0% found this document useful (0 votes)
4 views

CBLMCSS

The document outlines competency-based learning materials for the Computer Hardware Servicing NC II qualification, focusing on configuring computer systems and networks. It includes a list of competencies, learning outcomes, assessment criteria, and safety guidelines for working with computers. The module is designed to prepare learners for practical tasks and assessments in the electronics sector.

Uploaded by

kimberlyabano322
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

CBLMCSS

The document outlines competency-based learning materials for the Computer Hardware Servicing NC II qualification, focusing on configuring computer systems and networks. It includes a list of competencies, learning outcomes, assessment criteria, and safety guidelines for working with computers. The module is designed to prepare learners for practical tasks and assessments in the electronics sector.

Uploaded by

kimberlyabano322
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 68

PARTS OF A COMPETENCY – BASED LEARNING MATERIALS

COMPETENCY – BASED
LEARNING MATERIAL

Sector:
ELECTRONICS SECTOR
Qualification Title:
COMPUTER HARDWARE SERVICING NC II
Unit of Competency:
CONFIGURED COMPUTER SYSTEMS AND NETWORKS
Module Title:
CONFIGURING COMPUTER SYSTEMS AND NETWORKS

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
QUALIFICATION TITLE
COMPUTER HARDWARE SERVICING NC II

COMPETENCY BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code


1 Install computer systems Installing computer ELC724331
and networks systems and networks
2 Diagnose and Diagnosing and ELC724332
troubleshooting computer troubleshooting computer
system system
3 Configured computer Configuring computer ELC724333
systems and networks systems and networks
4 Maintain computer Maintaining computer ELC724334
systems and networks systems and networks
5
6

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL

Welcome!

The unit of competency, " Configured computer systems and networks ", is one
of the competencies of _________________, a course which comprises the
knowledge, skills and attitudes required for a TVET trainer to possess.

The module, _________________, contains training materials and activities related


to identifying learner’s requirements, preparing session plan, preparing basic
instructional materials and organizing learning and teaching activities for you to
complete.

In this module, you are required to go through a series of learning activities in order
to complete each learning outcome. In each learning outcome are Information
Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform
the activities on your own. If you have questions, do not hesitate to ask for
assistance from your facilitator.

Remember to:
• Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there to
support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way, you will
improve your speed, memory and your confidence.
• Use the Self-Checks, Operation Sheets or Task or Job Sheets at the end of each
section to test your own progress. Use the Performance Criteria Checklist or
Procedural Checklist located after the sheet to check your own performance.
• When you feel confident that you have had sufficient practice, ask your Trainer to
evaluate you. The results of your assessment will be recorded in your Progress
Chart and Accomplishment Chart.

You need to complete this module before you can perform the next module,
____________________________________
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
TABLE OF CONTENTS

NO. TITLE PAGE


1 COVER PAGE
2 Qualification Title
3 How to use this Competency – based Learning Materials
4 Table of Contents
5 Module Content
6 Learning Outcome
7 Learning Experiences
8 Information Sheet
9 Self-Check No.
10 Answer Key for Self-Check No.
11 Job Sheet No.
12 Performance Criteria Checklist No.
13 References

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
MODULE CONTENT

Qualification Title: COMPUTER HARDWARE SERVICING NC II

Unit of Competency: CONFIGURED COMPUTER SYSTEMS AND


NETWORKS

Module Title: CONFIGURING COMPUTER SYSTEMS AND


NETWORKS

Introduction:

This module provides information and suggested activities for Computer Hardware
Servicing II. It includes materials and tasks to complete.

By finishing this module, you’ll be better prepared for the next module, Maintaining
Computer Systems and Networks.

The module has three learning outcomes. Each includes activities with instruction
sheets. Before starting, read the information sheets and answer the self-check and
tasks. This will help you and your teacher confirm your readiness to perform the
skills required.

After completing the module, meet with your teacher for an assessment to check if
you’ve met the knowledge and skill requirements. If you pass, you’ll get a certificate
of completion.

Learning Outcome:
Upon completion of this module, you must be able to:
LO1: Plan and prepare for a configuration task.
LO2: Configure a computer system.
LO3: Analyze and test the configured computer system.

Assessment Criteria
1. Configured computer systems and networks identified from the Job/Service
Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
5. Checked necessary tools, equipment materials

Bluetooth: Wireless connection for sending and receiving messages.


Coverall: Protective clothing worn for safety.
E-mail: Electronic messages sent via the internet.
Fax: Short for "facsimile"; sends copies of documents electronically to a remote
location.
Internet: A large network of smaller interconnected networks.
Intranet: A private network using internet protocols for internal communication.
Modem: A device that converts digital signals into a form suitable for transmission
over telephone lines, and vice versa.
Network: A group of interconnected computers.
PDA: Short for "Personal Digital Assistant"; a small handheld computer for tasks like
faxing, emailing, and word processing.
OH&S: Occupational Health and Safety.
Peer-to-peer network: A type of network where files and printers on one PC can be
shared with others.
Policies: Rules, guidelines, or systems that define how things are done.
Server: A computer that provides shared resources like files, printing, or
communications to other computers on a network.
Software: Applications or programs run by a computer.
Storage Media: Devices used to store data, like hard drives or USBs.
Topology: The layout or design of a network.
USB: Short for "Universal Serial Bus"; a standard connection for devices like flash
drives.
Wide Area Network (WAN): A network that connects computers across long
distances, like between cities or countries.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Program Course: Computer Hardware Servicing NCII
Unit of Competency: Configured computer systems and networks
Module: Configuring computer systems and networks

LO1. PLAN AND PREPARE FOR CONFIGURATION

ASSESSMENT CRITERIA:
1. Configured computer systems and networks identified from the Job/Service
Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.
5. Checked necessary tools, equipment materials

REFERENCES:
http://www.workcover.nsw.gov.au/OHS/default.htm
www.industrialrelations.nsw.gov.au/resources/workplace_pp.pdf
http://en.wikipedia.org/wiki/Network
http://www.wikihow.com/Make-a-Network-Cable
http://en.wikipedia.org/wiki/Network_topology
http://en.wikipedia.org/wiki/IP_addresses

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
INFORMATION SHEET 1.1.1

Occupational Health and Safety (OHS):


OHS includes laws, rules, and actions that keep workers healthy and safe at work.
Every worker has the right to work in a safe place that supports a productive
and healthy life. Learning and following safety rules is important, especially
when working with electrical devices like computers.

Personal Safety When Working with Computers:

Follow these safety tips when working with computer devices:

 Always listen to your teacher’s instructions to avoid accidents.


 Never work on computers if you’re wet to avoid electric shocks.
 Don’t remove parts from a computer while it’s powered on.
 Keep electronics away from water.
 Avoid running or playing in the work area.
 Wear Personal Protective Equipment (PPE) like coveralls, rubber-soled
shoes, and anti-static wrist straps.
 Ask your teacher for help when handling computer equipment.

Taking proper safety measures when using tools and equipment helps prevent
damage and accidents.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
SELF CHECK 1.1.1

1. Form a group of six members.


2. Perform a simulation on "Applying OH&S Policies and Procedures."
3. Your performance will be rated based on the following criteria:

Performance Criteria:

5: Demonstrated five OH&S policies in different areas.

4: Demonstrated four OH&S policies in different areas.

3: Demonstrated three OH&S policies in different areas.

2: Demonstrated two OH&S policies in different areas.

1: Did not demonstrate any OH&S policies.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
INFORMATION SHEET 1.1.2
Computer Network
A computer network is a group of interconnected
computers. In general, a network means any
connected system, but specifically, it refers to
sharing information between two systems (human or
mechanical).

Benefits of Sharing Information via a Network:

 Reduces hardware costs by allowing multiple users to share printers and


peripherals.
 Software and data files can be accessed by multiple users.
 Email (electronic mail) can be sent and received.
 Collaboration tools enable multiple users to work on the same document.
 Remote-control programs can be used to fix issues or teach users how to do
tasks.

Shared Hardware Components:


The most commonly shared devices in a network are:

 Printers
 Disk drives
 CD-ROM and optical drives

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
 Modems
 Fax machines
 Tape backup units

Network Topology
Network topology refers to how devices in a network logically connect and interact
with each other, not their physical arrangement. For example, even if computers are
placed in a line but connected to a
hub, the network is a Star Topology,
not a Bus Topology. This means the
logical design of the network may
differ from its physical layout.

Bus Topology
This is often used for small, simple, or
temporary networks. In a bus network:

 The cable is usually just one


or more wires with no active electronics to boost the signal.
 The topology is passive—when one computer sends a signal, all devices
receive it, but only the device with the correct address processes the
information.

Advantages of Bus Topology:

1. Simple and easy to understand.


2. Requires less cable, making it cheaper than other setups.
3. Easy to extend by joining cables with a connector, allowing more computers
to join the network.

Disadvantages of Bus Topology:

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
1. Heavy traffic slows down the network since only one computer can send a
message at a time.
2. Troubleshooting is difficult—a broken cable or loose connection can stop the
entire network from working.

Star Topology:
In a star topology, all devices are connected to a central hub or switch.

 The hub sends messages to all devices, while the switch sends messages
only to the destination device.
 It is ideal for networks that need to expand or require higher reliability.

Advantages of Star Topology:

1. Easy to add or modify computers


without affecting the rest of the network.
2. The central hub/switch is a
convenient place to identify and fix
faults.
3. A single computer failure won’t
disrupt the entire network.

Disadvantages of Star Topology:

1. If the central hub/switch fails, the entire network stops working.


2. It is more expensive because it requires more cables and central equipment.

Ring Topology:
In a ring topology, each computer is connected to the next one, with the last
computer connected back to the first. Each computer sends the data it receives to
the next one in line. The data travels in one direction around the ring. Unlike a bus
network, a ring network does not have signal loss issues. There is no need for
termination because the ring has no end.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Advantages of Ring Topology:

1. Every computer has equal access.


2. It allows for fast data transfer.

Disadvantages of Ring Topology:

1. If one computer fails, it can disrupt the entire network.


2. Troubleshooting can be difficult.

Types of Networks:

Personal Area Network (PAN):


A PAN is a network that connects devices close to one person, like printers, phones,
or scanners. It typically covers a range of 20-30 feet (6-9 meters).

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Personal Area Network (PAN):
A PAN can be connected using wired technologies like USB1 or FireWire. It can also
be wireless, using technologies such as Bluetooth (Wireless Personal Area Network
or WPAN).

Local Area
Network (LAN):
A LAN covers
a small area,
like a home,
office, or
building. Most
modern LANs are based on Ethernet technology. For instance, in a library, a wired or
wireless LAN connects local devices (e.g., printers and servers) and provides
internet access. The library's PCs are connected by Cat5 cables using the IEEE
802.3 protocol. Servers are connected with enhanced Cat5e cables, supporting
speeds of up to 1 GB/s. Staff computers can access resources like printers,
checkout records, and the internet, while user computers can access the internet
and the library catalog. Printers are only accessible by the specific workgroup they
belong to.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Metropolitan Network
A wide area network (WAN) is a data communications network that spans
a sizable geographic area, such as from one city to another or from one nation to
another. It frequently uses transmission facilities offered by common carriers, like
phone companies. The physical, data connection and network layers are the lower
three layers of the OSI reference model where WAN technologies typically operate.

There is no standard definition for global area networks (GANs), and multiple groups
are working on their standards. But generally speaking, a GAN is a model that
facilitates mobile communications over an arbitrary number of satellite coverage
regions, wireless LANs, etc. Handling user communications from one local coverage
area to the next is the main difficulty in mobile communications. In IEEE Project 802,
this entails a series of terrestrial Wireless local area networks (WLAN).

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Internetwork
Devices that function at OSI Basic Reference Model layer 3 (the "network"
layer), like routers, are used to connect two or more networks or network segments.
Internetwork can also refer to any connection between public, private, commercial,
industrial, or governmental networks.
The Internet Protocol is used by the interconnected networks in present
usage. Depending on who conducts and takes part in them, internetwork can take at
least three different forms:
Intranet

Extranet

Internet

The Internet may or may not be connected to intranets and extranets. The
intranet or extranet, if it is linked to the Internet, is typically secured against
unauthorized access from the Internet. Although it can act as a gateway to access
parts of an extranet, the Internet is not regarded as a component of either the
intranet or the extranet.
An intranet is a collection of linked networks that are managed by a single
administrative body and employ the Internet Protocol and IP-based tools like web
browsers and file transfer protocol (FTP) applications. Only some users are
permitted access to the intranet, and it is closed to the general public by that
administrative body. An intranet is typically a company's or other enterprise's internal
network.
A particular internetwork that is based on the Advanced Research Projects
Agency Network (ARPANET), which was created by the U.S. agency ARPA and
consists of a global interconnection of public, private, academic, and governmental
networks.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
The World Wide Web (WWW), commonly known as the "Internet" with a
capital "I" to differentiate it from other generic internetworks, is hosted by the
Department of Defense. IP addresses acquired from address registries that manage
assignments are used by Internet users or their service providers. Through the
Border Gateway Protocol (BGP), service providers and major corporations also
provide information about how reachable their address ranges are.

Connectors
It is used to connect external devices to the computer system.

Adapter
A piece of hardware that plugs into an expansion slot in your computer.

Wires and Cables


It is used to connect computers to the network.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Appropriate software
These software packages are used to install new drivers needed in setting up
your computer.

Computer storage media


These help you save data and provide backup for your files such as diskettes,
compact discs, flash drives, and memory cards.

Reference book
These are books that will provide topics about networking or related books on
computers.
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Manuals, These provide instructions for certain operations or task.

Cable tie
It is used to organize wires and cables used in connecting computers to avoid
tangling.

These are the following tools/testing devices needed in the configuration task:

1. Screw drivers
 A flat screwdriver is used to fasten negative slotted screws.
 A Philips Screwdriver is used to fasten positive slotted screws.

2. Pliers
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
 Side Cutter pliers is used for cutting and trimming of connecting wires or
terminal leads in the circuit board.
 Long nose pliers are used for holding, bending, and stretching the lead of
electronic components and connecting wires.

3. Soldering iron/gun
 It is used to join two or more metal conductors with the support of soldering
lead melted around it.

4. Multi-tester
 It is used by technicians for measuring current, voltage, and resistance.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
5. Magnifying glass
It is a device made of glass with handle. It exaggerates or increase the
apparent size of an object.

Anti-static wrist strap


It absorbs the static electricity of the material when being held by the hands.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Program Course: Computer Hardware Servicing NCII
Unit of Competency: Configured computer systems and networks
Module: Configuring computer systems and networks

LO2. CONFIGURE COMPUTER SYSTEMS AND NETWORKS

ASSESSMENT CRITERIA:
1. Appropriate Personal Protective Equipment are used and OHS policies and
procedures followed
2. Normal function of systems and networks checked in accordance with
manufacturer’s instructions
3. Fault or problem in the systems and networks diagnosed in line with the
standard operating procedures.
4. Computer systems and networks configured in line with the standard
operating procedures.

REFERENCES:
http://en.wikipedia.org/wiki/Personal_protective_equipment
http://www.pcguide.com/ts/x/sys/crash.htm
http://www.sciam.com/article.cfm?id=why-do-computers-crash&print=true
http://catalyst.washington.edu/help/computing_fundamentals/troubleshootingxp/
com
mon_hardware.html
http://www.ivc.k12.il.us/ivchigh/Departments/computer.htm
http://www.johnniemccoy.com/
http://www.microsoft.com/windowsxp/using/networking/setup/netadapter.mspx
http://support.microsoft.com/servicedesks/ShowMeHow/3061261.asx
http://support.microsoft.com/kb/250927

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
INFORMATION SHEET 6.2.1:
Configuring Computer Systems and Network

PERSONAL PROTECTIVE EQUIPMENT


To protect yourself against unforeseen injuries that can occur while carrying out
specific jobs, you must wear or utilize something. To avoid unanticipated negative
events that could injure us, different occupations used various devices or clothing.
The following tools could be used as PPE:

Goggles - is used to prevent tiny particles from entering our eyes.


Coverall/apron - is worn by a person to prevent his body or clothes from any
types of dirt.
Gloves - are used in handling object without hurting your hands.
Dust mask - is used to cover the mouth and nose from tiny particles when cleaning
computer peripherals.
Shoes with rubber sole and rubber mat - are used to avoid us from slippery.
Anti-static wrist strap - It absorbs the static electricity of the material when being
hold by the hands.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
INSTRUCTIONS FROM THE MANUFACTURER

A manufacturer's instruction guide, or simply a handbook, can be quite helpful,


particularly if you recently purchased new equipment or supplies for your home.
Although operating the material doesn't require professional skills, it could make your
task easier if you simply follow the instructions in the manual. The functions and
procedures for configuring the material and/or operating it are often covered in the
manual. Additionally, manuals include troubleshooting steps.
This is an example of what you may see on a Manufacturer's Instruction Guide.

HOW TO INSTALL A WIRED NETWORK ADAPTER


Your computer need a network adapter in order to connect to a network. Thankfully,
the majority of computer manufacturers include a network adapter with your
computer since they understand how crucial it is for users to connect to the Internet
or other computers.

First, decide which installation technique to use if you need to add a network
adapter. Due to its ease of installation, the majority of users choose to utilize a USB
(Universal Serial Bus) network adapter. You may discover that a CardBus
(sometimes called PCMCIA or PC Card) or CF network adapter better suits your
needs if you have a portable computer. You might also be able to add an internal
network adapter to your desktop PC if you have enough space available.

To see what kind of network adapters may already be installed in your


computer.
1. Click the Start, and then click Control Panel
2. Under or pick a Control Panel icon, click Network Connections
3. Microsoft Windows XP displays your network adapters. If an adapter has a
red X over it, it is disconnected. If the Network Connections window is blank,
your computer doesn't have a network adapter
4. If you already have a network adapter, you are ready to configure your
network

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
How to install a wired USB network adapter
Once you have the adapter...

1. If your USB network adapter came with software, insert the CD or floppy disk
into your computer, and follow the manufacturer's instructions to install the
software.
2. Find an available USB port on your computer.

Note: If you need to move your computer to reach the USB ports, you should shut
down Windows to avoid damaging your computer. If you can easily reach a USB
port, you need not shut down your computer.

3. If you do not have an unused USB port, connect a USB hub to add additional
ports. Then connect your USB network adapter to the unused USB port.
4. Connect the network cable to the network adapter.
5. Connect the other end of the network cable to your networking equipment.
6. If you had to shut down your computer to get to the USB port, you can now
turn on your computer. Windows detects and installs the new hardware, and
then displays a notification informing you that the hardware has been
successfully installed.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
SELF-CHECK 6.2.1

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Computers nowadays have larger hard drives, more memory, and faster
microprocessors. You have to admit that the performance difference between a
Pentium 4 and a 386 is incredible! However, in order for your computer to survive
when an issue occurs, you must take action.

The following are some typical flaws and issues that you might run into:
1. Why does a computer become sluggish?
 You require additional memory.
 Don't ignore what is clear.
 Not having adequate memory wasn't an issue until recently.
 Since RAM was becoming so reasonably priced, the majority of
individuals were installing more than enough memory on their
computers to complete the task at hand.
 You must install more memory if your computer is sluggish and its RAM
capacity is low.

SPYWARE
It is a piece of software that the user purposefully installs on the computer in order to
spy on or monitor the activities of other users using the same computer. You must
stay current if you want this program to work. "Up to date" refers to the most recent
version. virus. A software application, macro, or script that is intended to damage,
corrupt, alter, or otherwise interfere with a computer or software program.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Background programs
When you install new software on your computer, often times you install it to run in
the background every time you start up. Most times you do this without knowing it.
Look at the bottom right hand side of your screen.
If you see several icons there, you have extra programs running and stealing
resources. Right click on these and see if you have the option of closing them. Many
times, you can open the program and choose an option to keep these programs from
starting automatically.

Corrupted registry
Any changes you make to your computer effects and actually, it corrupts your
registry even when you do something positive like remove spyware and you end up
with a corrupted registry.
After months of corrupting your registry, it will become good. This will, in its early
stages, cause your computer to slow down. In its advanced stages, it will freeze and
crash and do more mysterious and troublesome things.

2. After I pressing the Power button...

Nothing happened
1. Check mains plug switched on at wall
2. PCHRSU may have its own power switch - check this is on
3. Check PSU-to-Motherboard cable(s) are correctly connected
4. Check front panel power switch is correctly connected
5. Check Reset button is not stuck 'in'
6. Check mains cable fuse
There was a loud bang (possibly with smoke) at the back of the PC Case
PSU was faulty or set to incorrect voltage for mains supply system.
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Replace PSU
PC is on but monitor shows no display and a sequence of beeps emits from the PC
1. Check fitting of CPU, RAM, Video card, sound card etc. If necessary, remove
and refit these components
2. Check the motherboard manual and perform a BIOS reset procedure
This may indicate a faulty motherboard
1. PC is on but monitor shows no display and one beep emits from the PC
2. Check monitor is switched on at the wall socket
3. Check monitor power cable is connected correctly
4. Check that the monitor's signal cable is connected correctly to both the PC
and Monitor
5. Check that the monitor is switched on at its front panel

This may indicate a faulty video card


1. PC is on but there are no power and/or HDD lights on the PC case front panel
2. Check correct connection of front panel connectors to the motherboard (see
3. motherboard manual

This 'may' indicate a faulty Motherboard


1. PC is on but HDD does not spin up
2. Check power connector to HDD is properly connected
3. Check IDE ribbon cable is correctly connected to both Motherboard and HDD

This may indicate a faulty Hard Drive

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
1. PC is on but CD-ROM shows no lights/will not eject tray
2. Check power connector to CD-ROM is properly connected
3. Check IDE ribbon cable is correctly connected to both Motherboard and CD-
ROM

This may indicate a faulty CD-ROM Drive


1. PC is on but the CPU fan/fans do not spin
2. Disconnect the power immediately to prevent damage to the CPU from

overheating
3. Check fan power cables are correctly connected to the relevant power
connector (in most cases, a motherboard FAN connector or one of the PSU
power connectors)
4. Disconnect the power and carefully spin the fan blades with a finger. If there is
any resistance to this movement, this may indicate a faulty fan unit

The monitor displays a garbled image upon booting up. Verify the CPU, RAM, video
card, sound card, and other components' seats. Remove and reinstall these parts if
required. Examine the motherboard's handbook and run a BIOS reset process This
could be a sign of a malfunctioning motherboard or video card.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
When booting up, the display displays the wrong CPU type and speed. For the
proper CPU jumper settings, consult the motherboard manual (if applicable). Consult
the motherboard manual to determine the CPU type in the BIOS settings. Go
through the BIOS reset process. Update the BIOS (the motherboard may support
your CPU with an updated BIOS). This can point to an outdated or malfunctioning
motherboard.

The monitor shows no picture


 Is the power light on?
 Are the cables plugged in?
 Check brightness and contrast settings.
 Swap the monitor with another one, reboot the machine and see if it
works. If the computer works the monitor has probably gone bad. If it still
fails to work, something in the CPU perhaps a video card has gone bad.

Computers only show a limited number of colors. Verify the monitor's display
settings, typically located beneath the display icon in the control panel. Choose a
minimum of 256 colors for the standard display. Your screen might only show a few
colors if you had 16 colors selected. You must set the display settings to 256 colors
for certain programs, including FastCat.
Indications of Issues with the Video Display Your video card may be having issues if
your screen is entirely white or gray and you hear buzzing sounds. Verify that all
cords from the monitor to the CPU are fastened before you lose your mind. To see if
this is the issue, try using a different power cord for the monitor.
You might be using the wrong display adapters if the screen seems warped around
the borders and the color is off. Choose Control Panel, Settings, and Start. After
double-clicking the System Icon, choose Device Manager. A list of devices will
appear. To see the type, double-click Display adapters. There is a problem if the
device has a yellow exclamation point next to it. Click on a device, choose
Properties, then choose the General tab to view conflicts for that device. A
description of the equipment and the reason for its malfunction should be included.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
OPERATION SHEET
Network Wide Area (WAN)
Benefits of Setting Up a Network Quickness. Networks offer an incredibly quick way
to share and move files. Files are exchanged without a network by copying them to
floppy disks, which are subsequently sent or carried from one computer to another.
This file-transfer technique, known as sneaker-net, takes a long time.
Price, when compared to purchasing individually licensed copies, network cable
versions of many well-known software applications are available at significant
discounts. In addition. financial savings, distributing a program across a network
makes program upgrades simpler. Instead of making the modifications on each
workstation individually, they must be made just once, on the file server. safety.
Network files and programs can be set to "copy inhibit," which eliminates the risk of
unauthorized program copying. To limit access to authorized users, passwords can
also be set for particular folders. Software management that is centralized. The
ability to load all software on a single machine (the file server) is one of the biggest
advantages of setting up a network.
Sharing of Resources. Another area where a network outperforms standalone
systems is in resource sharing. The majority of businesses are unable to purchase
enough CD-ROM players, modems, scanners, fax machines, laser printers, and
modems for every computer. However, numerous people can share these
peripherals if they are added to a network. electronic mail. The hardware required to
set up an email system is provided by the existence of a network. Email helps all
school employees interact both personally and professionally, and it makes it easier
to share general information with all of the staff. Students can also contact with peers
and teachers at their own school via email on a local area network (LAN). Students
can speak with people all around the world if the LAN is linked to the Internet.
Adaptable Access.

Disadvantages of Installing a School Network

1. Expensive to Install. Although a network will generally save money over


time, the initial costs of installation can be prohibitive. Cables, network
cards, and software are expensive, and the installation may require the
services of a technician.
2. Requires Administrative Time. Proper maintenance of a network
requires considerable time and expertise. Many schools have installed
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
a network, only to find that they did not budget for the necessary
administrative support.

3. File Server May Fail. Although a file server is no more susceptible to


failure than any other computer, when the files server "goes down," the
entire network may come to a halt. When this happens, the entire
school may lose access to necessary programs and files.
4. Cables May Break. Some of the configurations are designed to
minimize the inconvenience of a broken cable; with other
configurations, one broken cable can stop the entire network.

What is a Protocol?
A protocol is a set of rules that governs the communications between computers on
a network. These rules include guidelines that regulate the following characteristics
of a network: access method, allowed physical topologies, types of cabling, and
speed of data transfer.

The most common protocols are:


 Ethernet
 Local Talk
 Token Ring
 FDDI
 ATM

What is Networking Hardware?


Networking hardware includes all computers, peripherals, interface cards and other
equipment needed to perform data-processing and communications within the
network.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
CLICK on the terms below to learn more about those pieces of networking hardware.

This section provides information on the following components:


1. File Servers
2. Workstations
3. Network Interface Cards
4. Switches
5. Repeaters
6. Bridges
7. Routers

File Server
The core of most networks is a file server. It is a very quick computer with a
fast network interface card, lots of RAM, and storage capacity. This machine houses
the network operating system software as well as any other software programs and
data files that must be shared.

Workstations
Workstations are all of the user computers that are a part of a network. A computer
with a network interface card and networking set up is called a typical workstation.
software as well as the
necessary cables.
Because files can be stored
on the file server,
workstations do not always

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
require floppy disk devices. You can use almost any machine as a network
workstation.

Network Interface Cards


Cards for Network Interfaces The physical link between the computer workstation
and the network is provided by the network interface card (NIC). The majority of
NICs are internal, meaning the card slides into a computer expansion slot. External
boxes that are connected to a serial or SCSI connection are used by certain
computers, like the Mac Classics. Network interface cards that slide into PCMCIA
slots or those that are incorporated into laptop computers are now available.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Switch
A concentrator is a device that serves as a central location for workstation, server,
and peripheral connections to be connected. Twisted pair cable is connected from
every workstation to a central switch or hub in a star architecture. The majority of
switches are active, meaning they electrically boost the signal as it passes between
devices. Instead of broadcasting network packets like hubs used to do, switches now
memorize computer addresses and transport the data straight to the appropriate
spot. The switches are:
 Usually configured with 8, 12, or 24 RJ-45 ports
 Often used in a star or star-wired ring topology
 Sold with specialized software for port management
 Also called hubs
 Usually installed in a standardized metal rack that also may store net
modems, bridges, or routers

Repeaters
Since a signal loses strength as it moves along a cable, it is often required to amplify
the signal with a device called a repeater. The repeater electrically enhances the
signal it receives and rebroadcasts it. Repeaters can be integrated into a
concentrator or used as standalone devices. They are employed when your network
cable's overall length surpasses the requirements for the particular cable type.
Bridges
A bridge is a tool that divides a big network into two more manageable, smaller
networks. A bridge can be used to connect an older wiring system to a more modern
network while adding wiring. In order to deliver information packets to the right place,
a bridge keeps an eye on the information flow on both sides of the network. The
majority of bridges have the ability to "listen" to the network and automatically
determine each computer's address on both sides. Each message can be examined
by the bridge, which can then broadcast it to the opposite end of the network if
needed.
Routers
A router functions similarly to a super intelligent bridge in that it transfers data
between networks. Based on the origin and destination address, routers choose the
optimal route for a message. The router is intelligent enough to recognize when to
reroute traffic via detours and back routes in order to avoid head-on collisions. You
will need to buy a router if you wish to link your school's local area network (LAN) to
the Internet. In this instance, the router acts as a mediator between the data on your
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
local area network (LAN) and the Internet. Additionally, it chooses the most efficient
path for data transmission across the Internet. Routers are capable of:
 Direct signal traffic efficiently.
 Route messages between any two protocols.
 Route messages between linear bus, star, and star-wired ring topologies.
 Route messages across fiber optic, coaxial, and twisted-pair cabling.

What is Network Cabling


Information often travels from one network device to another using cable. With LANs,
a variety of cable types are frequently utilized. While some networks will only use
one kind of cable, others will employ a range of cable types. The topology of a
network affects the kind of cable that is selected for it. size, and protocol. The
building of a successful network requires an understanding of the properties of
various cable types and how they connect to other parts of a network.
The following sections discuss the types of cables used in networks and other
related topics.
 Unshielded Twisted Pair (UTP) Cable
 Shielded Twisted Pair (STP) Cable
 Coaxial Cable
 Fiber Optic Cable
 Wireless LANS

Unshielded Twisted Pair (UTP) Cable


Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks

Type Use
Category 1 Voice Only (Telephone Wire)
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Category 2 Data to 4 Mbps (Local Talk)
Category 3 Data to 10 Mbps (Ethernet)
Category 4 Data to 20 Mbps (16 Mbps Token Ring)
Category 5 Data to 100 Mbps (Fast Ethernet)

Unshielded Twisted Pair Connector


The standard connector for unshielded twisted pair cabling is an RJ-45 connector.
This is a plastic connector that appears like a huge telephone-style connector. The
RJ-45 can only be entered in one direction thanks to a slot. Registered Jack, or Ri
for short, indicates that the connector adheres to a standard that was taken from the
telephone sector.
Shielded Twisted Pair (STP) Cable
UTP's vulnerability to electrical and radio frequency interference is a drawback.
Although shielded twisted pair (STP) is appropriate for electrically erratic situations,
the additional shielding may make the cables somewhat heavy. On networks with a
Token Ring topology, shielded twisted pairs are frequently utilized.

Coaxial Cable

The core of coaxial cabling is a single copper conductor. Between a braided metal
shield and the center conductor, there is an insulating layer of plastic. Any external
interference from motors, fluorescent lights, and other computers is reduced by the
metal barrier.

Wireless LANS

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Some networks are wireless, while others are connected by wiring. Wireless LANs
connect workstations to file servers or hubs via high frequency radio waves, infrared
light beams, or lasers. On a wireless network, every workstation and file server has
an antenna or transceiver to transmit and receive data. Transceivers communicate
with one another as though they were physically present. For larger distances,
wireless communications can also be conducted by satellite, microwave
transmission, or cellular telephone technologies.
Wireless networks are great for allowing laptop computers or remote computers to
connect to the LAN. Wireless networks are also beneficial in older buildings where it
may be difficult or impossible to install cables.
What is a Network Operating System?
Network operating systems (NOS) manage the operations of numerous computers
over a network, in contrast to operating systems like DOS and Windows, which are
made for a single user to handle a single computer. To maintain the network's
smooth operation, the network operating system serves as a director.
The two major types of network operating systems are:
 Peer-to-Peer
 Client/Server

Peer-to-Peer
Peer-to-peer network operating systems enable users to
access shared resources on other computers as well as
exchange files and resources on their own machines. They lack a centralized
management source and a file server, though. Every machine in a peer-to-peer
network is regarded as equal and has the same capacity to utilize the network's
resources. Small to medium local area networks are the main target market for peer-
to-peer networks. Programs that can serve as peer-to-peer network operating
systems include Windows for Workgroups and AppleShare.

Advantages of a peer-to-peer network:


 Less initial expense - No need for a dedicated server.
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
 Setup - An operating system (such as Windows XP) already in place may only
need to be reconfigured for
peer-to-peer operations.

Disadvantages of a peer-to-peer
network:
 Decentralized - No
central repository for files
and applications.
 Security - Does not provide
the security available on a
client/server network.

Client/Server

Operating systems for client/server networks enable the network to consolidate


operations and applications into one or more specialized file servers. The file servers
act as the system's central component, granting access to resources and ensuring
security. The resources on the file servers are accessible to individual workstations,
or clients. Regardless of a user's physical location, the network operating system
offers the means to integrate all of the network's components and enable multiple
users to share resources at the same time. Client/server network operating systems
include Windows 2000 Server and Novell Netware.
Advantages of a client/server network:
 Centralized - Resources and data security are controlled through the server.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
 Scalability-Any or all elements can be replaced individually as needs increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple
platforms.

Disadvantages of a client/server network:


 Expense - Requires initial investment in dedicated server.
 Maintenance - Large networks will require a staff to ensure efficient operation
 Dependence - When server goes down, operations will cease across the
network

Information Sheet 6.2,4: Network Cabling Configuration


UTP Cable
A UTP cable is one of the most popular LAN cables. This cable consists of 4 twisted
pairs of metal wires (that means there are 8 wires in the cable). Adding RJ45
connectors at both ends of the UTP cable it becomes a LAN cable they usually use.
Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this
side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire arrangement
table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable. (Any
cable in this page is directionless--- that means you can set either end of the cable to
either device.)

How to see the wire arrangement

Take the UTP cable with your left hand and a RJ45 connector with your right hand.
Hold the RJ45 connector in the way you can see the contact metal face of the RJ45
connector.
10 Base T/100 Base T Straight
10BaseT and 100BaseT are most common mode of LAN. You can use UTP
category- 5 cable for both mode. (You can use UTP category-3 cable for 10BaseT, in
which there are only 3 wires inside the cable.)

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
A straight cable is used to connect a computer to a hub. You can use it to connect 2
hubs in the case one of the hubs has an uplink port (and you use normal port on the
other hub).

Pind ID Side A Side B


1 Orange-White Orange-White
2 Orange Orange
3 Green-White Green-White
4 Blue Blue
5 Blue-White Blue-White
6 Green Green
7 Brown-White Brown-White
8 Brown Brown

10 Base T/100 Base T Cross


A cross cable for 10BaseT and 100BaseT is used to connect 2 computers directly
(with ONLY the UTP cable). It is also used when you connect 2 hubs with a normal
port on both hubs. (In other words, the cross cable is used relatively in a rare case.)
Pin ID Side A Side B
1 Orange-White Orange-White
2 Orange Orange
3 Green-White Green-White
4 Blue Blue
5 Blue-White Blue-White
6 Green Green
7 Brown-White Brown-White
8 Brown Brown

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Information Sheet 6.2.5
How to Configure a Peer Network in Windows 98

To create a peer network, you must have the following components:


•A network interface or Local Area Network (LAN) adapter for each computer. The
same
manufacturer and model of network card is preferred.
• Cabling that is supported by the network cards.
• Windows 98 drivers for the network cards.
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
• A common network protocol.
• A unique computer name for each computer.
To create a peer network, follow these steps for each computer connected to the
network:
1. Shut down the computer and install the network card and appropriate cabling for
each computer.
2. Start Windows and install the network drivers. Windows may detect your network
card and install the drivers when you start the computer. If the network card drivers
are not included with Windows, follow the manufacturer's instructions about how to
install the network drivers.
3. Choose a client and a common protocol for each computer.
To do this, follow these steps:
a. Click Start, point to Settings, click Control Panel, and then double-click Network.
b. Click Add, click Client, and then click Add.
C In the Manufacturers box, click the appropriate manufacturer, click the appropriate
client in the Network Clients box, and then click OK.
d. Click Add, click Protocol, and then click Add
e. In the Manufacturers box, click the appropriate manufacturer, click the appropriate
protocol in the Network Protocol box, and then click OK.
4. Configure a peer server. Each computer that is configured for File and Printer
Sharing can act as a server. To configure a computer for File and Printer Sharing,
use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click Network.
b. Click File and Print Sharing, click one or both options to share files and printers,
click OK, and then click OK again.
c. Click Yes when you are prompted to restart your computer.
5. Give each computer a unique computer name. To do this, use the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click Network.
b. On the Identification tab, type a unique name in the Computer name box.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
c. Click OK, and then click Yes when you are prompted to restart your computer.

Windows XP Networking
The Windows XP New Connection Wizard supports dialup and broadband, the two
main types of Internet connections. To access the network connection setup wizard
in Windows XP, go to the Connect To and Show all connections options in the Start
menu, as indicated below. Like earlier versions of Windows, Windows XP offers a
network connection setup wizard that breaks down a task into individual steps and
walks the user through each step one at a time.

The same feature is also accessible via the Network Connections icon in Control
Panel

Choosing either of the above options causes a new window to appear on the
desktop as shown below. On the right, this window displays icons for any pre-
existing connections. The Create a new connection option on the left allows new
connections to be set up.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Clicking the Create a new connection option from the Network Connections dialog
activates the wizard as shown below.

Clicking Next presents the user with three main choices for Internet and private
network setup as shown below.

The Connect to the Internet option supports several types of Internet connection.
setup. This option allows the user to choose from a list of ISPs, use a setup CD-
ROM provided by their ISP, or set up a connection manually.
Connect to the network at my workplace supports client-side set up of both dialup
remote access and VPN services.
The Set up an advanced connection option supports serial, parallel and infrared port
networking setups. This option also allows the user to enable certain types of
incoming network connections.

Setting up an Internet Connection


The Getting Ready page presents three choices as shown below:
The Choose from a list of Internet Service Providers option gives instructions for
setting up an account with an ISP, then making the Internet connection through that
new account.
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
The Set up my connection manually option sets up connections for accounts that
have already been opened with an ISP (username and password are ready for use).
The Use the CD I got from an ISP option should be used when possessing an
Installation CD-ROM from one of the service providers.

By default the first option Get online with MSN (Microsoft Network) is selected. To set
up a new connection to MSN, click Finish. To set up a new connection to various
other ISPs, change the radio button selection to the second option and then click
Finish.

After choosing MSN and clicking Finish, the Windows XP network connection wizard
closes and a new window open.

This window opens the MSN Explorer Wizard. If you answer "yes," a key is created
in the Windows Registry that enables access to MSN email from the Windows XP
Start Menu; if you answer "no," that step is skipped. The MSN wizard then launches
automatically. It requires a working phone line and a working modem in order to set
up an MSN account and dial-up Internet connection.
Other ISP Internet Connection Setup

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
After choosing an alternate ISP clicking Finish, the Windows XP network connection
wizard closes and a new Windows Explorer window opens as shown below.

The first shortcut launches the MSN window shown above. The second shortcut
launches a new Internet Connection Wizard. This wizard dials a public phone
number to obtain a list of ISP referrals from Microsoft. Obviously, this wizard will
provide a limited list of service providers and not necessarily the best ones for each
individual's needs.
These shortcuts, installed in C:\Program Files\Online Services, can be accessed at
any time from Windows Explorer. It is not necessary to navigate through the
Windows XP network connection wizard to execute them.
This wizard assumes an account has been opened previously. Manual connections
require the username (account name) and password from a working ISP service.
The next step presents three options for creating a manual connection.
The Connect using a dial-up modem option works for phone line Internet services
(either traditional dial-up or ISDN).
The Connect using a broadband connection that requires a user name and
password option works for DSL, or cable modem Internet services that use PPPOE.
The Connect using a broadband connection that is always on option works for
true "always on" DSL or cable modem services (those that do not require a
username/password) as specified in their service agreement.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
This option was offered by Microsoft solely for informational purposes. Typically,
service providers produce their setup CDs with all the operating system configuration
information in a single, self-contained bundle. As a result, clicking Finish does
nothing except close the wizard.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Operation Sheet 6.2.5
Setting XP Network Connection
Equipment, Tools and Materials Required:
 UTP cables
 4 Computer units
 1 hub

Given the following materials, set-up a network connection on four computers.


Criteria Passed Failed
Safety Precautions are
observed.
All the UTP are properly
connected to the
computer and hub.
Computers are properly
connected and seen in the
network.
Proper boot-up and
shutdown of the computer
is observed.
Total:

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
INFORMATION SHEET 6.2.6:
Accidental Event Checklist
Accident reports may contain the following details:
Name of person Injured
Date and Time of accident
Type of Injury
First Aid given
Action taken to prevent further accidents.
ACCIDENT, DANGEROUS OCCURRENCE AND INCIDENT REPORT

Date:_______________

Name:________________

Year & Section:_____________

A. Subject of Report

(Please tick the box)

 Injury

 Dangerous occurrence

 Damage to equipment

 Accidents/Incidents with the potential to injure or cause damage

B. Place, Date, Time:

Exact location of event:______________

Time of event:________________

Teacher-In-charge at the time of event:___________

C. Nature of Injury:________________________

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
D. First Aid Treatment:________________________
Sample Accident Report

ACTIVITY SHEET 6.2.6

1. Simulation.

1. Group yourselves into six.

2. Show some situation where it can lead to an unwanted accidental event.

Show the class on how you would come up with this.

3. The performance will be5-rated according


Excellently to the following:
performed

Performance Criteria: 4-Very Satisfactorily performed

3-Satisfactorily performed

2-Fairly performed

1-Poorly performed

II. Make an Accident Report that you may encounter inside the computer laboratory.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Program Course: Computer Hardware Servicing NCII
Unit of Competency: Configured computer systems and networks
Module: Configuring computer systems and networks

LO3. INSPECT AND TEST CONFIGURED COMPUTER SYSTEMS AND


NETWORKS

ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the configuration done on the
systems and networks conforms with the manufacture’s instruction/manual
2. Computer systems and networks are checked to ensure safe operation.
3. Report is prepared and completed according to company requirements.

REFERENCES:

 Introduction to PC Hardware and Troubleshooting by Mike Myers

 http://support.microsoft.com

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
INFORMATION SHEET 6.3.1

SOP in Computer Network System Configuration

You have learned from Information Sheet #2.2.6 how to configure a Peer-to-Peer
network and XP connection with Internet. Now to check If the LAN connection is
really working, you must try to share your resources and accessed shared resources
of other computer. Make sure that you follow the standard operating procedures in
configuring. network to achieve successful operation.

Sharing Resources and Accessing Shared Resources

1. Open My Computer, double-click the C: drive, and create a new folder on the C:
drive. Name it

Shared. Right-click the Shared folder and select Properties.


2. In the Shared Properties dialog box, select the Sharing tab. Notice that the. Select
the Share This Folder button. Type the Share Name. Click Apply and the computer
you are linked to should be able to view your Shared folder.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
3. Right-click My Network Places, which should be located on your desktop. Select
Properties. Right-click your connection (look for a name like Local Area Connection)
and again select Properties. In your Local Area Connection Properties dialog box,
select File and Print Sharing for Microsoft Networks and click OK. If you don't see an
option for File and Print Sharing, click Install and select a service and then click Add.
Now select the File and Print Sharing option.

4. Open My Network Places double click the icon-and select the Entire Network
option under Other Places at the left of the window. In the main (right-hand) pane,
you should see one or more options. Double-click the Microsoft Windows Network
icon.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
5. You're now at the main network screen, where you should see what's, called
workgroup. A workgroup is a basic group of computers connected to the same
Internet network. Double-click the workgroup to see all the computers connected to
your Ethernet network.

At this point, you can access any of the other computers and see what folders they
have shared. If you don't see any computer but your own, just walt a few minutes
and refresh your screen. Then it's time to troubleshoot the network problems.

In a network, other peripherals such as printer and faxes could also be shared. You
could use one computer in a network of 10 computers. Click the Print command,
when the dialog box appears click Find Printer. Then click Browse. Find the location
of the printer you will use.

If you don't have any printer installed in your computer, here's the step on how:
Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
TO ADD A PRINTER:

1. Click Start button, then point to Printer and Faxes.

2. A window will be displayed showing Click Add a Printer on the Taskpane (if there are
printers already installed).

3. To continue, click Next.

4. Select what kind of printer you are going to connect, Local printer or Network

5. Select Printer port.

6. Below Manufacturer, Click on the name of the printer's manufacturer.


Manufacturers are listed in alphabetical order and you may have to click on the little
down arrow until the manufacturer's name appears in the list.

Below Model, Click on the model of the printer you will be using. Model names are
listed in alphabetical order and you may need to click on the little down arrow until
the model name appears in the list.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Note: You can often find the manufacturer and model names by looking on the
printer itself.

7. Click the Next button. Windows will check to see if it has the software necessary
to communicate with the printer (the software your computer needs to communicate
with devices like printers, monitors, and disk drives is known as a driver). If so, it will

install the software automatically.

Note: If you receive a message saying that Windows was unable to locate the
necessary files, you will need to get the necessary software before continuing Most
often, the printer manufacturer's Web site will have a sectionca Porivers FOD Which
you can download the software necessary to use their products. If youare unable to
locate the software on the manufacturer's Web site, inquire within your department to
see if someone is in possession of a software installation disk for the printer. Once
you have obtained the necessary software, click here for instructions on installing a
driver.

8. Assign your Printer name. Click Next. If you want to test page, click Yes. Click
Next.

9. Then Finish. Right-click on the printer you installed. Click Set as Default.

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
Writing an Accomplishment Report

Accomplishment Report is done when you have finished a certain job. This
report may be in narrative or tabular form.

Sample of an Accomplishment Report

Accomplishment Report

Name: Date:

Assigned task Working properly Not working Connected in a


network
PC 1 ✓ ✓
PC 2 ✓ ✓
PC 3 ✓
Printer ✓ ✓

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
OPERATION.3.1

Accessing Printer in a Network

Materials, Equipments:

 Computer Units

 Hub

 Printer

 Given the following materials and equipments, access one document file on
other computer in a network.

 Print the file you open with the use of the network printer.

 Make an Accomplishment Report on this operation.

CRITERIA RATING
Computers are connected in the 30%
network.
All the peripherals are properly 20%

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
inspected.
Shared files are located and opened a 30%
document in the computer.
Accessed file has been printed. 20%
Total : 100%

ANSWER KEYS

Self-Check# 6.1.2

1. Internet
2. Intranet

3. GAN

4. WAN

5. MAN

6. Topology

7. Network

8. LAN

9. Star topology

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II
10. Ring topology

Self-Check# 6.1.3

 tweezers

 magnifying glass

 multi-tester

 side-cutter pliers

 soldering iron

 cable tie

 Computer Storage device

 adapter

 manuals

 long nose pliers

Self-Check 6.2.1

Googles
-POMARDWARE SERVICIINerng our eyes
Coverall

-worn to prevent the body or clothes from any types of dirt

Apron

also worn to protect the body from dirt

Gloves

used in handling objects without hurting the hands..

Date Developed: Document No.

Jan. 2025

Developed by:
Abaño, Catalla, Gonzales, Segui, Revision No.
Tampor
Page
Planning
Training Session Issued by:
SLSU Lucena Campus
COMPUTER HARDWARE SERVICING NC II

You might also like