
A crimp tool looks similar to a pair of pliers but is actually used to conjoin two
pieces of metal by deforming one, or sometimes both, of them in such a way
that it causes them to hold each other.
Wire Stripper
A wire stripper is also a hand tool and is designed to remove the protective covering
from an Ethernet cable, exposing the inner wires.
Cable Tester
A cable tester is a device used to test both the strength and connectivity of a
particular type of cable. The tester is able to tell you if a cable is set up and
connected correctly, and give you an idea of the strength of the cable across the
entire length. Within networking, the more commonly found cable tester is used to
test Cat5, Cat5e and Cat6 Ethernet cables.
Wire Cutters
The purpose of a wire cutter is pretty self-explanatory; they are simply used to cut through a cable and its
wires. They are most commonly used to cut copper (Ethernet cable is made of copper), iron, brass,
aluminum and steel wire.
NETWORK CABLE
Straight Through and Crossover Cable
Common Ethernet network cable are straight and crossover cable. This Ethernet network cable is made of
4 pair high performance cable that consists twisted pair conductors that used for data transmission. Both
end of cable is called RJ45 connector.
The cable can be categorized as Cat 5, Cat 5e, Cat 6 UTP cable. Cat 5 UTP cable can support 10/100
Mbps Ethernet network, whereas Cat 5e and Cat 6 UTP cable can support Ethernet network running at
10/100/1000 Mbps. You might hear about Cat 3 UTP cable, it's not popular anymore since it can only
support 10 Mbps Ethernet network.
Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only difference is each
type will have different wire arrangement in the cable for serving different purposes.
48 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
1. Connect a computer to a switch/hub's normal port.
2. Connect a computer to a cable/DSL modem's LAN port.
3. Connect a router's WAN port to a cable/DSL modem's LAN port.
4. Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5. Connect 2 switches/hubs with one of the switch/hubs using an uplink port and the other one using
normal port.
Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover
cable can be used to:
1. Connect 2 computers directly.
2. Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding
network).
3. Connect 2 switches/hubs by using normal port in both switches/hubs.
49 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
9. Place the wired plug into the crimping tool.
10. Repeat all of the above steps with the other end of the cable.
11. Test the cable to ensure that it will function in the field.
To Understand more of computer network cabling please visit the following link credits by ICT Tech
Tips:
https://www.youtube.com/watch?v=XBV2dMXs6zw
PATCH PANEL
A patch panel is a passive component that compliments the
switch. The panel is designed to group multiple network ports
in a single location which helps organize the wiring. Labeling
the cables connected to a patch panel makes it is easier to
identify signal flow as well as diagnose and troubleshoot any
technical issues. In contrast, an Ethernet switch is an active
component that receives, processes, and forwards data to
multiple devices such as computers, servers, as well as other
Ethernet IP devices such as security cameras. Devices can be
networked together by connecting them to the switch through
the patch panel.
50 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Raceways
A raceway is essentially any rigid enclosed or semi-enclosed channel that
protects, routes and hides cables and wires. Surface raceway is an excellent
choice for concealing unsightly wires in a number of settings: home theaters,
offices, conference rooms, workstations, and more.
J Channel Raceway. J Channel or J Hook raceways are so-named because a cross section is shaped
roughly like the letter “J”; cables are inserted by dropping them through the top, where the curve of the
“J” hooks around to keep them in place.
Corner Duct Raceway. Corner duct is similar to latching raceway, but features a unique quarter round
shape that allows it to blend in to wall and/or ceiling junctions for a complete and finished look; It utilizes
a sliding cover to completely conceal cables, and can be utilized horizontally or vertically on pretty much
any corner, even mimicking the look of crown molding to further disguise its purpose.
Power Raceway. Power raceway incorporates a power source directly into the raceway; can be composed
of plastic or metal; usually holds communication cabling including voice/data wiring, fiber optics, or
other low voltage cables.
Specialty Raceways
Wire Guard – for utility poles or the outer walls of buildings.
Cable Runway or Panduit's Fiber Runner – for cable support system
Extruded aluminum raceways – durable and rugged for outdoor industrial use
Metal Over floor Raceways – offer a semi-permanent solution for low voltage cabling, allowing
pedestrians, wheelchairs, carts and other traffic to roll right on over it.
Modular Box
It is a surface mounted box used in a commercial and industrial building to cleanly
attach network cables. It is commonly used in a structured network.
To Understand more of computer Modular box please visit the following link
credits to Mr. Ismael Balana of Golurn.com:
References:
https://www.golurn.com/COC2_LO1/content/assets/PWFieUTUvFZ3acZJ_OqMP_7ykEYvdPMsQ-
MODULAR.pdf
51 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Module Title: CSS NCII
Grade: 11
Learning Objectives:
At the end of this lesson, the students should be able to:
NETWORK TOPOLOGY
Network topology is the way a network is arranged, including the physical or logical description of how
links and nodes are set up to relate to each other; refers to how various nodes, devices, and connections on
your network are physically or logically arranged in relation to each other; is the arrangement with which
computer systems or network devices are connected to each other; defines the structure of the network of
how all the components are interconnected to each other.
Topologies may define both physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
52 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Bus Topology
The bus topology is designed in such a way that all the stations
are connected through a single cable known as a backbone cable.
Each node is either connected to the backbone cable by drop
cable or directly connected to the backbone cable.
When a node wants to send a message over the network, it puts a
message over the network.
All the stations available in the network will receive the message
whether it has been addressed or not.
The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks. The
configuration of a bus topology is quite simpler as compared to other topologies.
The backbone cable is considered as a "single lane" through which the message is broadcast to all
the stations.
The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).
Advantages:
Low-cost cable. In bus topology, nodes are directly connected to the cable without passing
through a hub. Therefore, the initial cost of installation is low.
Moderate data speeds. Coaxial or twisted pair cables are mainly used in bus-based networks that
support up to 10 Mbps.
Familiar technology. Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily available.
Limited failure. A failure in one node will not have any effect on other nodes.
Disadvantages:
Extensive cabling. A bus topology is quite simpler, but still, it requires a lot of cabling.
Difficult troubleshooting. It requires specialized test equipment to determine the cable faults. If
any fault occurs in the cable, then it would disrupt the communication for all the nodes.
Signal interference. If two nodes send the messages simultaneously, then the signals of both the
nodes collide with each other.
Reconfiguration difficult. Adding new devices to the network would slow down the network.
Attenuation. Attenuation is a loss of signal leads to communication issues. Repeaters are used to
regenerate the signal.
Ring Topology
Ring topology is like a bus topology, but with connected ends.
The node that receives the message from the previous
computer will retransmit to the next node.
The data flows in one direction, i.e., it is unidirectional.
The data flows in a single loop continuously known as an
endless loop.
It has no terminated ends, i.e., each node is connected to other
node and having no termination point.
The data in a ring topology flow in a clockwise direction.
The most common access method of the ring topology is
token passing.
53 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
o Token passing. It is a network access method in which token is passed from one node to
another node.
o Token. It is a frame that circulates around the network.
Advantages:
Network Management. Faulty devices can be removed from the network without bringing the
network down.
Product availability. Many hardware and software tools for network operation and monitoring
are available.
Cost. Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is
very low.
Reliable. It is a more reliable network because the communication system is not dependent on the
single host computer.
Disadvantages:
Difficult troubleshooting. It requires specialized test equipment to determine the cable faults. If
any fault occurs in the cable, then it would disrupt the communication for all the nodes.
Failure. The breakdown in one station leads to the failure of the overall network.
Reconfiguration difficult: Adding new devices to the network would slow down the network.
Delay. Communication delay is directly proportional to the number of nodes. Adding new
devices increases the communication delay.
Star Topology
Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
Coaxial cable or RJ-45 cables are used to connect the computers.
Hubs or Switches are mainly used as connection devices in a physical
star topology.
Star topology is the most popular topology in network
implementation.
Advantages:
Efficient troubleshooting. Troubleshooting is quite efficient in a star topology as compared to
bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star
topology, all the stations are connected to the centralized network. Therefore, the network
administrator has to go to the single station to troubleshoot the problem.
Network control. Complex network control features can be easily implemented in the star
topology. Any changes made in the star topology are automatically accommodated.
Limited failure. As each station is connected to the central hub with its own cable, therefore
failure in one cable will not affect the entire network.
Familiar technology. Star topology is a familiar technology as its tools are cost-effective.
Easily expandable. It is easily expandable as new stations can be added to the open ports on the
hub.
o Cost effective. Star topology networks are cost-effective as it uses inexpensive coaxial
cable.
o High data speeds. It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one
of the most popular Star topology networks.
54 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Disadvantages:
A Central point of failure. If the central hub or switch goes down, then all the connected nodes
will not be able to communicate with each other.
Cable. Sometimes cable routing becomes difficult when a significant amount of routing is
required.
Tree Topology
Tree topology combines the characteristics of bus topology and
star topology.
A tree topology is a type of structure in which all the computers
are connected with each other in hierarchical fashion.
The top-most node in tree topology is known as a root node, and
all other nodes are the descendants of the root node.
There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.
Advantages:
Support for broadband transmission. Tree topology is mainly used to provide broadband
transmission, i.e., signals are sent over long distances without being attenuated.
Easily expandable. We can add the new device to the existing network. Therefore, we can say
that tree topology is easily expandable.
Easily manageable. In tree topology, the whole network is divided into segments known as star
networks which can be easily managed and maintained.
Error detection. Error detection and error correction are very easy in a tree topology.
Limited failure. The breakdown in one station does not affect the entire network.
Point-to-point wiring. It has point-to-point wiring for individual segments.
Disadvantages:
Difficult troubleshooting. If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
High cost. Devices required for broadband transmission are very costly.
Failure. A tree topology mainly relies on main bus cable and failure in main bus cable will
damage the overall network.
Reconfiguration difficult. If new devices are added, then it becomes difficult to reconfigure.
Mesh Topology
Mesh technology is an arrangement of the network in which
computers are interconnected with each other through various
redundant connections.
There are multiple paths from one computer to another computer.
It does not contain the switch, hub or any central computer which
acts as a central point of communication.
The Internet is an example of the mesh topology.
Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern.
Mesh topology is mainly used for wireless networks.
Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2;
Where n is the number of nodes that represents the network.
55 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Two Categories of Mesh Topology
Full Mesh Topology – In a full mesh topology, each computer is connected to all the computers
available in the network.
Partial Mesh Topology – In a partial mesh topology, not all but certain computers are connected
to those computers with which they communicate frequently.
Advantages:
Reliable. The mesh topology networks are very reliable as if any link breakdown will not affect
the communication between connected computers.
Fast Communication. Communication is very fast between the nodes.
Easier Reconfiguration. Adding new devices would not disrupt the communication between
other devices.
Disadvantages:
Cost. A mesh topology contains a large number of connected devices such as a router and more
transmission media than other topologies.
Management. Mesh topology networks are very large and very difficult to maintain and manage.
If the network is not monitored carefully, then the communication link failure goes undetected.
Efficiency. In this topology, redundant connections are high that reduces the efficiency of the
network.
Hybrid Topology
The combination of various different topologies is known as Hybrid topology.
A Hybrid topology is a connection between different links and
nodes to transfer the data.
When two or more different topologies are combined together is
termed as Hybrid topology and if similar topologies are
connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of ICICI
bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.
Advantages:
Reliable. If a fault occurs in any part of the network will not affect the functioning of the rest of
the network.
Scalable. Size of the network can be easily expanded by adding new devices without affecting the
functionality of the existing network.
Flexible. This topology is very flexible as it can be designed according to the requirements of the
organization.
Effective. Hybrid topology is very effective as it can be designed in such a way that the strength
of the network is maximized and weakness of the network is minimized.
Disadvantages:
Complex design. The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.
Costly Hub. The Hubs used in the Hybrid topology are very expensive as these hubs are different
from usual Hubs used in other topologies.
Costly infrastructure. The infrastructure cost is very high as a hybrid network requires a lot of
cabling, network devices, etc.
56 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Learning Objectives:
At the end of this lesson, the students should be able to:
Simplex Mode
In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
A device can only send the data but cannot receive it or it can receive the data but cannot send the
data.
This transmission mode is not very popular as mainly communications require the two-way
exchange of data. The simplex mode is used in the business field as in sales that do not require
any corresponding reply.
The radio station is a simplex channel as it transmits the signal to the listeners but never allows
them to transmit back.
Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the
data from the user and monitor can only be used to display the data on the screen.
The main advantage of the simplex mode is that the full capacity of the communication channel
can be utilized during transmission.
57 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Advantage:
the station can utilize the entire bandwidth of the communication channel, so that more data can be
transmitted at a time.
Disadvantage:
Communication is unidirectional, so it has no inter-communication between devices.
Half-Duplex Mode
In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the
data as well.
Messages flow in both the directions, but not at the same time.
The entire bandwidth of the communication channel is utilized in one direction at a time.
In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then the
receiver requests the sender to retransmit the data.
A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and
another party listens. After a pause, the other speaks and first party listens. Speaking
simultaneously will create the distorted sound which cannot be understood.
Advantage:
Both the devices can send and receive the data and also can utilize the entire bandwidth of the
communication channel during the transmission of data.
Disadvantage:
When one device is sending the data, then another has to wait, this causes the delay in sending the data at
the right time.
Full-Duplex Mode
In Full duplex mode, the communication is
bi-directional, i.e., the data flow in both the
directions.
Both the stations can send and receive the
message simultaneously.
58 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and
another channel has traffic flowing in the opposite direction.
The Full-duplex mode is the fastest mode of communication between devices.
The most common example of the full-duplex mode is a telephone network. When two people are
communicating with each other by a telephone line, both can talk and listen at the same time.
Advantage:
Both the stations can send and receive the data at the same time.
Disadvantage:
If there is no dedicated path exists between the devices, then the capacity of the communication channel
is divided into two parts.
References:
https://www.computerhope.com/issues/ch000561.htm#download
https://edu.gcfglobal.org/en/basic-computer-skills/installing-software-on-your-windows-pc/1/
https://www.computerhope.com/jargon/u/update.htm
https://edu.gcfglobal.org/en/basic-computer-skills/how-to-update-your-software/1/
https://blog.capterra.com/virtualization-software/
https://www.computerhope.com/jargon/d/diskmana.htm
https://techterms.com/definition/antivirus
https://www.windowscentral.com/how-properly-update-device-drivers-windows-10
https://www.techopedia.com/definition/27130/software-license-agreement
https://www.guru99.com/stress-testing-tutorial.html
https://mybay.baycollege.edu/ICS/icsfs/NetFund_PPT_2.3_B.pdf?target=578103c3-a955-4549-9477-836356bfc2b5
https://www.slideshare.net/uncleRhyme/networkmedia-presentation1
https://techterms.com/definition/modem
https://www.techopedia.com/definition/2249/patch-panel
https://www.techopedia.com/definition/13454/unshielded-twisted-pair-cable-utp
https://homenetworkgeek.com/6-network-installation-tools-you-should-own/
59 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.
COMPILATION 1 & 2 OF QUARTER 3
COMPUTER SYSTEM SERVICING NCII
https://techterms.com/definition/rj45
https://www.wikihow.com/Make-a-Network-Cable
https://www.cablesys.com/updates/install-network-patch-panel-switch/
https://www.cableorganizer.com/surface-raceways/
https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
https://www.dnsstuff.com/what-is-network-topology
https://www.javatpoint.com/computer-network-transmission-modes
60 | I N T E G R A T E D I N N O V A T I O N A N D H O S P I T A L I T Y C O L L E G E S ,
INC.