SlideShare a Scribd company logo
Information and
Communications
Technology
Learner’s Material
9
GOVERNMENT PROPERTY
NOT FOR SALE
ALLOTTED TO
District/ School: _________________________________________
Division _________________________________________________
First Year of Use: _________________________________________
Source of Fund (Year included):__________________________
Computer Hardware Servicing
ii
Department of Education
Republic of the Philippines
Technology and Livelihood Education – Grade 9
Learner’s Material
First Edition, 2013
ISBN: ___________
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Published by the Department of Education
Secretary: Br. Armin A. Luistro FSC
Undersecretary: Dina S. Ocampo, Ph.D.
Assistant Secretary: Lorna Dig Dino, Ph.D.
Printed in the Philippines by ____________
Department of Education-Instructional Materials Council Secretariat (DepEd-IMCS)
Office Address: 2nd Floor Dorm G, Philsports Complex, Meralco Avenue,
Pasig City, Philippines 1600
Telefax: (02) 634-1054, 634-1072
E-mail Address: imcsetd@yahoo.com
Development Team of the Learner’s Material
Authors:
Owen M. Milambiling, Cesar T. Arriola, Dante B. Bermas, Ronaldo V. Ramilo,
Rosalie P. Lujero, Diana Marie B. Dagli, Dr. Virgilio O. Guevarra, and Maria Angelica
G. Mates
Editors: Dr. Paraluman R. Giron, Ofelia C. Flojo, and Perla H. Cuanzon
Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas
Illustrator and Layout Artists:
Subject Specialist: Owen M. Milambiling
Management Team: Dr. Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Mariñas,
Dr. Jose D. Tuguinayo, Jr.
iii
TABLE OF CONTENTS
Module 1: PERSONAL ENTREPRENEURIAL COMPETENCIES
Explore your Understanding ………………………………………….… 1
Guide Questions …………………………………………………………. 2
Pre-Assessment …………………………………………………………. 2
Self-Assessment ………………………………………………………… 5
Lesson 1 ……………………………………………………………………. 6
Firm Up ……………………………………………………………………. 8
Deepen …………………………………………………………………... 10
Transfer ………………………………………………………………….. 12
Post-Assessment ………………………………………………………. 14
Feedback ……………………………………………………………….. 16
Module 2: ENVIRONMENT AND MARKET
Explore your Understanding ………………………………………….. 18
Lesson 1: Needs and Wants of People ……………………………….. 19
Lesson 2: Generating Ideas for Business ……………………………. 20
Lesson 3: Selecting the Right Ideas…………………………………… 22
Lesson 4: Environmental Scanning …………………………………… 23
Firm Up ………………………………………………………………….. 24
Deepen ....……………………………………………………………….. 24
Transfer ………………………………………………………………….. 26
Post-Assessment ………………………………………………………. 27
Feedback ………………………………………………………………… 28
Module 3: INSTALL COMPUTER SYSTEMS AND NETWORKS
Introduction ………………………………………………………………… 30
Objectives………………………………………………………………….. 31
Pre- Assessment …………………………………………… 32
Lesson 1: PLAN AND PREPARE FOR INSTALLATION …………….. 33
1.1 Safety Measures: OHS Policies and Procedures……… 33
1.2 Understanding Computer System…………………………… 37
1.3 Computer Systems, Devices and Peripheral ………..……. 42
iv
1.4 Network…………………………..……………………………. 57
1.5 Materials, tools, equipment and testing devices………….. 61
Lesson 2: INSTALL EQUIPMENT / DEVICES and SYSTEMS ……….… 65
2. 1 Safety Precautions…………………………..……………… 65
2.2 System Specification..………………………………………. 69
2.3 Installation of Hardware components and other peripherals…… 73
2.4 Installing Operating System …………………………….…… 91
2.5 Windows 7 installation ……………………………………….. 107
2.6 Basic Computer Configuration Set- up …………………….. 119
Lesson 3: CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM ……. 127
3.1. Testing Installed equipment/devices/system………………….. 127
Summative Test ……………………………………………………………….. 134
Post- Test ………………………………………………………………………. 138
Glossary of Terms.…………………………………………………………….. 139
Acronyms ………………………………………………………………………. 141
References …………………………………………………………………….. 143
Module 4: DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEM …. 145
Pre- assessment ………………………………………………………………… 147
Lesson 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEM.. 145
1.1 Safety Precautions ………………………………………… 148
1.2 Types of Computer System Error …..…………………….. 151
1.3 Diagnosing Computer Systems …………………….. 153
Lesson 2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS
AND NETWORKS……………………………………………………………… 158
2.1 Safety Precautions ………………………….………………. 158
2.2 Basic Concepts of Electricity……………………………… 159
2.3 Techniques for Testing Computer System…………………. 165
2.4 Tools for Testing Computer System..………………………. 177
2.5 Troubleshooting Computer System Network ……………... 180
2.6 Computer System and Network Configurations ………….. 186
Lesson 3: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS
AND NETWORKS …………………………………………………………………….. 195
3.1 General Safety Tips and Reminders ……………………… 196
3.2 Replacing Different Components …………………………. 200
v
3.3 Upgrading your Computer Components ……………………. 203
3.3 Basic Network Errors ………………………………………….. 211
3.4 Award BOS / CMOS Setup …………………………………… 220
Lesson 4: TEST SYSTEMS AND NETWORKS……………………………………….. 230
4.1 Testing Computer System …………………………………….. 230
4.2 Error Beep Codes ………………………………………………. 236
Post Assessment ………………………………………………………………. 245
Summative Test ………………………………………………………….……. 247
Glossary ……………………………………………………………………….. 252
References …………………………………………………………………….. 254
1
Technology and Livelihood Education
Entrepreneurship
Module 1: Personal Entrepreneurial Competencies
Have you ever thought running your own business? Entrepreneurship has brought
great success to some, but it's not a career path for all. Do you think you can handle the
stress and hard work that go with running a small business enterprise? The key to succeed
in a small business enterprise is your entrepreneurial ability to produce the desired results.
Before embarking on your first business, it's worth spending some time evaluating your own
preparedness for entrepreneurship. Try to examine your own personality and compare it
with the Personal Entrepreneurial Competencies (PECs) of a successful entrepreneur. Ask
yourself if you are ready to enter into the world of business. If your answer is yes, take this
reminder: “Successful entrepreneurs continuously develop and improve their PECs”.
EXPLORE Your Understanding
Essential Question
- How does one ensure success in a chosen career?
Content Standard
- The learner demonstrates understanding of Personal Entrepreneurial
Competencies (PECs)
Performance Standard
2
- The learner prepares an activity plan that addresses his/her development areas
based on his/her PECs and improves further his/her areas of strength.
Guide Questions:
1. Why is there a need to assess ones personal characteristics, attributes, lifestyles,
skills and traits?
2. What are the personal entrepreneurial competencies of a successful entrepreneur?
3. Why is it necessary to compare ones personal characteristics, attributes, lifestyles,
skills and traits to the personal entrepreneurial competencies of a successful
entrepreneur?
4. How do you relate your PECs to the PECs of a successful entrepreneur?
5. Based on the data that you have gathered from the interview with the successful
entrepreneur in your community, how do you develop your PECs?
6. Can you prepare an action plan that addresses your areas of development and
strength based on your PECs?
7. How does your action plan help sustain your strong areas and or address your
development areas based on your PECs?
Hello there! Are you ready to assess yourself to become a
successful entrepreneur in the future? As honest as you could, please
answer the pre-assessment below.
Pre- Assessment
A. Matching Type
Directions: Column A lists the characteristics of a successful entrepreneur.
Draw a line from the items in Column A that connects the correct
definition of terms listed in Column B.
Column A Column B
3
1. Hardworking
2. Self-confident
3. Profit-Oriented
4. Goal-Oriented
5. Persistent
6. Responds to feedback
7. Willing to listen
8. Committed
9. Reliable and has integrity
10.Risk-taker
a. Ability to set realistic targets.
b. Interest in money generation.
c. To succeed, one must believe in one’s
self.
d. Working diligently and industriously.
e. Being able to listen to the advice of
others.
f. Obtaining useful feedback and advice
from others.
g. Being patient and strives to achieve the
goal.
h. Ability to take measured or calculated
risks.
i. Being honest, fair and trustworthy.
j. A major priority in the entrepreneur’s
life.
Are you done? This time you will do another set of pre- assessment
which could give you a better understanding of what this module is all about.
Are you ready? So, let’s begin!
B. Multiple Choice.
Directions: Read and study the situation that describes the entrepreneurial
characteristics or attributes. Answer the question by writing the letter of
your choice in your assignment notebook or in the answer sheet provided.
Mrs. Gina Magno opens up her own retail business. She knows that her personal
entrepreneurial characteristics are insufficient to ensure a successful operationalization
of a business that she has in mind. Your answers to the questions below will help in
developing her PECs.
4
1. What PECs must she possess if there are customers who complain about the quality of
her product?
a. Patience
b. Hardworking
c. Versatile
d. All of the above
2. Which of the following is NOT considered as a characteristic of an entrepreneur?
a. Copes with failure
b. Dependent
c. Persistent
d. Opportunity seeker
3. If she wants to ensure a profitable business operation, what characteristic will she
maintain?
a. Commitment
b. Goal oriented
c. Futuristic
d. Opportunity seeker
4. Mrs. Magno follows the advice of a friend to be flexible especially if she intends to
open a retail business. What PECs has been demonstrated by Mrs. Magno?
a. Self- confidence
b. Reliable and has integrity
c. Open to feedback
d. Persistent
5. She tells Mary, her best friend that she has a strong will and does not give up to find a
solution to a business problem. What PECs has been demonstrated by Mrs. Magno?
a. Hard work
b. Persistence
c. Self-confidence
d. Risk- taking
5
This time evaluate your own personal entrepreneurial
characteristics to determine whether you too, can become an
entrepreneur. If you are ready, you may begin!
C. Self- Assessment
Directions: Below is a list of Personal Entrepreneurial Competencies (PECs) of a
successful entrepreneur. Put a check mark on the 2nd column that indicates
your strong PECs. The check mark on the 3rd column are those PECs that
need to be developed.
Personal Entrepreneurial
Competencies of an
Entrepreneur
My Personal Entrepreneurial Competencies
Strength Needs to be Developed
Hardworking
Self-confident
Builds for the future
Profit-oriented
Goal-oriented
Persistent
Copes with failure
Responds to feedback
Demonstrates initiative
Willing to listen
Sets own standards
Copes with uncertainty
Committed
Builds on strengths
Reliable and has integrity
Risk-taker
6
Did you enjoy examining yourself? You can become a successful
entrepreneur someday. Please don’t feel bad when you discover that
there are still to be developed. Continue your exploration to find
answers to these underdeveloped PECs.
Lesson1. Important Entrepreneurial Traits
The following are the fundamental characteristics of an entrepreneur:
1. Hard working: If you are determined to run your own business, you must
concentrate on your work either as a producer or a seller. The success of your
business depends on how much time and effort you will spend on it.
2. Self- Confidence: You must have a strong faith in your ability despite the problems
that you will encounter along the way.
3. Future-Oriented: Once a person enters in a line of business, you must understand
that you are in a non-stop contract that an entrepreneur should understand. It may
take several years to build up a business to a reasonable standard. The goal for
most successful business people is to build a secure job and stable income for
themselves based on their own ability.
4. Profit-Oriented: When you enter into the world of business, obviously, you are
looking for income because you know that this will be your bread and butter not only
for you but also for your family. Therefore, you must see to it the business can
generate income. Another plan of action is to expand your own business through
the use of your generated income.
5. Goal-Oriented: An entrepreneur is forward looking. You have an advanced
preparation for your business. You set a long-term goal for the activities that are
needed, an extensive preparation for the production process and procedures that
you need to go through to acquire, human and non-human resources. Everything in
7
your business will have to be set clearly, organized, and planned depending on the
goal you want to achieve.
6. Persistence: Differences in opinion and judgment. Your opponent can be a part of
the rejection on what you intend to do for your endeavor. As an entrepreneur, you
must be firm, strong-willed, and stick or follow your own belief.
7. Copes with Failure: “Learn from your mistakes”. As an entrepreneur, you must
learn how to deal with the frustrations and failures instead, turn these into productive
learning experiences.
8. Responds to Feedback or Open to Feedback: You must be concerned to know
how well you are doing and keep track of your performance. You must obtain useful
feedback and advice from others.
9. Take the Initiative: A successful entrepreneur takes the initiative. You must put
yourself in a position where you personally are responsible for the failure or success
of your business.
10. Willing to Listen: Take time to listen to the advice, suggestions, and
recommendations of fellow entrepreneurs. It will help your business grow.
11.Set your Own Standards: This involves developing and using logical, step-by-step
plans to reach the goals, or offering evaluation alternatives, monitoring progress,
and switching to successful strategies for the goal you want to achieve. To be a
successful entrepreneur you must take into consideration that sales and production
depend on your own standards.
12. Copes with Uncertainty: Pursue your vision to be a successful entrepreneur, you
should know how to handle unusual events that may happen in the business which
include problems in managing the workers, problems on the delivery of goods and
services, and the problems on demand and production. You must be patient in
dealing with these uncertainties.
13. Committed: You should know that in your business, personal needs, attachment to
your friends, families and relatives are set aside. You must separate the money for
your business from the amount that you need to spend for personal obligations and
lifestyles.
8
14. Builds on Strengths: Successful business people base their work on strengths.
Use your manual skills, knowledge in creating products or services, knowledge in
trade and industry, ability to make and use of a wide network of contacts to build
your business.
15.Reliable and has Integrity: An entrepreneur must build a good reputation, possess
the courage to do the right thing, do what you say, walk your talk, be loyal, and be
fair in dealing with the subordinates and costumers.
16.Risk-Taker: Risk sometimes cannot be anticipated. When misfortunes happen,
consider these as challenges and work them out and set good alternatives. Risks
may result to loss of your business or even bankruptcy.
FIRM UP your Understanding
Activity1: Aligning one’s PECs
Directions: Choose from the list below the characteristics and traits that best describe
your own personal entrepreneurial characteristics. Find ways on how to align
them according to the personal entrepreneurial characteristics of an
entrepreneur which were discussed earlier. Write your answers in the activity
sheet provided.
Creative Resourceful Persistent Organized Independent
Confident Risk taker Observant Competent Trustworthy
Optimistic Passionate Flexible Sensitive Committed
Dynamic Efficient Hardworking Decision-maker Reliable
Knowledgeable Persevering Decisive Strong–minded Courteous
9
Example: My PECs
Try to design a concept map that indicates your traits, characteristics
and skills that you need to possess in order to become a successful
entrepreneur.
Activity 2. My PECs that need to be further improved
Directions: At the center of the street are arrows where positive and negative
characteristics and traits are written. Pick out the positive PECs that you are
already strong at, and write them down on the blank arrows on the left side.
PECs written on the arrows at the right side are the negative characteristics
that need to be further improved.
My PECs My simple definition
Things to do to align with PECs
of a successful entrepreneur
1. Creative
2. Organized
3. Competent
4. Observant
10
DEEPEN Your Understanding
Lesson 1 Strengthening your Identified PECs
Here are your guides on how to strengthen your own PECs.
1. React positively to criticisms and open to feedback.
2. Always demonstrate positive attitude to achieve a desired goal.
3. Always project strong and well-balanced behavior.
4. Always exercise the assertive style in your work environment.
11
5. Avoid being too passive and too aggressive.
6. Don’t let anyone worsen your business life.
7. Prioritize your business goal rather than personal goal in order to become a
successful entrepreneur.
8. Acquire specific skills for creating and maintaining a conducive work environment.
9. Be responsible in everything you do in your business.
10. Always observe business ethics in putting up a business.
Hello! I’m here once again reminding you whether you have achieved
a certain point that you could honestly tell that you are already
successful in strengthening your own PECs.
Let’ s see!
Activity 1: My techniques to strengthen PECs
Directions: From the given chart below, write at least six techniques on how you would
strengthen your own PECs. Write the PECs that you feel that you still need to
focus on to strengthen these.
Example: Self-confidence
12
TRANSFER Your Learning
Preparation of an Action Plan
Culminating Activity
Directions: Examine yourself once again. Make a short list of PECs that you need to
strengthen. From this activity, prepare of an action plan that requires further development.
You may opt to follow the suggested format below. You may improve or change it as long
as it suits your own plan of action.
Sample Action Plan
Self-
confidence
13
Specific Purpose Statement: ( Your vision of your future)
Ex. Developing self-confidence in retail business.
Focus
Area
Current
Situation Goal
Measures
of
Success
Actions
Required
Time
Frame
Reward/
Recognition
My PECs I need to
develop
my
undefined
characteris
-tics need
for my
retail
business.
such as:
_________
_________
_________
_________
_________
- To
exercise
my own
PECs
during
selling and
producing
products/
services
-To become
proficient
in my
chosen
skill.
Achieve
100%
completion of
development
of my own
PECs through
selling and
production of
products,
proper
manner when
dealing with
people.
-Selling
finished
products
derived
from
culminating
activities in
any of
chosen
career.
-Participate
in skills
competition
sponsored
by the NGO
and GO
-During
culminating
activities
-After
learning
the
principles,
theories,
process and
of any
chosen
career
-Earns
expected
income
-Outstanding
performance in
selling and
promoting
products and
services
Post-Assessment
14
Answer the post assessment below to determine whether there
is significant increase in your understanding of PECs. The feedback to
this post assessment is appended on page 16.
Good Luck!
A. Matching Type
Directions: Column A lists the characteristics of a successful entrepreneur.
Draw a line from the items in Column A that connects the correct
definition of terms listed in Column B.
Column A Column B
1. Hardworking
2. Self-confident
3. Profit-oriented
4. Goal-oriented
5. Persistent
6. Responds or open to
feedback
7. Willing to listen
8. Committed
9. Reliable and has integrity
10. Risk-taker
a. Ability to set realistic targets.
b. Interest in money generation.
c. To succeed, one must believe in one’s self.
d. Working diligently and industriously.
e. Being able to listen to the advice of others.
f. Obtaining useful feedback and advice from
others.
g. Being patient and strives to achieve the
goal.
h. Ability to take measured or calculated risks.
i. Being honest, fair and trustworthy.
j. A major priority in the entrepreneur’s life.
15
B. Multiple Choice.
Directions: Read and study the situation that describes entrepreneurial characteristics.
Then answer the question by writing the letter of your choice in your
assignment notebook or in the provided answer sheet.
Mrs. Gina Magno opens up her own retail business. She knows that her personal
entrepreneurial characteristics are insufficient to ensure a successful operationalization
of a business she has in mind. Your answers to the questions below will help in
developing her PECs.
1. What PECs must she possess if there are customers who complain about the quality
of her product?
a. Patience
b. Hardworking
c. Versatile
d. All of the above
2. Which of the following is NOT considered as a characteristic of an entrepreneur?
a. Copes with failure
b. Dependent
c. Persistent
d. Opportunity seeker
3. If she wants to ensure a profitable business operation, what characteristic will she
maintain?
a. Commitment
b. Goal oriented
c. Futuristic or future-oriented
d. Opportunity seeker
4. Mrs. Magno follows the advice of a friend to be flexible especially if she intends to
open a retail business. What PECs has been demonstrated by Mrs. Magno?
a. Self- confidence
b. Reliable and has integrity
c. Responsive to feedback
d. Persistent
16
5. She tells Mary, her best friend that she has a strong will and does not give up to find
a solution to a business problem. What PECs has been demonstrated by Mrs.
Magno?
a. Hard work
b. Persistence
c. Self-confidence
d. Risk- taking
Feedback
Pre-assessment/ Post- assessment
A. Matching Type
1.d 6. f
2.c 7. e
3.b 8. j
4.a 9. i
5.g 10. h
B. Multiple Choice
1. a
2. b
3. d
4. c
5. b
17
Technology and Livelihood Education
Entrepreneurship
Module 2: Environment and Market
One of your greatest dreams in life is to become a successful entrepreneur. As a
person, you are capable of developing your character and personality and how to
respond to some business challenges and opportunities. You can make things happen
by identifying the opportunities around you. You may ask yourself these questions:
What do people need? What products and services are available in the market today?
Can they be improved? How are they made or delivered? Can things be done better?
cheaper? faster? cleaner? Can a product which is used for specific purpose be also
used for some other purposes?
You slowly find answers to these questions as you decide to do the first step in
launching a business enterprise. Be cautious however, that you should develop a habit
of identifying opportunities around you. Only then, you will find the activity both exciting
and easy.
18
EXPLORE your Understanding
Essential Question
How does one select an entrepreneurial activity?
Content Standard
- The learner demonstrates understanding of environment and market that
relates with the career choice.
Performance Standard
- The learner formulates a business idea based on the analysis of the
environment and market
Guide Questions:
1. How does one determine the product to be produced or services to be offered
and delivered to the target market or customers in a particular community?
2. How does one select an entrepreneurial activity?
3. How can one respond effectively to a business enterprise?
Hello there! Are you ready to assess yourself if you are ready to
generate potential business ideas? Let’s try by answering the
succeeding pre-assessment.
Pre-assessment
1. The following are examples of peoples’ basic needs, except:
a. Recreation
b. Clothing
c. Shelter
d. Food
19
2. Which of the following should be considered first by a prospective entrepreneur
in choosing the right location for his/her store?
a. Types of merchandise
b. Access of the target customers
c. The attractiveness of the store layout
d. The prevailing prices of goods in the area
3. Thong plans to put a “digi-print” studio in their locality. Which of the following
will help him determine a successful plan for setting up of his business?
a. Survey of consumer associations
b. Checking for similar business to avoid competition
c. Getting feedback on the quality of service
d. Conduct a SWOT analysis
4. Ceasar studies the population in his immediate community. He is doing this to –
a. identify his would be “suki”.
b. predict his biggest buyer.
c. select his favorite costumers.
d. determine whom to sell his product or service.
5. When an entrepreneur improves and alter products to make it more appealing to
target consumers, he/she is doing an -------- of the product.
a. alteration
b. invention
c. innovation
d. improvisation
Lesson 1 Needs and Wants of People
Everyone has his or her own needs and wants. However, people have different
concepts of needs and wants. Needs in business are important things that every
individual cannot do without in a society. These include:
1. Basic commodities for consumption
2. Clothing and other personal belongings,
3. Shelter, sanitation and health
20
4. Education and relaxation
Basic needs are essential to every individual so he/she may be able to live with
dignity and pride in the community of people. These needs can obviously help you
generate business ideas.
Wants are desires, luxury and extravagance that signify wealth and an expensive
way of living. Wants or desires are considered above all the basic necessities of life.
Some examples are the eagerness or the passion of every individual which are non-
basic needs like; fashion accessories, shoes, clothes, travelling around the world, eating
in an exclusive restaurant; watching movies, concerts, plays, having luxurious cars,
wearing expensive jewelry, perfume, living in impressive homes, and others.
Needs and wants of people are the basic indicators of the kind of business that
you may engage into because it can serve as the measure of your success. Some
other good points that you might consider in business undertakings are the kind of
people, their needs, wants, lifestyle, culture and tradition, and social orientation that
they belong.
Lesson 2 Generating Ideas for Business
Here are some ways by which you may generate possible ideas for business.
1. Examine the existing goods and services. Are you satisfied with the product?
What do other people who use the product say about it? How can it be
improved? There are many ways of improving a product from the way it is made
to the way it is packed and sold? You can also improve the materials used in
crafting the product. In addition, you introduce new ways of using the product,
making it more useful and adaptable to the customers’ many needs. When you
are improving the product or enhancing it, you are doing an innovation. You can
also do an invention by introducing an entirely new product to replace the old
one.
Business ideas may also be generated by examining what goods and services
are sold outside by the community. Very often, these products are sold in a form
that can still be enhanced or improved.
2. Examine the present and future needs. Look and listen to what the
customers, institution, and communities are missing in terms of goods and
21
services. Sometimes, these needs are already obvious and felt at the moment.
Other needs are not that obvious because they can only be felt in the future, in
the event of certain developments in the community. For example, a town will
have its electrification facility in the next six months. Only by that time will the
entrepreneur could think of electrically- powered or generated business such as
xerox copier, computer service, digital printing, etc.
3. Examine how the needs are being satisfied. Needs for the products and
services are referred to as market demand. To satisfy these needs is to supply
the products and services that meet the demands of the market. The term
market refers to whoever will use or buy the products or service, and these may
be people or institutions such as other businesses, establishments,
organizations, or government agencies.
There is a very good business opportunity when there is absolutely no supply to
a pressing market demand.
Businesses or industries in the locality also have needs for goods and services.
Their needs for raw materials, maintenance, and other services such as selling
and distribution are good sources of ideas for business.
4. Examine the available resources around you. Observe what materials or
skills are available in abundance in your area. A business can be started out of
available raw materials by selling them in raw form and by processing and
manufacturing them into finished products. For example, in a copra-producing
town, there will be many coconut husks and shells available as “waste” products.
These can be collected and made into coco rags/doormat and charcoal bricks
and sold profitably outside the community.
A group of people in your neighborhood may have some special skills that can be
harnessed for business. For example, women in the Mountain Province possess
loom weaving skills that have been passed on from one generation to the next
generation. Some communities there set up weaving businesses to produce
blankets, as well as decorative items and various souvenir items for sale to
tourists and lowland communities.
Business ideas can come from your own skills. The work and experience you
may have in agricultural arts, industrial arts, home economics, and ICT classes
will provide you with business opportunities to acquire the needed skills which
will earn for you extra income, should you decide to engage in income-generating
22
activities. With your skills, you may also tinker around with various things in your
spare time. Many products were invented this way.
5. Read magazines, news articles, and other publications on new products
and techniques or advances in technology. You can pick up new business
ideas from Newsweek, Reader’s Digest, Business Magazines, Go Negosyo, KAB
materials, Small- industry Journal. The Internet serves as a library where you
may browse and surf on possible businesses. It will also guide you on how to put
the right product in the right place, at the right price, at the right time.
Listing of possible businesses to set up in an area may also be available from
banks or local non-government organizations.
Lesson 3 Selecting the Right Idea
Once you have embarked on identifying the business opportunities, you
will eventually see that there are many possibilities that are available for you. It
is very unlikely that you will have enough resources to pursue all of them at once.
Which one will you choose?
You have to select the most promising one from among hundreds and one
ideas. It will be good to do this in stages. In the first stage, you screen your
ideas to narrow them down to about five choices. In the next stage, trim down
the five choices to two options. In the final stage, choose between the two and
decide which business idea worth pursuing.
In screening your ideas, examine each one in terms of the following
factors:
1. How much capital is needed to put up the business?
2. How big is the demand for the product? Do many people need this product
and will continue to need it for a long time?
3. How is the demand met? Who are processing the products to meet the need
(competition or demand)? How much of the need is now being met (supply)?
4. Do you have the background and experience needed to run this particular
business?
5. Will the business be legal, not going against any existing or foreseeable
government regulation?
6. Is the business in line with your interest and expertise?
23
Your answers to these questions will be helpful in screening which ones
from among your many ideas are worth examining further and worth pursuing.
Lesson 4 Environmental Scanning
There is a need to conduct environmental scanning to identity the needs
and wants of people, the niche for your business mission, and to give attention to
trends and issues. This may also serve as an evaluation of the type of the
entrepreneurial activity appropriate in the community.
Environmental scanning is defined as a process of gathering, analyzing,
and dispensing information for tactical or strategic purposes. The environmental
scanning process entails obtaining both factual and subjective information on the
business environments in which a company is operating.
Environment in the community can be viewed according to its
technological, political, economic, and social aspects. For example, in the past,
people in the community used personal computers but the transmission of
development in terms of technology was interrupted because people were not
satisfied with what they have today. They still look for the changes in their life
and the corresponding in their environment.
As a future entrepreneur, you must be well-versed in this kind of
advancement and progression of your environment particularly in technology so
as to secure the success of your future business. Always think of something new,
something novel, authentic, reinvent the existing ones, and create your new
version of goods/products, and services. For instance, your own hair straightening
is herbal, while in the other salons it is made of synthetic chemicals. This kind of
changes being made will effect the existing principles in business and industries
that can be easily adapted to the changes in producing the products/services to
meet the needs and wants of people in the community.
24
FIRM UP Your Understanding
In generating business idea, you should first identify what type of business is suited to yoand the Threats in your environment to ensure that the
products/goods and services you are planning to offer will be patronized within the
easy reach by your target markets/consumers.
Bear in mind these simple rules for successful SWOT analysis.
 Be realistic about the strengths and weaknesses of your business when
conducting SWOT analysis.
 SWOT analysis should distinguish between where your business is today,
and where it could be in the future.
 SWOT should always be specific. Avoid any grey areas.
 Always apply SWOT in relation to your competition i.e. better than or
worse than your competition.
 Keep your SWOT short and simple. Avoid complexity and over analysis
 SWOT is subjective.
DEEPEN Your Understanding
People keep on searching for new things, new trends, and new
issues. For these reasons, an entrepreneur hurriedly responds to these needs
and wants of people.
As generations come and go, another set of new trends will come or will
exist. In order to adapt to the rapid changes in the business environment, the
existing industries need to improve their products and services. But how can you
generate business ideas with those strong competitors? There are three main
sets of decisions that you need to make - what to produce, how to produce, and
how to share or sell out the product to the market.
25
Activity 1 Mini survey
Directions: Conduct a mini survey in your immediate community. Gather
pertinent data on population across age brackets as suggested in the matrix
b
e
l
o
w
.
O
p
p
o
s
i
t
e
each age group, indicate their probable needs and wants.
Age Bracket Population Needs Wants
Example:
5 and below
35 Toys, coloring books,
pajama
Wooden toys, glossy
coloring books, etc.
fashionable pajama
6- 10 years
old
11-15 years
old
16-20 years
old
26
A
ctivity 2 Screening business ideas
Directions: After filling out the chart above, try to list down all the probable
business opportunities which you may wish to venture in. Remember to consider
the ideas and suggestions discussed in Lesson 3. Use the suggested matrix
below to indicate your choice. Write your answers in your notebook.
Example: Selling wooden toys
Positive Factors Negative Factors
Strengths Opportunities Weaknesses Threats
TRANSFER Of Learning
Now that, you have all the information, are you ready to test
your ability to generate your own business idea? If your answer is yes, start
studying the sample vicinity map of a community with a population of two
21-25 years
old
26-35 years
old
35-45 years
old
46-55 years
old
56-65 years
old
66 and above
27
thousand people. A new housing project will be constructed adjacent to Daang
Hari St, close to Old Molino St., its main road. This housing project targets the
homeowners who are young couples with two kids.
In this activity, you need to answer the questions that may lead to the
generation of a probable business. Your answers to these questions will serve
as the bases in formulating your own business ideas.
1. Who do you think are your target consumers/markets?
2. Where is the most ideal location to situate your business?
3. Which products or services would appeal to your target
consumers/markets?
4. Can you say that you have seized the most feasible business
opportunity?
28
Post-assessment
1. The following are examples of peoples’ basic needs, except:
a. Recreation
b. Clothing
c. Shelter
d. Food
2. Which of the following should be considered first by a prospective entrepreneur
in choosing the right location for his/her store?
a. Type of merchandise
b. The access of the target customers
c. The attractiveness of the store layout
d. The prevailing prices of goods in the area
3. Thong plans to put a “digi-print” studio in their locality. Which of the following
will help him determine his plan for a success setting up of his business?
a. Survey of consumer associations
b. Checking for similar business to avoid competition
c. Getting feedback on the quality of service
d. Conduct a SWOT analysis
4. Ceasar studies the population in his immediate community. He is doing this to –
a. identify his would be “suki”.
b. predict his biggest buyer.
c. select his favorite costumers.
d. determine whom to sell his product or service.
5. When an entrepreneur improves and alter products to make it more appealing to
target consumers, he/she is doing an -------- of the product.
a. alteration
b. invention
c. innovation
d. improvisation
29
Feedback
Pre-assessment and Post assessment
1. a
2. b
3. d
4. c
5. b
29
K to 12 Basic Education Curriculum
Technology and Livelihood Education
Content Standard Performance Standard
The learner demonstrates
understanding of basic concepts,
underlying theories and core
competencies in computer systems
and networks.
The learner independently provides
quality and marketable service in
computer hardware servicing in terms of
computer systems and networks
installation and diagnose and trouble
shoot computer systems as prescribed in
the TESDA Training Regulation.
MODULE 3:
INSTALL COMPUTER SYSTEMS AND
NETWORKS
Number of Sessions (Time Allotment): 60 Hours (2 Quarters)
Republic of the Philippines
DEPARTMENT OF EDUCATION
30
Welcome to the next level of your modular training in Computer Hardware
Servicing (CHS) under the Information and Communications Technology (ICT)
Course. In this module you will have a great deal of understanding of Installing
Computer Systems and Networks. At the end of this module you will be able to apply
the knowledge and skills on installing computer hardware, operating system,
software components and networks. Those skills are essential for you to pass the
National Certification II in Computer Hardware Servicing.
In this module, topics will be introduced progressively lesson by lesson for
easy understanding. After carefully answering the diagnostic assessment, reading all
the lessons, answering all the guide questions, masterfully performing all the
activities, showing evidences of learning and finally answering the summative test,
then you will have a considerable knowledge and skills in installing computer
systems and networks essential to be successful in computer hardware servicing as
one of the career option in ICT.
Reminder! Just follow the instructions given in this module. Now let us start
exploring new things in this module.
31
In this module, there will be three (3) major topics that you will encounter: (1)
plan and prepare for installation; (2) install hardware and software components and
operating systems; and (3) conduct test on the installed computer system. The three
major topics contain sub-topics that discuss the details on installing computer
systems and networks. This module contains what to KNOW, what to PROCESS,
what to REFLECT and UNDERSTAND as well as what to TRANSFER. The
competencies for this module are:
LO 1. Plan and prepare for installation
 Observe Occupational Health and Safety policies and procedures in planning for
installation activity in accordance with requirements
 Familiarize with computer hardware, software component and other peripherals
in accordance with established procedures on correct operation and safety
policies
 Consult appropriate/ technical personnel to ensure that work is coordinated with
others who are involved in the activity
 Obtain materials necessary to complete the work in accordance with
established procedures
 Check the materials received against job requirements
LO 2. Install equipment/devices (hardware, software components and
peripherals) and operating systems
 Follow OHS procedures in installing devices, systems, networking devices, and
peripherals
 Comply with the requirements in installing devices,/systems, networking
devices, and peripherals
 Install computer systems, networking devices and peripherals in accordance
with job requirements
 Perform installation of devices and variety of operating systems in accordance
with customer/client’s requirements
 Obtain approval from appropriate personnel before implementing contingency
procedures
 Respond to unplanned events or conditions in accordance to established
procedures
 Check the quality of the work undertaken in accordance with the established
procedures
32
LO 3. Conduct test on the installed computer system
 Follow OHS policies and procedures in conducting tests
 Check circuits and systems being isolated using specified testing procedures
 Test devices, systems and/or installation to determine its conformity with the
requirements
 Undertake final inspections on the installed devices, systems to ensure
conformity with the requirements
 Accomplish technical reports on the tests conducted
 Follow procedures in forwarding documentation to appropriate personnel and/or
authority on the test conducted
In order to master the above listed competencies, you must be knowledgeable
of the topics under what to KNOW, perform activities required under what to
PROCESS, accomplish additional meaningful tasks under what to REFLECT and
UNDERSTAND and finally show some evidences of your learning by transferring
what you have learned in a different context under what to TRANSFER.
You will be challenged to dig deeper into your prior knowledge and previous
experiences about computer hardware servicing.
SKILLS TEST
Direction: Listed below are some of the most important skills that you must
gain in order to render quality service when you enter the real world of Computer
Hardware Servicing. Read the skills carefully. Write “YES” if you are familiar with the
skill and “NO” if not. Feel free to answer each skill. Write your answers in your
notebook.
Skills in Computer Hardware Servicing YES NO
I can open a computer case.
I can connect the mouse.
I can connect the keyboard.
I can connect the monitor.
I can apply occupational health and safety precautions while working.
I can remove the system fan.
I can detach the power supply from the system unit.
I know how to remove the RAM from the motherboard.
I can remove the hard drive from the system unit.
I can install the power supply.
I know how to install the motherboard.
I can install the internal drives in a system unit.
I know how to attach RAM in the memory socket.
I can install CD / DVD drives.
33
I know how to install an operating system
I know how to configure a hardware components and its related software
I know the procedures in testing the installed computer components
The following topics will enable you to be familiar with planning and preparing
for installation, install equipment and devices, and conduct test on the installed
computer system. All you need to do is to read carefully all the topics and apply the
skills you’ve gained through the distinct activities provided in this module.
LESSON 1: PLAN AND PREPARE FOR INSTALLATION
This lesson is intended to develop your skills in planning and preparing for
installation of computer devices and operating system. At the end of this lesson you
are expected to:
 Observe OHS policies and procedures in planning for installation activity in
accordance with requirements
 Familiarize with computer peripheral/ devices/systems in accordance with
established procedures correct operation and safety
 Consult appropriate/ technical personnel to ensure that work is coordinated with
others who are involved in the activity
 Obtain materials necessary to complete the work in accordance with
established procedures
 Check the materials received against job requirements
OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES
Occupational Health and Safety (OHS) Policy – An Information and
communication technology (ICT) student should know how to behave when working
in the computer laboratory, as well as implement a safe way of accomplishing every
task. Safety practices should be learned early and always adheres in working with
any electrical and electronic device, including personal computers and its
peripherals. This is for your protection as well as to the people working with you,
34
and for the devices that you are using. The basis for this process begins with
Occupational Health and Safety Policies.
Occupational safety and health (OSH) is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks.
Health and safety procedure is the responsibility of all persons in the computer and
technology industries. You must identify the hazards where you are working and
decide how dangerous they are. Eliminate the hazard or modify the risk that it
presents.
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their organization to
report and act upon any potential workplace hazard. Students need to be aware of
the type of hazards that are possibly present in their work environment.
Procedure
1. Identify the hazard
2. Clear the area close to the hazard
3. Partition the hazard off or clearly identify the area to protect other people
from harm
4. If the hazard is easily and safely cleared, then do so
If not…
5. Report the hazard to the appropriate person (such as teacher in charge,
principal etc.) to obtain assistance
6. Following clearing of the hazard fill out the correct documentation to assist
in identifying improved practice to reduce further incidence of hazards.
All hazards must be reported using Accidental Report form. This enables us to
track the kinds of hazards we have in our workplace, and take action where
necessary to make it safer for all student and clients.
Accident reports
Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.
Accident reports contain the following details:
 Name of the person injured
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents
35
Accident report sample form
Form No: Accident Report Form
Date:
Rm. No:
Name: Yr/Sec:
Type of Injury Cause of Injury Remedy
Hazardous substances
If the workplace hazard appears to be dangerous to staff and clients and
professional assistance is required:
A. Call the supervisor or manager and advise them of the problem and the
urgency of the matter.
B. Depending on the risk it may be called as an evacuation.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or specialized
personnel who will deal with the spill.
Fire exits
All fire exits should be kept clear of from obstacles. All students have a
responsibility to make sure that chairs, empty boxes or any other type of obstacle are
not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to ensure
that in the event of an emergency there is a clear exit.
Fire Safety Procedure
Each work area has a designated fire warden, who in the event of a fire will take
charge. They are recognized by the wearing of a red hard hat.
36
If you find the fire
 Assess the danger prior to doing anything.
 If it is safe to move assist anyone in the vicinity of the fire away from danger.
 If it is possible close the door to the fire area.
 Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.
 Break the glass section of the fire alert call point.
 Call to the switch; ensure you know where the fire is, any other details that
may be of assistance to the fire brigade. Details could be size of the fire,
cause or type of fire, any people hurt or trapped, has anyone tried to put it out.
 If safe to do so, attack the fire with the correct extinguisher or fire hose.
If the designated fire officer is not present, someone quickly needs to take
responsibility and:
1. Locate the source of the fire.
2. Locate any people.
3. Remove all people from the building.
4. Once outside do a head count?
5. Notify the authorities.
Personal Safety While Working with PC’s
Computer equipment can be dangerous, and you or others can be injured or
even killed if you don’t follow proper safety guidelines when working along with PC’s.
The following are some precautionary measures to take before working with any
computer equipment:
 Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.
 Do not work on components that are plugged into their power source.
 Do not remove expansion cards from a computer when it is turned on.
 Remove jewelries when working inside any computer related equipment.
 Be sure not to mix electronic components and water.
Applying OH&S Policies
1. Group yourselves into six members.
2. Conduct a simulation on: “Applying OHS Policies and Procedures”.
37
3. The performance will be rated according to the following:
Performance Criteria:
5 - Have shown five OHS policies in different areas
4 - Have shown four OHS policies in different areas
3 - Have shown three OH&S policies in different areas
2 - Have shown two OH&S policies in different areas
1 - Have not shown any OH&S policies
UNDERSTANDING COMPUTER
A computer is one of the most brilliant inventions of mankind. Thanks to the
computer technology, we were able to achieve storage and processing of huge
amounts of data; we could rest our brains by employing computer memory capacities
for storing information. Due to computers, we have been able to speed up daily work,
carry out critical transactions and achieve accuracy and precision in work.
Computers of the earlier years were of the size of a large room and were required to
consume huge amounts of electric power. However, with the advancing technology,
computers have shrunk to the size of a small watch. Depending on the processing
power and size of computers, they have been classified under various types. Let us
look at the classification of computers.
Different Types of Computers
Based on the operational principle of computers, they are categorized as
analog, digital and hybrid computers.
Analog Computers: These are almost extinct today. These are different from a
digital computer because an analog computer can perform several mathematical
operations simultaneously. It uses continuous variables for mathematical operations
and utilizes mechanical or electrical energy.
38
Figure1. Different Types of Computer
Digital Computers: They use digital circuits and are designed to operate on two
states, namely bits 0 and 1. They are analogous to states ON and OFF. Data on
these computers is represented as a series of 0s and 1s. Digital computers are
suitable for complex computation and have higher processing speeds. They are
programmable. Digital computers are either general purpose computers or special
purpose ones. Special purpose computers, as their name suggests, are designed for
specific types of data processing while general purpose computers are meant for
general use.
Hybrid Computers: These computers are a combination of both digital and analog
computers. In this type of computers, the digital segments perform process control
by conversion of analog signals to digital ones.
Classification of Computers
The following are the classification of the different types of computers based
on their sizes and functionalities:
Mainframe Computers: Large organizations use mainframes for highly critical
applications such as bulk data processing and ERP. Most of the mainframe
computers have the capacities to host multiple operating systems and operate as a
number of virtual machines and can substitute for several small servers.
Minicomputers: In terms of size and processing capacity, minicomputers lie in
between mainframes and microcomputers. Minicomputers are also called mid-range
39
systems or workstations. The term began to be popularly used in the 1960s to refer
to relatively smaller third generation computers.
Servers: They are computers designed to provide services to client machines in a
computer network. They have larger storage capacities and powerful processors.
Running on them are programs that serve client requests and allocate resources like
memory and time to client machines. Usually they are very large in size, as they
have large processors and many hard drives. They are designed to be fail-safe and
resistant to crash.
Supercomputers: The highly calculation-intensive tasks can be effectively
performed by means of supercomputers. Quantum physics, mechanics, weather
forecasting, molecular theory are best studied by means of supercomputers. Their
ability of parallel processing and their well-designed memory hierarchy give the
supercomputers, large transaction processing powers.
Figure2. Classification of Computer
40
Microcomputers: A computer with a microprocessor and its central processing unit
it is known as a microcomputer. They do not occupy space as much as mainframes
do. When supplemented with a keyboard and a mouse, microcomputers can be
called personal computers. A monitor, a keyboard and other similar input output
devices, computer memory in the form of RAM and a power supply unit come
packaged in a microcomputer. These computers can fit on desks or tables and prove
to be the best choice for single-user tasks.
Personal computers come in different forms such as desktops, laptops and
personal digital assistants (refer to Figure 3). Let us look at each of these types of
computers.
Desktops: A desktop is intended to be used on a single location. The spare parts of
a desktop computer are readily available at relatively lower costs. Power
consumption is not as critical as that in laptops. Desktops are widely popular for daily
use in the workplace and households.
Laptops: Similar in operation to desktops, laptop computers are miniaturized and
optimized for mobile use. Laptops run on a single battery or an external adapter that
charges the computer batteries.
Figure3. Types of Personal Computer
41
Netbooks: They fall in the category of laptops, but are inexpensive and relatively
smaller in size. They had a smaller feature set and lesser capacities in comparison
to regular laptops, at the time they came into the market.
Personal Digital Assistants (PDAs): It is a handheld computer and popularly
known as a palmtop. It has a touch screen and a memory card for storage of data.
PDAs can also be used as portable audio players, web browsers and smart phones.
Most of them can access the Internet by means of Bluetooth or Wi-Fi
communication.
Tablet Computers: Tablets are mobile computers that are very handy to use. They
use the touch screen technology. Tablets come with an onscreen keyboard or use a
stylus or a digital pen. Apple's iPod redefined the class of tablet computers.
Wearable Computers: A record-setting step in the evolution of computers was the
creation of wearable computers. These computers can be worn on the body and are
often used in the study of behavior modeling and human health. Military and health
professionals have incorporated wearable computers into their daily routine, as a
part of such studies. When the users' hands and sensory organs are engaged in
other activities, wearable computers are of great help in tracking human actions.
Wearable computers do not have to be turned on and off and remain in operation
without user intervention.
Direction: Identify the type of computer being described in the following sentences
and write your answer on a separate sheet of paper.
1. These are mobile computers that are very handy to use.
2. They are computers designed to provide services to client machines in a
computer network.
3. They are also called mid-range systems or workstations.
4. A computer with a microprocessor and its central processing unit.
5. They fall in the category of laptops, but are inexpensive and relatively smaller in
size.
6. A type of computer which is intended be used on a single location.
7. They use digital circuits and are designed to operate on two states, namely bits
0 and 1.
8. Computers that have the capacities to host multiple operating systems and
operate as a number of virtual machines and can substitute for several small
servers.
9. It is a handheld computer and popularly known as a palmtop.
10.These computers can be worn on the body and are often used in the study of
behavior modeling and human health.
42
COMPUTER SYSTEM, DEVICES AND PERIPHERALS
As an aspiring computer technician, it is very important to know the system
that runs your computer and different devices attached to it. Each device plays an
important role, without each other computer system will not work properly.
What is an Operating System?
The operating system is the most
important program that runs on a computer. Every
general-purpose computer must have an operating
system to run other programs. Operating systems
perform basic tasks, such as recognizing input from
the keyboard, sending output to the display screen,
keeping track of files and directories on the disk,
and controlling peripheral devices such as disk
drives and printers.
For large systems, the operating system has
even greater responsibilities and powers. It is like a
traffic cop -- it makes sure that different program and users running at the same time
do not interfere with each other. The operating system is also responsible
for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
o Multi-user: Allows two or more users to run programs at the same time.
Some operating systems permit hundreds or even thousands of
concurrent users.
Linux
Unix
Windows 2000
o Multiprocessing : Supports running a program on more than one CPU.
Linux
Unix
Windows 2000
o Multitasking : Allows more than one program to run concurrently.
Unix
Windows 2000 and Windows multi point
o Multithreading : Allows different parts of a single program to run
concurrently.
43
Linux
Unix
Windows 2000 and Windows 7
o Real time: Responds to input instantly. General-purpose operating
systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on which
other application programs can run. The application programs must be written to run
on top of a particular operating system. Your choice of operating system, therefore,
determines to a great extent the applications you can run. For PCs, the most popular
operating systems are DOS, OS/2, and Windows, but others are available, such
as Linux.
What are the devices of a computer?
The physical, touchable, electronic and mechanical parts of a computer are
called the hardware which is composed of different devices attached to the
computer.
The following list represents a basic set of devices found in most Personal
Computers.
1. System Unit- The main part of a microcomputer, sometimes called the chassis. It
includes the following parts: Motherboard, Microprocessor, Memory Chips, Buses,
Ports, Expansion Slots and Cards.
Figure4. Tower Type System Unit
44
2. Motherboard / Mainboard / System Board- The main circuit board of a
computer. It contains all the circuits and components that run the computer.
Figure5. Modern Motherboard
3. CPU (Central Processing Unit) - The processor is the main “brain” or “heart” of a
computer system. It performs all of the instructions and calculations that are needed
and manages the flow of information through a computer.
Figure6. Examples of CPU (Intel Core 2 Duo and AMD Athlon)
4. Primary storage- (internal storage, main memory or memory) is the computer's
working storage space that holds data, instructions for processing and processed
data (information) waiting to be sent to secondary storage. Physically, primary
storage is a collection of RAM chips.
45
Two (2) Types of Memory
a. ROM – (Read Only Memory) ROM is non-volatile, meaning it holds data even
when the power is ON or OFF.
b. RAM – (Random Access Memory) RAM is volatile, meaning it holds data only
when the power is on. When the power is off, RAM's contents are lost.
Figure 7.Examples of RAM
5. Expansion Bus - A bus is a data pathway between
several hardware components inside or outside a
computer. It does not only connect the parts of the CPU to
each other, but also links the CPU with other important
hardware.
Figure 8.Expansion Bus
6. Adapters- Printed-circuit boards (also called interface
cards) that enable the computer to use a peripheral
device for which it does not have the necessary
connections or circuit boards. They are often used to
permit upgrading to a new different hardware.
Figure 9. Adapter (Network Adapter)
46
7. Power Supply Unit (PSU) - Installed in the back corner
of the PC case, next to the motherboard. It converts
120vac (standard house power) into DC voltages that are
used by other components in the PC.
Figure10. Power supply
8. Hard Disk Drive (HDD) - Also known as hard drive,
is a magnetic storage device that is installed inside the
computer. The hard drive is used as permanent
storage for data. In a Windows computer, the hard
drive is usually configured as the C: drive and contains
the operating system and applications.
Figure 11.Hard Disc
9. Optical Drive- An optical drive is a storage
device that uses lasers to read data on the optical
media. There are three types of optical drives:
Compact Disc (CD), Digital Versatile Disc (DVD)
and Blu-ray Disc (BD).
Figure12. CD ROM
10. Digital Versatile Disc (DVD) - Designed to
optically access data stored on a DVD. A laser
moves back and forth near the disk surface and
accesses data at a very fast rate.
Figure 13.DVD ROM
What are the input and output devices of a computer?
The devices attached to a personal computer can be classified into two- the
input and output devices. Input Device is composed of a device that accepts data
and instructions from the user or from another computer system. While, output
47
device is any piece of computer hardware that displays results after the computer
has processed the input data that has been entered.
Two (2) Types of Input Devices
1. Keyboard Entry – Data is inputted to the computer through a keyboard.
Keyboard - The first input device developed for the PC. Data is transferred to
the PC over a short cable with a circular 6-pin Mini-din connector that plugs
into the back of the motherboard.
Figure14. Keyboard
2. Direct Entry – A form of input that does not require data to be keyed by someone
sitting at a keyboard. Direct-entry devices create machine-readable data on paper,
or magnetic media, or feed it directly into the computer’s CPU.
Three Categories of Direct Entry Devices
1. Pointing Devices - An input device used to move the
pointer (cursor) on screen.
 Mouse - The most common 'pointing device' used
in PCs. Every mouse has two buttons and most
have one or two scroll wheels.
Figure15. Mouse
 Touch screen- A display screen that is sensitive to the touch of a finger or
stylus. Used in myriad applications, including ATM machines, retail point-
of-sale terminals, car navigation and industrial controls. The touch screen
became wildly popular for smart phones and tablets.
Figure16. Touch Screen Devices
48
 Light Pen - A light-sensitive stylus wired to a video terminal used to draw
pictures or select menu options. The user brings the pen to the desired
point on screen and presses the pen button to make contact.
F
i
Figure17. Light Pen
 Digitizer Tablet - A graphics drawing tablet used for sketching new
images or tracing old ones. Also called a "graphics tablet," the user
contacts the surface of the device with a wired or wireless pen or puck.
Often mistakenly called a mouse, the puck is officially the "tablet cursor."
Figure18. Digitizer Tablet
2. Scanning Devices- A device that can read text or
illustrations printed on paper and translates the
information into a form the computer can use.
Figure19. Image scanner
Figure20. Bar Code Reader
49
3. Voice- Input Devices - Audio input devices also known as speech or voice
recognition systems that allow a user to send audio signals to a computer for
processing, recording, or carrying out commands. Audio input devices such as
microphones allow users to speak to the computer in order to record a voice
message or navigate software.
Figure 21. Microphones
Output Devices
1. Computer Display Monitor- It displays information in visual form, using text and
graphics. The portion of the monitor that displays the information is called the
screen or video display terminal.
Types of Monitor
a. CRT Monitors - Cathode Ray Tubes (CRT) were the only type of displays for use
with desktop PCs. They are relatively big (14" to 16" deep) and heavy (over 15
lbs).
Figure22. Types of Monitor
b. LCD Monitors – Liquid Crystal Display (LCD) technology has been used in
laptops for some time. It has recently been made commercially available as
monitors for desktop PCs.
50
c. LED Monitors (Light Emitting Diode) - A display and lighting technology used in
almost every electrical and electronic product on the market, from a tiny on/off
light to digital readouts, flashlights, traffic lights and perimeter lighting.
2. LCD Projectors- utilize two sheets of polarizing
material with a liquid crystal solution between them. An
electric current passed through the liquid causes the
crystals to align so that light cannot pass through them.
Each crystal, therefore, is like a shutter, either allowing
light to pass through or blocking the light.
FFigure23. LCD Projector
3. Smart Board - A type of display screen that has a touch sensitive transparent
panel covering the screen, which is similar to a touch screen.
Figure24. Smart Board
4. Printer - A device that prints text or illustrations on paper.
Types of printer
a) Ink-Jet or Bubble-Jet Printer - spays ink at a sheet of paper. Ink-jet printers
produce high-quality text and graphics.
b) Laser Printer - Uses the same technology as copy machines. Laser printers
produce very high quality text and graphics.
c) LCD and LED Printer- Similar to a laser printer, but uses liquid crystals or light-
emitting diodes rather than a laser to produce an image on the drum.
d) Line Printer - Contains a chain of characters or pins that print an entire line at
one time. Line printers are very fast, but produce low-quality print.
51
Figure 28.Types of Printer
(e) Thermal Printer- An inexpensive printer that works by pushing heated pins
against heat-sensitive paper. Thermal printers are widely used in calculators and
fax machines.
5. Speakers - Used to play sound. They may be built into
the system unit or connected with cables. Speakers allow
you to listen to music and hear sound effects from your
computer.
Figure 29.Speaker
What is a Storage Device?
Aside from the devices attached on a PC, there are also the so called storage
devices that perform a special task in computing system. Storage device is any
apparatus for recording computer data in a permanent or semi-permanent form.
52
Figure 30.Storage Devices
Types of storage devices
Floppy diskette- is a random access, removable data storage medium that can be
used with personal computers. The term usually refers to the magnetic medium
housed in a rigid plastic cartridge measuring 3.5 inches square and about
2millimeters thick. Also called a "3.5-inch diskette," it can store up to 1.44 megabytes
(MB) of data.
Compact disc (CD) – also called optical disc is a nonmagnetic, polished metal disk
used to store digital information. The disc is read by the CD- ROM.
Digital Versatile Disc (DVD)- an optical disc technology with a 4.7 gigabyte storage
capacity on a single-sided, one-layered disk, which is enough for a 133-minute
movie.
Jump drive and USB flash drive- is a plug-and-play portable storage device that
uses flash memory and is lightweight enough to attach to a key chain. A USB drive
can be used in place of a floppy disk, Zip drive disk, or CD.
Hard drive- is the main, and usually largest, data storage device in a computer.
The operating system, software titles and most other files are stored in the hard disk
drive.
53
LS-120- is a drive which supports a special floppy diskette which can store up to
120MB of information as well as being backwards compatible and still supporting the
standard 1.44MB floppy diskettes.
Zip drive-is a small, portable disk drive used primarily for backing up and archiving
personal computer files.
Direction: In the puzzle below, look for the 10 hidden computer devices and
determine whether it belongs to INPUT, OUTPUT or STORAGE DEVICE.
REVEAL THE PARTS OF A COMPUTER SYSTEM
C G M M Q F Y L W K C P A H K H G C N H
P O R K I R X N A A O A U A K B M P H U
Z A M Z W G W P X W A F V R Q V X U M Y
Q U I P R Y P T E X V I R D B W A O R B
I R T B A R S R U Y L G R D V J B O C U
A O N R D C S G S I L N H I Q S M I L X
C U H L Q U T Z G D C J F S E E J K O U
N H X S P U P D A K O Z X K M T Y U Z S
G H L P F H G P I Z T A F D O U U F T R
A S L W W T R A O S Q F A R E H B G M O
R Y B E A E M J I X K P I I X E C F H T
E S A C M E T S Y S D D E V W T I D V I
K W M I Q K K I S I O R R E I L D F F N
L E I O M E H Y A S K S A I I D G Z K O
M Q U N D H M R W O Q U H O V K T M J M
W P T H E R M K Z W J U B J B E A P Q Z
K Z Z M L H M O U S E C K Y C Y V Y S D
Y B Y V X E W P L Q Q Y O V N H E Z H D
R N F H T U B U G L S N P F J W N K N J
M J G N Y H V J D U G F L U X O M K D A
1. ________________________ ______________________
2. ________________________ ______________________
3. ________________________ ______________________
4. ________________________ ______________________
5. ________________________ ______________________
6. ________________________ ______________________
7. ________________________ ______________________
8. ________________________ ______________________
9. ________________________ ______________________
10.________________________ ______________________
54
Matching Type. Match column A with Column B and write your answer on a
separate sheet of paper.
What is a Network?
To deepen your understanding with regard to the different components
/ devices of a computer, utilize the Internet and the website
www.professormesser.com, view the video regarding parts of the computer.
Use the URLs below:
1. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of-
motherboard-types/
A.
1. It serves as the brain of computer.
2. Printed-circuit boards (also called
interface cards) that enable the computer
to use a peripheral device
3. Also called read/write memory
4. a small, portable disk drive used primarily
for backing up files
5. The main circuit board of a computer
6. Also called diskette
7. Acts as a pointing device
8. Device that makes sounds, clips and any
audio materials be heard.
9. Component that reads and record data in
CDs and DVDs.
10.it is a visual device that displays the
information
B.
a. Adapter
b. CD- ROM
c. CPU
d. Floppy disk
e. Microphone
f. Monitor
g. Motherboard
h. Mouse
i. Optical Drive
j. RAM
k. ROM
l. Speaker
m. Zip Drive
55
2. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of-
cpu-socket-types/
3. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of-
cpu-socket-types/
4. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of-
display-device-types/
5. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of-
pc-input-devices/
56
 After watching the videos, answer the following questions:
1. What are the different types of motherboard shown in the video?
2. What are the different sizes of a motherboard?
3. What are the different types of CPU?
4. Describe the different types of memory cited in the video.
5. What do you think is the most efficient monitor used in our
computers nowadays?
6. Give at least 5 input devices featured in the video presentation.
Role Playing
The class will be divided into 5 groups (depending on the class size),
each group will have a minimum of 5 members and maximum of 10. Each
member should have a special role pertaining to the devices of a computer
and their functions. Each group will be tasked to showcase their talents in
front of the class. Each presentation will be rated using the following criteria:
PERFORMANCE SCORE CARD
CRITERIA PERCENTAGE SCORE
Accuracy (Accurate role and function of a
device was accurately shown)
30%
Presentation (Organization or sequence
of the play, appropriate gestures was
used)
30%
Clarity (Clearly delivered each topic) 30%
Team work (cooperation of each member) 10%
Performance Rating
57
NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
There are three basic types of networks which includes the following:
 Local Area Network (LAN)
 Wide Area Network (WAN)
Local Area Network
A Local Area Network (LAN) is a network that is confined to a relatively small
area. It is generally limited to a geographic area such as a writing lab, school, or
building. Rarely are LAN computers more than a mile apart.
In a typical LAN configuration, one computer is designated as the file server. It
stores all of the software that controls the network, as well as the software that can
be shared by the computers attached to the network. Computers connected to the
file server are called workstations. The workstations can be less powerful than the
file server, and they may have additional software on their hard drives. On most
LANs, cables are used to connect the network interface cards in each computer.
Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of network.
Networking Devices
Consist of, but are not limited to non-local printers, workstations, servers,
webcams, data loggers, instruments, dial-in devices, and, in general anything that
requires an Ethernet connection. These devices are supported on a best-effort basis
limited by the staffing and equipment level available.
58
Hub is a small, simple, inexpensive device that joins
multiple computers together. Many network hubs
available today support the Ethernet standard. Other
types including USB hubs also exist, but Ethernet is
the type traditionally used in home networking.
Ethernet switch is a device that gathers the signals
from devices that are connected to it, and then
regenerates a new copy of each signal.
Bridge is a device filters data traffic at a network
boundary. Bridges reduce the amount of traffic on a LAN
by dividing it into two segments.
Routers are small physical devices that join multiple networks
together.
Network gateway is an internetworking system
capable of joining together two networks that use
different base protocols. A network gateway can be
implemented completely in software, completely in
hardware, or as a combination of both.
Modem is a contraction of the terms modulator and
demodulator. Modems perform a simple function:
They translate digital signals from a computer into
analog signals that can travel across conventional
phone lines. The modem modulates the signal at the
sending end and demodulates at the receiving end.
59
Network interface is a device that connects a client computer, server, printer or
other component to your network. Most often, a network
interface consists of a small electronic circuit board that is
inserted into a slot inside a computer or printer. Alternatively,
some computers, printers, or other services include network
interfaces as part of their main circuit boards (motherboards).
Network firewall protects a computer network from
unauthorized access. Network firewalls may be
hardware devices, software programs, or a
combination of the two. Network firewalls guard an
internal computer network (home, school,
business intranet) against malicious access from the
outside. Network firewalls may also be configured to
limit access to the outside from internal users.
Direction: Identify what is being described in the following sentences and write your
answer on a separate sheet of paper.
1. It protects a computer network from unauthorized access.
2. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
3. This is an internetworking system capable of joining together two networks
that use different base protocols.
4. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications.
5. They translate digital signals from a computer into analog signals that can
travel across conventional phone lines.
6. It is a device that connects a client computer, server, printer or other
component to your network.
7. A device filters data traffic at a network boundary.
8. It is a device that gathers the signals from devices that are connected to it,
and then regenerates a new copy of each signal.
9. It is a small, simple, inexpensive device that joins multiple computers
together.
10.Type of network that is confined to a relatively small area.
60
Now, that you are done with the introduction of network as well as the
networking devices, to enlighten your understanding and knowledge have some
more readings about it thru books and other resources. You should consider the
following topics for research:
1. Different types of Network Topology
2. Common networking tools
After the research, you can also deepen your understanding by watching a
video presentation using the URL below:
o http://www.professormesser.com/free-a-plus-training/220-801/network-
devices/
o http://www.professormesser.com/free-a-plus-training/220-801/network-
topologies-3/
After the video presentation here are your tasks:
1. List down all the network devices and their advantages cited in the
video.
2. List down the different network topologies and their differences.
61
MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES
The following tools and equipment are classified according to their functions
and uses.
Equipment and
Accessories
Tools Materials
LAN Card
UPS
Server
24 port-hub
Modem
Fax machine
PC Video camera
USBExternalCD writer
USB scanner
USB printers
USB Flash Drive
Screwdriver(standard)
Screwdriver(Philips)
Long nose pliers
Mechanical pliers
Allen wrench
Multitester
Crimping tools
Soldering iron (30 watts)
Wire stripper
LAN Tester
Anti-static wrist wrap
Device drivers/installers
Software applications
Network OS Software
RJ 45
UTP Cat 5 cable
Motherboard’s manual
and installer
Sound device driver
installer
 LAN Card – is a network interface card. This is a
computer circuit board or card that is installed in a
computer so that it can be connected to a network.
 Server – is a part of a network. It is a special
computer that users on the network can access to
carry out a particular job.
 Port hub /Port – is a connector on the back of a
computer or other device. A port is either a serial port
or a parallel port.
 Modem - (Modulator-Demodulator) The modem is
a device that allows a given computer to share data
or otherwise a device which let computers exchange
information
62
 Scanner- it is an input device that read text or
illustration printed on paper, translates the
information into a form that a computer can use
 Flat Screw Driver – is used to drive or fasten
negative slotted screws
 USB – Universal Serial Bus, a hardware interface
for low-speed peripherals such as the keyboard,
mouse, joystick, scanner, printer and telephony
devices.
 Printer - is a piece of hardware that produces a
paper copy (also known as ‘hardcopy’) of the
information generated by the computer.
 RAM – Random Access Memory, is a primary
memory. This memory is used inside the
computer to hold programs and data while it is
running.
 BIOS – Basic Input / Output System, chip that
controls the most basic functions of the computer
and performs a self-test every time you turn it on.
 Flash drive– RAM that can retain data without
electrical power. It is widely used for BIOS chips
and for digital camera and digital music storage
 Video Camera - camera using videotape: a
camera that records onto videotape
 Long nose Pliers – is used for holding, bending
and stretching the lead of electronics component or
connecting wire.
 Soldering Iron – is used to join two or more metal
conductors with the support of soldering lead
melted around it.
 Desoldering Tool – is used to unsolder unwanted
parts or component in the circuit with the support
of soldering pencil
63
 Philips Screw Driver- is used to drive or fasten
positive slotted screws
 LAN Tester- for RJ11,12,45 & BNC w/ Remote
Unit This ergonomic tester is designed to test most
network cable wiring. You can either conduct an
auto or manual test.
 UTP – Unshielded Twisted Pair, is a popular type
of cable used in computer networking that consists
of two shielded wires twisted around each
Using Testing Tools and Equipment
A. Direction: Identify the following tools and materials, give their uses.
1.
2.
3.
4.
64
B. Identification.
Direction: Identify the appropriate term described in each sentence. Use a
separate sheet for your answers.
________1. It is a connector at the black of a computer or other device.
________2. A computer circuit board installed in a computer so that it can be
connected to a network.
________3.A device that allows a given computer to share a data.
________4. An input device that read text or illustration printed on paper, translated
the information into a form that a computer that can use.
________5.The least expensive and most popular network media.
For you to deepen your knowledge and skills and understanding in planning
and preparing for installation, you need to determine the location of the devices /
systems to be used, obtain materials necessary to complete the work in accordance
with established procedures and check the materials received against job
requirements . Your task is to have a research, find as well and watch video
presentations relating and showing the following:
1. Consult appropriate technical personnel to ensure that work is coordinated
with others who are involved in the activity;
2. Proper location / storage of the devices / systems and materials;
3. Correct way of obtaining the necessary materials to complete the work;
4. Fill up job order forms, request form and report sheets; and
5. Appropriate procedures in in checking the materials received.
After doing the above tasks, make sure that you have a detailed
documentation of it. Write your reflections on your notebooks or other sheet of paper.
After reflecting on the task given to you, it’s your chance now to transfer what
you have learned from the activity by having a presentation in front of the class. You
will be grouped with 5 members during the presentation. Make use of your creativity
in presenting each topic to awaken the interest of your classmates.
65
LESSON2. INSTALL EQUIPMENT / DEVICES and SYSTEMS
This lesson is designed to give you the proper procedures used in installing
devices and operating system of a personal computer, alongside with it is the basic
computer configuration set up. At the end of this lesson you should be able to:
a) Apply OHS procedures in installing devices, systems, networking devices, and
peripherals;
b) Comply with the requirements in installing devices,/systems, networking devices,
and peripherals;
c) Install computer systems, networking devices and peripherals in accordance with
job requirements;
d) Perform variations in installing devices and systems in accordance with
customer/client’s requirements;
e) Obtain approval from appropriate personnel before implementing contingency
procedures;
f) Respond to unplanned events or conditions in accordance to established
procedures; and
g) Check the quality of the work undertaken in accordance with the established
procedures.
SAFETY PRECAUTIONS
Personal Protective Equipment - It refers to protective clothing, helmets, goggles,
or other gear designed to protect the wearer's body or clothing from injury by
electrical hazards, heat, chemicals, and infection, for job-related occupational safety
and health purposes.
PPE can also be used to protect the working environment from pesticide
application, pollution or infection from the worker (for example in a microchipfactory).
It is important that students and teachers during their laboratory period should
be required to use personal protective equipment. Some of these are:
66
 Goggles A large spectacles, with
shields around the rims, for protecting
the eyes from dust, excessive light,
wind, etc.
 Rubber Sole A special type of shoes
used to prevent electrical shock and for
waterproofing and insulating purposes.
 Apron A garment worn over the front
of the body as a protection for one’s
cloth.
 Face Mask A covering for the face to
prevent the inhaling or absorbing dust
and other chemicals
 Gloves The covering material with a
separate sheath for each finger used
for hand protection.
Anti-Static and Safety Precautions
The little shock you experience while you are walking across a carpeted floor
or when you touched a door knob, table, counter or even another person is a result
of static electricity. Static electricity is the discharge of electricity between two
objects with different electrical potential. Humans can't feel a static shock until it is
several thousand volts strong, but it takes less than 30 volts to fry a sensitive
computer component, such as a stick of RAM or a processor.
That's why computer technicians and home computer builders have to guard
their computers against the deadly ravages of static electricity, as well as take steps
to avoid injury.
67
Safety and Anti-Static Rules
 Always use an anti-static wrist strap when working on a computer (except
when working on monitors)
 Always disconnect a computer from the AC power and from any powered
peripherals while you are working on it.
 Always grasp a metal part of the computer chassis with your bare hand before
you touch anything inside. Do this even if you are wearing an anti-static
wristband.
 Always handle electronic components by a non-conducting (non-metallic)
edge. Don't touch the pins or other connectors.
 Never plug an ATX power supply into AC power unless it is connected either
to a computer's motherboard or to a dummy test load.
 Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection.
 Never eat, drink, or smoke while working on a computer.
True or False
Direction: Write TRUE if the statement is correct and FALSE otherwise.
1. Always disconnect a computer from the AC power and from any powered
peripherals while you are working on it.
2. Always grasp a metal part of the computer chassis with your bare hand before
you touch anything inside. Do this even if you are wearing an anti-static
wristband.
3. Always handle electronic components by a non-conducting (non-metallic)
edge. Don't touch the pins or other connectors.
4. Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection.
5. Never use an anti-static wrist strap when working on a computer (except
when working on monitors)
6. Everyone is allowed to eat, drink, or smoke while working on a computer.
7. Never plug an ATX power supply into AC power unless it is connected either
to a computer's motherboard or to a dummy test load.
8. Static electricity is the discharge of electricity between two objects with
different electrical potential.
9. Apron is a garment worn over the front of the body as a protection for one’s
cloth.
10. PPE can also be used to protect the working environment from pesticide
application, pollution or infection from the worker.
68
Directions: The class will be divided into five (5) groups. Each group has its own
respective leader. The group will perform a task regarding familiarizing the personal
protective equipment. After the activity they will be graded using the given
Performance Score Card below:
PERFORMANCE SCORE CARD
Performance Criteria Percentage Grade
1. The student clearly identified personal protective
equipment.
20%
2. The student utilized actual tools/device in performing
the actual procedures.
15%
3. The student applied safety precautions during the task. 25%
4. The task gave students more critical thinking on the
personal protective equipment.
30%
5. The student cooperatively performed the task. 10%
Performance Rating
69
SYSTEM’S SPECIFICATION
Whenever you purchase software or hardware for your computer, you should
first make sure your computer supports the system requirements. These are the
necessary specifications your computer must have in order to use the software or
hardware. For example, a computer game may require your computer to have
Windows XP or later, a 2.0 GHz processor, 512 MB of RAM, a 64 MB graphics card,
and 500 MB or hard drive space. If your computer does not meet all of these
requirements, the game will not run very well or might not run at all.
It is just as important to check system requirements for hardware devices. For
example, if you buy a printer, it may require either Windows XP or Mac OS X 10.3 or
later. It may also require a USB port and 80 MB of available hard drive space. If your
computer does not have any USB ports, you will not be able to physically connect
the printer. If your machine does not have Windows XP or Mac OS X 10.3 or later,
the printer drivers may be incompatible with your operating system. This means your
computer will be unable to recognize the printer.
Most hardware and software products have the system requirements printed
on the side or bottom of the product packaging. When you are shopping for
computer software or hardware, it is a good idea to first find out exactly what your
system's specifications are and write them down on a piece of paper. The important
information to record includes:
1. Operating System (i.e. Windows XP, SP 2 or Mac OS X 10.3.8)
2. Processor Speed (i.e. Pentium 4, 3.2 GHz or Power PC G5, 2.0 GHz)
3. Memory, a.k.a. RAM (i.e. 512 MB)
4. Graphics Card (i.e. ATI Radeon 9800 w/ 256 MB video memory)
5. Hard Disk Space (i.e. 80 GB available)
6. I/O Ports (i.e. USB, Firewire, Serial, Parallel, SCSI, VGA, DVI ports)
By recording these specifications from your computer, you will be able to
make sure your computer supports the products you are buying. In terms of
installation, systems’ specification is a big consideration in order for a computer to
run and work properly for the most efficient way it could be.
In broad terms, the performance of a computer depends on four factors: the
speed and architecture of its processor or "central processing unit" (CPU), how much
random access memory (RAM) it has, its graphics system, and its internal hard drive
speed and capacity. Also of importance to most users will be the specification of
its Internet connection. Most computer users and in particular those working with a
lot of photographs, music files or videos should also think about the most
suitable storage devices they will need in order to keep and back-up all of their
valuable data.
70
Processor speed and architecture
The speed of a computer's processor chip (technically known as its "clock
speed") in measured in gigahertz (GHz), with the fastest modern processors
currently running at up to 4.7GHz. However, for most computing tasks, including web
browsing, sending e-mails, word processing and spreadsheet work any processor
running at 1GHz or more remains perfectly sufficient.
For applications such as video editing, 3D graphics work and (for the majority
of "power users") playing computer games, higher processor speeds is highly
required. CPU performance is now determined by far more than raw speed alone.
Intel made this very clear when it introduced its system of processor numbers. These
provide an indication of a processor's "architecture", "cache" and "front side bus
(FSB) speed" in addition to its clock speed.
The architecture of a processor is the most important factor to determine its
performance, and refers to its basic design and complexity. Some processors are
simply more sophisticated than others, with Intel (for example) producing "basic"
processors called Celerons and Pentiums, as well as more powerful processors
under its "Core" processor family. The later include the Core 2, Core i3, Core i5 and
Core i7, with the last of these being the most powerful.
In addition to clock speed and architecture, a processor's cache and front side
bus (FSB) speed also determine a computer's overall power. Cache is a form of very
fast memory integrated into the processor chip, and used to store up instructions
(work for the processor) so that it has to slow down as little as possible between
tasks. Cache is measured in megabytes (MB), with (for example) low-end Celeron
processors having as little as 0.25MB of cache (256KB), and high-end Itaniums
having up to 24MB. The simple message is, the more cache the better- though high
levels of cache still come at a very significant price.
Front side bus (FSB) speed is a measure of how fast a microprocessor
communicates with the computer's main circuit board (or "motherboard") into which it
is physically connected. Again, the higher the measure the better for overall
performance, with FSB speeds currently ranging from 533MHz (still perfectly
sufficient for the vast majority of applications) up to 1600 MHz.
RAM
To a large extent, the more RAM a computer has the faster and more
effectively it will operate. Computers with little RAM have to keep moving data to and
from their hard disks in order to keep running. This tends to make them not just slow
in general, but more annoyingly intermittently sluggish.
71
RAM is measured in megabytes (MB) and gigabytes (GB), as detailed on
the storage page. Just how much RAM a computer needs depends on the software it
is required to run effectively. A computer running Windows XP will usually function
quite happily with 1GB of RAM, whereas twice this amount (ie 2GB) is the realistic
minimum for computers running Windows 7.
Graphics system
A computer's graphics system determines how well it can work with visual
output. Graphics systems can either be integrated into a computer's motherboard, or
plugged into the motherboard as a separate "video card". Graphics systems
integrated into the motherboard (also known as "onboard graphics") are now quite
powerful, and sufficient for handling the requirements of most software applications
aside from games playing, 3D modeling, and some forms of video editing.
Any form of modern computer graphics system can now display high-
resolution color images on a standard-sized display screen (ie any monitor up to
about 19" in size). The more sophisticated graphics cards now determines how well
a computer can handle the playback of high definition video, as well as the speed
and quality at which 3D scenes can be rendered. Another key feature of separate
graphics cards is that most of them now allow more than one display screen to be
connected to a computer. Others also permit the recording of video.
As a basic rule, unless a computer is going to be used to handle 3D graphics
or to undertake a significant volume of video editing or recording, today there is little
point in opting for anything other than onboard graphics (not least because separate
graphics cards consume quite a lot of electricity and create quite a lot of heat and
noise). Adding a new graphics card to a computer with onboard graphics is also a
very easy upgrade if required in the future.
Hard Drive Speed and Capacity
Today 40GB is an absolute minimum hard drive size for a new computer
running Windows 7, with a far larger capacity being recommended in any situation
where more than office software is going to be installed. Where a computer will
frequently be used to edit video, a second internal hard disk dedicated only to video
storage is highly recommended for stable operation. Indeed, for professional video
editing using a program like Premiere Pro CS5, Adobe now recommend that a PC
has at least three internal hard disks (one for the operating system and programs,
one for video project files, and one for video media).
Two key factors determine the speed of traditional, spinning hard disks. The
first is the rotational velocity of the physical disk itself. This can currently be 4200,
5400, 7200, 10000 or 15000 rpm (revolutions per minute). The faster the disk spins,
72
the quicker data can be read from or written to it, hence the faster the disk the better
(although faster disks consumer more power, make more noise, and generate more
heat). Most desktop hard disks run at either 5400 or 7200 rpm, whilst most laptop
hard disks run at 4200 or 5400.
The second key factor that determines performance of a traditional, internal
hard disk is the interface used to connect it to the computer's motherboard. Three
types of interface exist: Serial Advance Technology Attachment (SATA), which is
the most modern and now pretty much the norm on new PCs; Integrated Device
Electronics (IDE) (also known as UDMA), which is a slower and older form of
interface, and finally SCSI, which happens to be the oldest but in it most modern
variant is still the fastest disk interface standard.
Now, in order for you to better understand the topics under system’s
specification, dig deep into your mind and answer the following essential questions:
1. In your point of view, describe system specification?
2. How does it affect the performance of the computer?
3. What is the relevance of understanding system specification in computer
hardware servicing?
4. Why do you think that system specification is one of the most important
considerations during installation?
73
INSTALLATION OF HARDWARE COMPONENTS AND OTHER PERIPHERALS
One of the basic skills that you must acquire in computer hardware servicing
is to independently assemble and disassemble a personal computer or simply setting
up a PC. After familiarizing with all the tools, devices, peripherals and safety
precautions I believe that you are now ready to gain another experience in CHS by
going through this lesson.
Personal Computer Disassembly
Before starting computer disassembly, make sure you have the tools you
need and they're all close by and handy and be sure to have a container to keep the
screws in so you have them when you want to put things back together.
Step1. Unplugging - The first thing you do is to unplug every cable that is plugged
in to your computer. That includes the cables such as Power, USB, Mouse,
Keyboard, Internet, Ethernet, Modem, AMFM Antenna, Cable TV, etc. Just unplug
all the cables for safety purposes.
Now that your computer is fully unplugged, move your PC to a clean work
space.
Step2.Opening the Outer Shell/Case- First, unscrew the four screws at the back of
the computer. On most computer cases, there will be large knobs that you can
unscrew by hand or by screw driver on the back-right side of the computer. The left
side has small screws because on that side you can't access much on the inside.
Figure 32. Screw at the back of computer chasis
Once the screws are removed, you can remove the side panels. On most
computers, they just slide off. Start with the left side panel (the side that once had
the knobs), slide it towards the back of the computer. Now you can remove the left
panel. Just like the other side, slide it towards the back of the computer.
74
Side
Panel
Figure 33. Removing the side panel
NOTICE:
If you are working on a carpet, about every five minutes touch something that is
grounded (Sink faucet / pipe, wire coming from the ground part of a wall outlet). This
is done so you do not shock your motherboard or other parts.
Step3. Removing the System Fan - First, unplug the fan from the motherboard.
You can find the plug by following the wire from the fan. It should be labeled
"SYS_FAN1". Next, you will have to unscrew the fan from the outside. You should
now be able to lift the fan out of the PC.
Figure 34. Removing the system fan
Step4. Removing the CPU Fan- The CPU fan is located right on top of the CPU
heat sink, which is a large piece of metal with fins on the top. The CPU fan plugs into
the motherboard in an awkward place, that is hard to access. But just follow the
wires and you should easily find it. It is labeled "CPU FAN1". To remove the fan from
the heat sink, remove the four screws securing it in place.
System Fan
75
Figure 35. Removing the CPU fan
Step5. Power Supply - The first thing to do is unplug every wire coming from the
power supply. You must disconnect the motherboard (very large connector/plug),
CD/DVD drive(s) power, internal hard drive power and portable hard drive slot
power.
Once everything is unplugged,
unscrew the four screws holding the power
supply in place, on the back of the
computer. Next, push the power supply
from the outside, and then lift it out.
Figure36. Unscrew the power supply
Step6. CD/ DVD Drive(s)-First, unplug the ribbon from the back of the drive. Once
that is completed, pull on the tab
securing the drive in place, then
push it out from the inside.
Figure 37. Location of CD / DVD Drive
CPU Fan
CD / DVD
Drive
76
Step7. Hard Drive - First, unplug the connector at the back of the slot, and unplug
the other end from the motherboard. Also unplug the SATA cable from the
motherboard and the hard drive. The portable hard drive slot is secured the same
way the CD/DVD drive is, with a tab. Pull on the tab, then slide the slot out.
Figure 38. Unplugging the Hard Drive connector
To remove the hard drive from the side of the slot, unscrew the four screws securing
it in place. You must be very careful not to drop the hard drive, since it is very
delicate!
Figure 39. Removing the hard drive from the side of the slot
Step8. Memory (RAM) - To remove the RAM, push down on both tabs holding the
RAM in place, which are located at both ends of the RAM.
Figure 40. Removing the Memory
77
Step9. Motherboard - The motherboard has seven screws holding it to the frame,
which are indicated by large white circles around them. Remove them and then lift
the motherboard out of the frame.
Figure 41. Removing the Motherboard
Personal Computer Assembly
Now that you have the skills in disassembling a personal computer, Ibelieve
that you are ready to take another step of this module which is assembling a
personal computer. All you need to do is to follow the step by step procedures
provided in this module.
Step 1. Prepare your workplace
1. Take Inventory:
Before you start, take an inventory of your parts. Do not begin assembling
your computer if you don't have everything you need. Begin the step-by-step process
once you are ready with everything you need.
Figure 42. Take inventory of the Different Computer Parts
2. Make Space, Make Time:
78
Building a PC takes up space - about a dining room table worth. So make
sure you have plenty of working room and a few hours to proceed with minimal
interruption. Work on a flat, stable table top surface, or bare floor, where you have
room to layout all of the items.
3. Prepare Grounding Protection:
Use an inexpensive antistatic wrist strap. Make sure you are wearing your
antistatic wrist strap correctly (it does you no good at all if you do not wear it!), and
you are ready to proceed. Look at Figure 43 for details.
Figure 43. Wearing the Anti- static Wrist Strap Correctly
4. Have the Drivers Ready:
Assuming you have another internet connected PC, download the latest
drivers from the vendors' websites for each component you will be
installing. Sometimes drivers are updated between the time the component was
manufactured and the time you are installing it. It is always best to have the
latest. Copy them to a CD for easy access.
Step 2. Prepare the Motherboard
1. Great care should be taken when
installing the motherboard. First, take the
board out of its packaging and put it on
top of the antistatic bag it came in (see
Figure 45). Remember, you always want
to safeguard your components from
potentially hazardous static electricity
(wear your strap).
Figure 44. Motherboard in an Antistatic Bag
2. Before you secure the motherboard onto the PC case/chassis, inspect it
carefully for any visible defects.
79
3. Next, review the motherboard manual, to make sure you are familiar with the
motherboard layout and understand which socket is which. Manuals are
extremely helpful, usually easy to read, and include illustrations. Below you
can find instructions on how to install the processor, the heat sink and the
memory modules on the motherboard. You should not place the motherboard
in the computer case until you are told to do so.
Step 3. Install the CPU
1. Use the unlocking mechanism to
open the CPU socket which is
usually a lever.
2. Carefully line up the pins and
place the chip in its socket; it will
fit only when oriented the proper
way. An arrow or a missing pin on
one corner of the chip will show
you how to line things up.
3. Align Triangular CPU and socket
key marks as shown in Figure 46.
4. Lower the lever to lock the CPU
into place.
Figure 45. Install CPU
Step 4. Install the CPU Heat Sink
1. Follow the manufacturer's directions to install the heat sink and the fan that
will cool the processor. If you bought an OEM CPU and a separate heat sink,
you may need to spread a thin layer of the thermal grease that came with the
heat sink over the chip to ensure proper transfer of heat (some heat sinks
come with this grease already applied).
Figure 46. Install CPU Heat Sink
80
3. Attach the clip that holds the heat sink in place keeping in mind that it may
require a fair amount of force. Again, follow the instructions that came with the
heat sink. They will show you how to fit it correctly. If you are in doubt, you
can visit the manufacturer's website for more information.
4. Plug the CPU fan's power connector into the proper connector on the
motherboard.
Step 5. Install Memory (RAM Modules)
In order to install the memory
modules, insert them into the proper
sockets (Figure 48) and push down
firmly but evenly until the clips on both
sides of the socket pop into place. If
your motherboard supports dual-
channel memory, consult the user
manual to determine which pairs of
RAM sockets you should use. The
motherboard and the CPU are the
brain and nerve center of your PC, so
selecting these components is the
most important decision you'll make.
Figure 47. Install RAM Memory
Step 6. Place the motherboard into the case
1. Some PC cases have a removable motherboard tray. If yours does, remove the
screws holding it in place and pull it out of the case (Figure 49).
Figure 48. Remove Motherboard Tray
2. Note the pattern of the holes in your motherboard (Figure 50), and screw brass
standoffs into the motherboard tray or into the PC case in the correct locations
(ALWAYS check the manual and follow their instructions to the letter).
81
Figure 49. Screw Brass Standoffs Into the Motherboard
3. Check the layout of the sockets on the motherboard, and confirm that the ports on
your motherboard's back panel match the holes on the case's Input/Output (I/O)
shield that is installed in your case. If necessary, remove the old I/O shield by
tapping it firmly a few times with the butt-end of a screwdriver, and then replace it
with the shield that came with the new motherboard.
4. Carefully position the motherboard on top of the brass standoffs (Figure 51), line
up all the holes, and use the screws that accompanied the case to fasten down the
motherboard. If you are using a removable tray in your system, slide the tray and
motherboard back into the case and then secure the tray.
Figure 50. Case’s I /O Shield
Figure 51. Mount the Motherboard
82
Step 7. Connect the Power Supply
Making the proper connections is crucial to successfully assembling your PC
system. Fortunately, manufacturers provide color-coded power cables and unique
connector shapes to make the job easy.
1. First, plug the large ATX power connector (Figure 53) from your power supply into
the matching port on your motherboard. Look Figure X for details.
2. Locate the smaller, square processor power connector (Figure 54) (you cannot
miss it - it is the one sprouting the yellow and black wires) and attach it to the
motherboard. Note: your connector is usually located near the processor. As
always, refer to your motherboard's manual for the exact locations.
3. Use your motherboard user manual and find the description about front-panel
connectors.
Figure 53. Large ATX Connector
Figure 52. Connect the ATX Power in the Motherboard
Figure 53. Square Processor Power Connector
83
NOTE:
You are going to be doing work that requires attention to detail and can be quite
frustrating if you do not go into it with the right attitude.
4. Attach each of the tiny leads from the power and reset switches (Figure 56), the
hard-disk activity lights, the PC speaker, and any front-panel USB and FireWire ports
to the corresponding pin on your motherboard. The needle-nose pliers are useful for
manipulating small pieces.
Figure 54. Connect the different Leads
Step 8. Install Graphics / Video Cards
1. Begin by removing the backplane cover from the AGP or PCI Express X16
slot (the metal piece where the monitor connector will emerge) (Figure 55).
Figure 55. Remove the backplane cover
2. Install the graphics board in that slot, and then secure the card with a screw
(Figure 56).
84
Figure 56. Install the Graphics Board
Step 9. Install Internal Drives
Now it is time to install your drives. This is an easy process, but it requires attention
to detail.
1. Make any necessary changes to jumpers on the drives before mounting them
in the case. A two-drive system (one or two SATA (Serial ATA- is a standard
hardware interface for connecting hard drives and CD/DVD drives to a
computer) hard drives, plus one parallel ATA
(Advanced Technology Attachment) optical drive, for example) is easy to set
up; the SATA drives are jumper less, and the optical drive can be set as
master on its own parallel ATA channel. Many cases have removable drive
rails or cages to house drives.
2. Use the included screws to attach your drives to the rails or cage, and slide
them into the case. For externally accessible drives such as a DVD recorder,
you can save time by installing one drive rail and sliding the drive in for a test
fitting to make sure that its front is flush with the case (Figure 57).
3. When the drives are installed, connect power and data cables to each one.
Parallel ATA drives use wide, flat data cables that can be installed only in the
correct way. Floppy drives use a similar but smaller cable; SATA drives use a
thin, 1cm-wide data cable. SATA drives use a new type of power connector
that many power supplies don't come with. Fortunately, many motherboards
ship with adapters for converting a standard four-pin power connector to a
SATA power connector (Figure 57).
85
Figure 57. Attach your devices
Figure 58. Connect Power Connector
Step 10. Install the Add- in Cards
1. For each add-in card, you must choose a free PCI slot.
1. Remove its backplane cover to allow access from the rear of the case.
3. Carefully position the card above the slot, and press down firmly to seat the
card (Figure 59).
4. Secure the card with a screw.
86
Keep in mind:
1. When attaching cables, never force a connection.
2. Plug in the power cable after you have connected all other
cables.
Figure 59. Add- in Cards
Many motherboards have additional sound connectors or ports housed on
small add-in boards. Some of these plug into slots on the motherboard; others screw
into the back of the case in place of slot covers. Usually the additional ports are not
essential to your PC's operation. For example, if you install a sound card, you do not
need connectors to the motherboard's built-in sound chip. Check your motherboard
manual to determine what each of these boards does.
Connecting Peripherals of a Personal Computer
When attaching hardware and peripherals of the computer, ensure that they
are connected to the correct locations or ports. For example, some mouse and
keyboard cables use the same type of PS/2 connector. So, you must know first the
different ports that can be found in the back panel of the computer.
Steps in Connecting Peripherals of a PC
Step 1.Attach the monitor cable to the video port.
Step 2.Secure the cable by tightening the screws on the connector.
Step 3.Plug the keyboard cable into the PS/2 keyboard port.
Step 4.Plug the mouse cable into the PS/2 mouse port.
Step 5.Plug the USB cable into a USB port.
Step 6.Plug the network cable into the network port.
Step 7.Plug the power cable into the power supply.
87
Figure 60. Steps in Connecting Peripherals of a PC
After connecting all the cables into their proper places, the picture in the next
page should be the appearance of the back panel of your PC.
Figure 61. Appearance of the PC’s Back Panel
88
Rearrange the Procedures
Direction: Rearrange the following procedures in their proper order. Use numbers to
indicate their order of precedence. The first number is done for you.
A. Personal Computer Disassembly
__7_1. Detaching the Hard Drive
____2. Detaching the power supply
____3. Opening the outer shell / case
____4. Pull Out the Motherboard
____5. Removing the CD / DVD Drives
____6. Removing the CPU fan
____7. Removing the system fan
____8. Unplugging all the cables and wires
B. Personal Computer Assembly
__7_1. Connect the Power Supply
____2. Install Graphics / Video Cards
____3. Install Internal Drives
____4. Install Memory (RAM Modules)
____5. Install the Add- in Cards
____6. Install the CPU
____7. Install the CPU Heat Sink
____8. Place the motherboard into the case
____9. Prepare the Motherboard
____10. Prepare your workplace
89
Performance Test
Direction: Follow and perform the given procedures on Activity A, B and C. Safety
precautions must be observed when working. You will be rated in accordance with
the rubrics provided after the activity:
A. PC Disassembly
B. Personal Computer Assembly
Unplug all the
cables and
wires
Open the outer
shell / case
Remove the
system fan
Remove the
CPU Fan
Remove the
power supply
Remove CD/
DVD Drives
Remove
Memory
Module
Remove the
Motherboard
Prepare your
workplace
Prepare the
Motherboard
Install the CPU
Install the CPU
Heat Sink
Install
Memory (RAM
Modules)
Place the
motherboard
into the case
Connect the
Power Supply
Install
Graphics /
Video Cards
Install Internal
Drives
Install the
Add- in Cards
90
C. Connecting PC Peripherals
Rubrics for your performance Test
Criteria Percentage Grade
Accuracy 50 %
Adherence to the procedures 20%
Workmanship(applied safety precautions) 20%
Speed 10%
Performance Rating
1
•Attach the monitor cable to the video port.
2
•Secure the cable by tightening the screws on the connector
3
•Plug the keyboard cable into the PS/2 keyboard port
4
•Plug the mouse cable into the PS/2 mouse port.
5
•Plug the USB cable into a USB port.
6
•Plug the network cable into the network port.
7 •Plug the power cable into the power supply.
91
INSTALLING OPERATINFG SYSTEM
Before the installation process undertake, a technician must be aware of the
minimum requirements of a computer hardware that is compatible with the operating
system to be installed. Following the systems’ requirements means an efficient
computer system. The list below shows the windows XP minimum requirements for
installation:
 Pentium 233 Mhz or compatible processor or faster; 300MHZ or faster
recommended
 64MB of RAM minimum; 128MB or more recommended
 4.3GB hard hard disk space or more
 CD-ROM or DVD-ROM
 Super VGA (800X600) or higher-resolution monitor
 Keyboard and mouse
Windows XP Installation
1. Insert the Windows XP CD-ROM and reboot the computer
 If you see a message about press any key to boot the CD, do so now.
Otherwise, you will see a message about Setup inspecting your system.
Figure 62. Boot from CD
92
2. MS-DOS portion of Setup begins
 In the first stage of setup; you will see a series of blue and gray MS-DOS-
based screens.
 In the first step, you will be asked to press F6 if you need to install any third-
party or RAID drivers.
Figure 63. Windows Set-up
3. Welcome to Setup
 Finally, Setup begins. In this step, you can set up XP, launch the Recovery
Console (another, more complicated system recovery tool), or quit.
 Press ENTER to continue Setup, and it will examine your hard drives and
removable disks.
Figure 64. Welcome to Set-up
93
4. Read the license agreement
 Next, you'll have to agree to Microsoft's complex licensing agreement. Among
the highlights: You don't actually own Windows XP and you can only install it
on one PC.
 Hit F8 to continue.
Figure 65. License and Agreement
5. Choose an installation partition
 This crucial step lets you choose where to install XP.
 On a clean install, you will typically install to the C: drive, but you might have
other ideas, especially if you plan to dual-boot with 9x.
 Setup will show you all of your available disks (in this case, just one) and let
you create and delete partitions as needed. So, for example, if you have one
disk, but would like to create two partitions, one for XP and one for your data,
you can do that here.
Figure 66. Choose an Installation Partition
94
6. Select the file system
 If you created a new partition, or wish to change the file system of an existing
partition, you can do so in the next step. NTFS (New Technology File System)
file system is more secured than FAT (File Allocation System).
 Regardless of which file system you choose, be sure to select one of the
"quick" format options (the top two choices), if you do need to format, since
these will work much more quickly than a full format.
Figure 67. Select the File System
7. Optionally format the partition
 If you did choose to change or format the file system, this will occur next.
First, you'll be asked to verify the format. If you're installing XP on a system
with more than one partition, especially one that still holds your data on one of
the partitions, be sure you're formatting the correct partition.
 Hit F to continue, and a yellow progress bar will indicate the status of the
format. When this is complete, Setup will again examine your disks, and
create a list of files to copy.
Figure 68. Optionally Format the Partition
95
8. Setup folder copy phase and reboot
 Setup will now copy system files to the system/boot partition(s) you just
created. This will allow the PC to boot from the C: drive and continue Setup in
GUI mode.
 When the file copy is complete, Setup will initialize and save your XP
configuration.
 It will then reboot your PC.When the system reboots, you will probably see the
"Press any key to boot from CD" message again. If this happens, do not press
a key: Setup will now boot from your C: drive. In the event that you cannot
prevent the CD-based Setup from reloading, eject the CD and reboot. Setup
will ask for the CD when needed.
Figure 69. Setup Folder Copy Phase
9. GUI Setup begins
 Once the system reboots, you will be presented with the GUI Setup phase,
which is much more attractive than the DOS-mode phase. As you progress
through GUI Setup, you can read promotional information on the right side of
the screen about XP.
 Next, your hardware devices are detected. This could take several minutes.
Figure 70. GUI Setup
96
10. Regional and language Options
 In the first interactive portion of GUI Setup, you can choose to customize the
regional and language settings that will be used by XP, as well as the text
input language you'd like. Users in the United States will not normally need to
change anything here.
 Click Next to continue.
Figure 71. Regional and Language Options
11. Personalize your software
 Now, enter your name and your company.
The name you enter is not the same as your user name, incidentally, so you
should enter your real name here (i.e. Rosalie Lujero or whatever).
 Click Next to continue.
Figure 72. Software Personalization
97
12. Enter your product key
 Now you must enter the 25-character product key that is located on the
orange sticker found on the back of the CD holder that came with Windows
XP. You cannot install XP without a valid product key. Later on, you will be
asked to activate and optionally register your copy of Windows XP. A product
key can be used to install XP on only one PC.
 Click Next to continue.
Figure 73. Enter Product Key
13. Enter a computer name and administrator password
 In the next phase of Setup, you can create a name for your computer (which
is used to identify it on a network) and, optionally in Pro Edition only, a
password for the system Administrator, the person who controls the PC (this
will generally be you, of course).
Figure 74. Enter Computer Name and Administrator Password
98
14. Supply your date and time settings
 Next, you can supply the date and time, which are auto-set based on
information in your BIOS, and the time zone, which is irritatingly set to PST,
which is where Microsoft is. Change these as appropriate.
 Click Next to continue.
Figure 75. Enter Date and Time Settings
15. Network setup
 If you have a networking card or modem, Setup now install the networking
components, which include the client for Microsoft networks, File and Print
Sharing, the Quality of Service (QoS) Packet Scheduler, and the TCP/IP
networking protocol by default.
Figure 76. Network Set-Up
99
16a. Choose networking settings
 In this phase, you can choose to keep the default settings (recommended) or
enter custom settings.
 Click Next to continue.
Figure 77. Choose Networking Settings
Windows XP Professional only:
16b. Enter workgroup or domain information
 In Windows XP Professional only, you will be able to select a workgroup or
domain name next. Home Edition doesn't work with Windows domains,
however, and Setup will automatically supply the workgroup name MSHOME,
which you can change later. The default workgroup name in XP Pro is,
imaginatively, WORKGROUP.
 Click Next to continue.
Figure 78. Enter Workgroup or Domain Information
Note that XP doesn't include the legacy NetBEUI protocol out of the box.
If you want to use this protocol, you will need to install it later from the XP
CD-ROM.
100
17. Set-up completion
 From this point on, Setup will continue to completion without any further need
for interaction. Setup will now copy files, complete installation, install your
Start Menu items, register system components, save settings, remove any
temporary files needed by Setup, and then reboot.
 Again, you will probably see the "Press any key to boot from CD" message on
reboot. If this happens, do not press a key, and your new XP install will boot
up. You can remove the XP Setup CD now.
Figure 79. Set- Up Completion
18. First boot
 You’ll be greeted by the XP splash screen on first boot (this actually appears
briefly when you rebooted into GUI Setup as well).The splash screens for XP
Pro and Home are subtly different.
Figure 80. First Boot
101
19. Change display settings
 Users with CRT monitors and some LCDs (such as laptops and flat panel
displays) will see a Display Settings dialog appear, which asks whether you'd
like XP to automatically set the resolution. This will generally change the
resolution from 800 x 600 to 1024 x 768 on a CRT monitor, or to the native
resolution of an LCD display.
 Click OK and let XP change the resolution. Then, accept the settings if the
screen display changes and can be read. If you can't see the display, it will
time out after 30 seconds and return to the sub-optimal 800 x 600 resolution.
 Click OK to accept the screen resolution change.
Figure 81. Change Display Settings
20. Welcome to Microsoft Windows
 Now, you are presented with XP's "Out of Box Experience," or OOBE, which
presents a silly wizard to guide you through the final set up of your PC.
 Click Next to continue.
Figure 82. Welcome to Microsoft Windows
102
21. Network setup
 In the opening OOBE phase, you are asked to set up your network/Internet
connection, which is required for activation and registration. If you selected
the default networking configuration during Setup and know it will work
(because you're connected directly to a cable modem, perhaps, or are on a
local area network), then select Yes (the default). Otherwise, you can select
No and then Skip.
 We'll assume that your network is up and running and select Yes.
 Click Next to continue.
Figure 83. Network Set- up
22. Optionally activate and register Windows
 If you selected Yes in the previous step, you are asked if you'd like to
activate Windows XP. This will tie your copy of XP to the current PC semi-
permanently. Activation requires a connection to the Internet, but you can
perform this step later if you want (and don't worry, XP will annoyingly
remind you of this fact every time you boot the machine until you do so).
Figure 84. Windows Activation
103
23. Set up users
 Now, you can set up the user names of the people who will be using the PC.
You will want at least one user (for you), since you shouldn't be logging on as
Administrator. Curiously, each user you do create here has administrative
privileges, however, and no password. You should set up your users correctly
with passwords as soon as possible.
 This phase lets you create up to five users. You can create more later, or
manage users, using the User Accounts tool in Control Panel.
 Click Finish when done creating users. At this point, OOBE ends and you're
reading to go.
 Click Finish again.
Figure 85. Set-up Users
24. Logon to Windows XP for the first time
 Click your name, that account will logon and you'll be presented with the XP
desktop. After you create passwords, however, you'll be asked to enter a
password before you can logon.
Figure 86. Set-up Users
104
Multiple Choice: Read each question carefully and choose the letter of the best
answer. Write your answer on a separate sheet of paper.
1. Which of the following is not a Windows XP minimum requirement?
a. 128MB RAM or higher
b. CD- ROM or DVD ROM
c. Lower resolution monitor
d. 4.3 GB hard disk space or more
2. If you see a message to press any key to boot the CD and you fail to do so,
what do you think will happen?
a. The computer will restart
b. Set up inspecting your system will appear
c. It will be prompted to BIOS setup
d. It will return to boot menu
3. What key should you press if you need to install any third- party or RAID
drivers?
a. F2
b. F6
c. F2
d. F12
4. After reading the license agreement, what function key will press in order to
start the installation?
a. F6
b. F8
c. F9
d. F12
5. Where do we typically install the operating system?1
a. Drive C
b. DVD
c. External Drive
d. Floppy Drive
6. What file system is usually used during installation?2
a. FAT
b. FAT32
c. NTFS
d. NTFS32
7. Suppose that you will install Windows XP on a system with more than one3
partition, what important process should be done?4
a. Change the file system5
b. Delete the data and files on the different partition6
c. Examine the partition7
d. Format the correct partition8
8. When the folder copy phase is complete your system will reboot, what are you9
going to do if see the message “Press any key to boot from CD”?10
a. Press any key
b. Do not press a key
c. Reboot the system
d. Eject the CD
9. What is the next phase after the set up folder copy phase and reboot?11
a. GUI set up
b. Software
c. Username setup
d. Software personalization
10.What phase will immediately follow after the first boot phase?12
a. Welcome to Windows
b. Network Setup
c. Change display setting
d. Set up users
13
14
15
105
16
For you to have a profound knowledge on the overview of what windows XP17
is, utilize the internet and watch the following video presentations:18
1. Overview of Windows XP19
 http://www.professormesser.com/free-a-plus-training/220-802/an-20
overview-of-windows-xp/21
22
2. Planning for installation23
 http://www.professormesser.com/free-a-plus-training/220-24
802/planning-a-windows-installation-2/25
26
3. Windows XP installation27
http://www.professormesser.com/free-a-plus-training/220-28
802/installing-windows-xp-3/29
30
After watching the videos, have a documentation containing the overview of31
Windows Xp and salient procedures in Planning for installation and Windows XP32
installation. Use a short white bond paper and be creative for the documentation.33
34
35
36
37
38
39
106
40
41
Windows XP Installation42
Equipment:43
Computer unit with CD or DVD drive44
AVR / UPS45
Materials:46
Windows XP Installer47
Procedure:48
1. Work in triads or quartet (depending on the no. of computer available)49
2. Install the Operating System (OS), Windows XP.50
3. Take turns in doing the above task.51
52
You will be assessed using the criteria in the score card below.53
PERFORMANCE SCORE CARD54
Evaluation:
CRITERIA
Percentage Score
1. Operating System is installed with no errors. 40%
2. Proper disk partitioning and partition is
performed.
40%
3. Proper use of equipment and materials is
observed.
10%
4. Observance of Safety Precautions. 10%
Performance Criteria
55
56
57
58
59
60
61
62
63
107
64
65
66
Windows 7 Installation67
68
As a technician you must be able to know the variations or options in installing69
an operating system that is compatible with the hardware requirement of a personal70
computer. Another operating system available in the market now is the Windows 771
version. Now, take a tour through the procedures in installing a Windows 7 operating72
system. I believe, the procedures will be very easy for you.73
74
1. Turn your computer on then press Del or F2 (depend on your computer’s75
mainboard) to enter the system BIOS.76
2. Go to Boot menu and choose Boot from CD/DVD.77
78
79
80
Figure 87. Boot Menu81
82
83
3. Press F10 to save the configuration and exit BIOS then reset your computer.84
85
86
Figure 88. Save configuration settings87
108
4. Insert Windows 7 DVD into your DVD drive then start up your computer,88
Windows 7 will be loading files.89
90
91
92
93
94
95
96
97
98
99
Figure 89. Windows 7 loading files and Start up100
101
102
5. Select your language, time & currency format, keyboard or input method and103
click Next.104
105
106
Figure 90. Language, Time and Currency Set- up107
6. Click Install now.108
109
Figure 91. Install Now110
109
7. Check I accept the license terms and click Next.111
112
113
114
Figure 92. License Terms Agreement115
116
8. Click Upgrade if you already have a previous Windows version117
or Custom (advanced) if you don’t have a previous Windows version or want118
to install a fresh copy of Windows 7.119
120
121
Figure 93. Windows 7 Options for Installation122
123
124
125
110
9. (Skip this step if you chose Upgrade and have only one partition) Select126
the drive where you want to install Windows 7 and click Next. If you want to127
make any partitions, click Drive options (advanced), make the partitions and128
then click Next.129
130
131
Figure 94. Drive Options132
133
10.It will now start installing Windows 7. The first step, (i.e. Copying Windows134
files) was already done when you booted the Windows 7 DVD so it will135
complete instantly.136
137
138
Figure 95. Windows 7 Starts Installation139
140
111
11.After completing the first step, it will expand (decompress) the files that it has141
been copied.142
143
Figure 96. Expanding Windows Files144
145
12.The third and fourth step will also complete instantly like the first step.146
147
148
Figure 97. Installing Features and Updates149
150
151
152
112
13.After that it will automatically restart after 15 seconds and continue the setup.153
You can also click Restart now to restart without any delays.154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
Figure 98. Restart to Continue Installation174
175
14.After restarting for the first time, it will continue the setup. This is the last step176
so it will take the most time than the previous steps.177
178
179
Figure 99.Completing Installation180
113
15. It will now automatically restart again and continue the setup. You can181
click Restart now to restart without any delays.182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
Figure 100.First Start Up201
202
16.Type your desired user name in the text-box and click Next. It will203
automatically fill up the computer name.204
205
206
Figure 101.Software Personalization207
208
114
17.If you want to set a password, type it in the text-boxes and click Next.209
210
211
Figure 102.Password Set- up212
213
18.Type your product key in the text-box and click Next. You can also skip this214
step and simply click Next if you want to type the product key later. Windows215
will run only for 30 days if you do that.216
217
218
Figure 103.Type Windows Product Key219
220
221
115
19.Select your desired option for Windows Updates222
223
224
Figure 104. Windows Update225
226
227
20.Select your time and click Next.228
229
230
Figure 105. Time and Date Settings231
232
116
21.If you are connected to any network, it will ask you to set the network’s233
location.234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
Figure 106. Windows 7 Set- up Complete249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
Figure 107. Preparing Desktop275
117
276
Hands- on Activity:277
You are tasked to reformat / install an operating system particularly Windows278
7, however, during the process of installation a problem occurred the machine /279
computer did not boot from CD. What do you think might be the reason for this280
unplanned incident? Your task now is to demonstrate the correct procedures to solve281
and respond to this unplanned event in accordance to the established procedures.282
You will work in quartet or triads (depending on the number of computers) to283
solve this problem. Your output will be rated according to the following criteria:284
SKILLS SCORE CARD285
CRITERIA PERCENTAGE SCORE
Accuracy
(Adherence to the correct procedure)
50 %
Workmanship
(Adherence to OHS policy, neatness and
organization of materials used)
30 %
Speed 20 %
PERFORMANCE RATING 100%
286
287
Before implementing any contingency procedures in any unplanned events288
you must have a deeper understanding in obtaining approval from appropriate289
personnel. Your task now is to do the following:290
1. Watch video presentation on the said topic and have a proper documentation291
of the procedures in obtaining approval from the appropriate personnel.292
2. Interview a person in the field to acquire the knowledge (procedures) and293
skills on the said competency.294
295
296
297
118
298
299
Windows 7 Installation300
Equipment:301
Computer unit with CD or DVD drive302
AVR / UPS303
Materials:304
Windows 7 Installer305
Procedure:306
1. Work in triads or quartet (depending on the no. of computer available)307
2. Install the Operating System (OS), Windows 7.308
3. Take turns in doing the above task.309
310
You will be assessed using the criteria in the score card below.311
PERFORMANCE SCORE CARD312
CRITERIA Percentage Score
1. Operating System is installed with no errors. 40%
2. Proper disk partitioning and partition is
performed.
40%
3. Proper use of equipment and materials is
observed.
10%
4. Observance of Safety Precautions. 10%
PERFORMANCE RATING
313
314
315
316
317
318
319
320
119
321
322
323
324
BASIC COMPUTER CONFIGURATION SETUP325
326
Configuration is the way a system is set up, or the assortment of327
components that make up the system. Configuration can refer to328
either hardware or software, or the combination of both.329
330
Basic Input / Output System (BIOS)331
The Basic Input Output System, usually referred to as BIOS, is software332
stored on a small memory chip on the motherboard.333
BIOS instruct the computer on how to perform a number of basic functions334
such as booting and keyboard control. BIOS is also used to identify and configure335
the hardware in a computer such as the hard drive, optical drive, CPU, memory, etc.336
337
338
Figure 108. BIOS Set- up339
340
The BIOS is accessed and configured through the BIOS Setup Utility. The341
BIOS Setup Utility is, for all reasonable purposes, the BIOS itself. All available342
options in BIOS are configurable via the BIOS Setup Utility. The BIOS Setup Utility is343
accessed in various ways depending on your computer or motherboard make and344
model.345
120
BIOS access and configuration on PC systems is independent of346
any operating systembecause the BIOS is part of the motherboard hardware. It347
doesn't matter if a computer is running Windows 7, Windows Vista, Windows XP,348
Linux, Unix, or no operating system at all - BIOS functions outside of the operating349
system environment and is no way dependent upon it.350
BIOS contain a number of hardware configuration options that can be351
changed through the setup utility. Saving these changes and restarting the computer352
applies the changes to the BIOS and alters the way BIOS instructs the hardware to353
function. The following list shows the things you can do in most BIOS systems:354
355
 Change the Boot Order
 Load BIOS Setup Defaults
 Remove a BIOS Password
 Create a BIOS Password
 Change the Date and Time
 Change Floppy Drive Settings
 Change Hard Drive Settings
 Change CD/DVD/BD Drive Settings
 View Amount of Memory Installed
 Change the Boot Up NumLock Status
 Enable or Disable the Computer Logo
 Enable or Disable the Quick Power On
Self Test (POST)
 Enable or Disable the CPU Internal
Cache
 Enable or Disable the Caching of
BIOS
 Change CPU Settings
 Change Memory Settings
 Change System Voltages
Device Drivers356
Now that you successfully installed the operating system, you’ll need to357
configure the devices such as Video Cards, Network Interface Cards, Sound Cards,358
etc by installing the device drivers of each. In many cases, if Windows recognizes359
the device, drivers will be installed automatically. In some cases, generic drivers are360
installed so that the devices will work properly.361
Drivers are small software programs that help the operating system use or362
“drive” the device. Whenever a device doesn’t work properly, ask if the proper driver363
has been installed.364
The procedures listed below describe how to obtain and install drivers for365
hardware devices on a Microsoft Windows 2000-based computer.366
Step 1: Determine the Hardware Manufacturer367
If you do not know the manufacturer of the device for which you want to install the368
driver, follow these steps to determine the manufacturer:369
370
371
372
373
121
1. On the desktop, right-click My Computer, and then click Manage.374
375
376
377
Figure 109. Manage My Computer378
379
2. Under System Tools, click Device Manager.380
The devices that are installed on the computer are listed in the right pane.381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
Figure 110. Device Manager403
404
Device Manager
122
3. In the right pane, expand the category of the device that you want to configure.405
For example, expand Display adapters.406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
Figure 111. Expanded Device Category427
428
429
4. Right-click the device for which you want to install the driver, and then430
click Properties.431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
Figure 112. Device Properties452
453
Expanded
Device Category
NOTE: The device may be listed under other devices.
NOTE: The device may appear as Unknown device or as a generic
device.
123
5. Click the General tab. Make a note of the manufacturer and model of the454
device.455
456
457
458
Figure 113. General Tab459
460
6. Click Cancel, and then quit Computer Management.461
462
463
464
465
Step 2: Obtain the Driver466
To obtain the latest driver, use the following list of possible sources for the467
driver, in the order in which they are presented.468
 Original Computer Manufacturer469
If the device was installed by your computer manufacturer, contact the470
manufacturer of your computer to find out how to obtain, download, and install the471
latest drivers for the device.472
 Device Manufacturer473
Contact the manufacturer of the device to inquire about how to obtain,474
download, and install the latest drivers for the device.475
NOTE: If the device is not displayed in Device Manager, or the device is
listed as an "Unknown device," contact the computer or device manufacturer
to obtain more information about the device.
124
 Chipset Manufacturer476
Contact the chipset manufacturer of the device to find out how to obtain,477
download, and install the latest drivers for the device. It is best to first contact the478
manufacturer of the device for the drivers before you contact the chipset479
manufacturer.480
481
For example, if your display adapter uses a NVIDIA chipset, first contact the482
manufacturer of the display adapter. If you cannot contact the display adapter483
manufacturer or if the manufacturer does not have a driver, contact NVIDIA.484
485
Some examples of chipset manufacturers (and their Web sites) include:486
 NVIDIA (display adapters)487
 PCTEL, Inc. (modems)488
 Installation CD or Floppy Disks489
If you have the original driver CD or floppy disks that were included with the490
computer or device, and if no other source for the drivers is available, use the491
original driver that is included with the computer or device.492
493
NOTE: Whenever possible, try to first contact the Original Equipment Manufacturer494
(OEM), device manufacturer, or chipset manufacturer to obtain the latest version of495
the driver.496
Step 3: Install the Driver497
 The driver files that you download from the OEM, device manufacturer, or498
chipset manufacturer differ depending on how the driver is packaged by the499
manufacturer.500
 If the file is an executable program, run the program to extract the files. If the501
file is in .zip format, you can use a third-party utility such as WinZip to extract502
the files. For more information about how to extract the driver files, see the503
instructions that are provided by the manufacturer of the driver.504
 The driver may use a setup program. The driver package may contain raw505
driver files, or it may contain only raw driver files. Some examples include .inf506
files, and .sys files. To install the driver, use one of the following methods507
as appropriate to your situation.508
509
510
 Driver with a Setup or Installation Program511
If the driver uses a setup or installation program, run the program to install the512
driver. For more information about how to do this, see the documentation or contact513
the driver manufacturer.514
515
125
 Device Is Displayed in Device Manager516
1. On the desktop, right-click My Computer, and then click Manage.517
2. Under System Tools, click Device Manager.518
The devices that are installed on the computer are listed in the right pane.519
3. Expand the category of the device that you want to configure. For example,520
expand Modems.521
NOTE: The device may be listed under Other devices.522
4. Right-click the device for which you want to install the driver, and then523
click Properties.524
NOTE: The device may be displayed as Unknown device, or as a generic525
device.526
5. Click the Driver tab, and then click Update Driver.527
The Upgrade Device Driver wizard starts.528
6. Click Next.529
7. Do one of the following:530
o Click Search for a suitable driver for my device (recommended), and531
then click Next.532
-or-533
o Click Display a list of the known devices for this device so that I can534
choose a specific driver, and then clickNext. Click Have Disk,535
click Browse, locate the .inf files that you downloaded in Step 2: Obtain536
the Driver, click an .inf file, and then click Open.537
538
8. Follow the wizard instructions to install the driver.539
9. Restart the computer.540
541
 Device Is Not Displayed in Device Manager542
543
Use the Add New Hardware wizard in Control Panel to install drivers for non-544
Plug and Play devices. You may have to use this method to install certain modems,545
serial ports, or printer ports.546
1. Click Start, point to Settings, and then click Control Panel.547
2. Double-click Add/Remove Hardware.548
3. Click Next.549
4. Click Add/Troubleshoot a device, and then click Next.550
5. Do one of the following:551
o Click Yes, search for new hardware, and then click Next.552
-or-553
o Click No, I want to select the hardware from a list, and then click Next.554
6. Follow the wizard instructions to install the driver.555
7. Restart the computer.556
557
558
559
126
560
561
Installing Device Drivers562
Material: Installation CD563
Direction: Given an installation CD, perform installation of a device driver.564
Check the quality of your work undertaken in accordance with the established565
procedures thru the Performance Score Card below.566
567
PERFORMANCE SCORE CARD568
Performance Criteria Criteria Grade
1. The system is correctly started. 20%
2. The Installation CD is properly inserted. 20%
3. Handling and safekeeping of installation CD is observed. 20%
4. The instructions how to install device drivers are accurately
followed.
20%
5. The device drivers are successfully installed 20%
PERFORMANCE RATIING
569
570
571
572
573
574
575
576
577
578
579
127
580
581
Lesson3. CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM582
583
In the previous lesson, you were introduced with all the necessary knowledge584
and skills on installation of computer devices and operating system. Now, after585
executing the correct procedures I am sure that installation is a very easy task for586
you. Those skills will be very essential for the next lesson.587
In the next phase of your learning it will focus in conducting test on the588
installed computer components. After reading all the required topics and performing589
the essential skills you must be able to:590
 Follow OHS policies and procedures in conducting tests;591
 Check circuits and systems being isolated using specified testing procedures;592
 Test devices, systems and/or installation to determine its conformity with the593
requirements;594
 Undertake final inspections on the installed devices, systems to ensure595
conformity with the requirements;596
 Accomplish technical reports on the tests conducted; and597
 Follow procedures in forwarding documentation to appropriate personnel and/or598
authority on the test conducted.599
600
601
602
603
604
605
TESTING INSTALLED EQUIPMENT / DEVICES (COMPONENTS)606
607
As computer technician you will need a good understanding of the health and608
safety regulations from early on in your career, so that you understand the good609
practices demanded by law. In particular, you need to:610
 report any accidents611
 take reasonable care of your own health and safety when moving612
heavy components613
 not cause any electrical hazards614
 make sure that workstations meet safety requirements.615
You need to adhere to health and safety regulations as they will help to protect you616
and others and will avoid any unnecessary legal action for reckless and unsafe617
working practices. If you identify any health and safety problems, you should tell your618
line manager or the health and safety representative immediately.619
620
128
The most basic test is to switch the system on to check it starts without errors.621
ICT professionals are also likely to use tools and utilities to check that all is well with622
the system after an installation.623
The Use of Diagnostic Tools in testing installed hardware components and624
other peripherals625
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools626
include the following:627
 Digital multimeter is a device that can take many types of measurements. It628
tests the integrity of circuits and the quality of electricity in computer629
components. A digital multimeter displays the information on an LCD or LED.630
631
 A loopback adapter, also called a loopback plug, tests the basic functionality632
of computer ports. The adapter is specific to the port that you want to test.633
634
 The toner probe, is a two-part tool. The toner part is connected to a cable at635
one end using specific adapters, such as an RJ-45, coaxial, or metal clips.636
The toner generates a tone that travels the length of the cable. The probe part637
traces the cable. When the probe is in near proximity to the cable to which the638
toner is attached, the tone can be heard through a speaker in the probe.639
640
Figure 114. Diagnostic Tools641
Software Tools642
Like hardware tools, there are a variety of software tools that can be used to643
help technicians pinpoint and troubleshoot problems. Many of these tools are free644
and several come with the Windows operating system.645
Disk Management Tools646
Software tools help diagnose computer and network problems and determine which647
computer device is not functioning correctly. A technician must be able to use a648
range of software tools to diagnose problems, maintain hardware, and protect the649
data stored on a computer.650
129
You must be able to identify which software to use in different situations. Disk651
management tools help detect and correct disk errors, prepare a disk for data652
storage, and remove unwanted files.653
The following are some disk management tools:654
 FDISK: A command-line tool that creates and deletes partitions on a hard655
drive. The FDISK tool is not available in Windows XP, Vista, or 7. It has been656
replaced with the Disk Management tool.657
 Disk Management Tool: Initializes disks, creates partitions, and formats658
partitions.659
 Format: Prepares a hard drive to store information.660
 ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard661
drive by scanning the file system. These tools might also check the disk662
surface for physical errors.663
 Defrag: Optimizes space on a hard drive to allow faster access to programs664
and data.665
 Disk Cleanup: Clears space on a hard drive by searching for files that can be666
safely deleted.667
 System File Checker (SFC): A command-line tool that scans the operating668
system critical files and replaces files that are corrupted.669
Use the Windows 7 boot disk for troubleshooting and repairing corrupted files.670
The Windows 7 boot disk repairs Windows system files, restores damaged or lost671
files, and reinstalls the operating system.672
Test procedures673
674
A test procedure is a set of steps to guide you through what needs to be done675
to thoroughly test the installation. It is designed to help you work more effectively and676
to make sure you test everything that needs testing.677
678
Test procedures are created in-house and could include these steps:679
1. Gathering test information. The first step is to run the tests required by the680
procedure and find out what happens. You should record all the results of your tests681
in a log so that you know which pass and which fail, thereby requiring further action.682
2. Validating the test information. The next step is to check the data you gathered683
from the tests to make sure it is correct. This is usually done by running the tests684
again.685
3. Responding to test information. This step is important because you need to be686
able to recognize when a test shows problems or is successful. For example, if ping687
is used to test a network connection then ‘Request timed out’ shows the test was not688
successful.689
130
4. Checking specification. The final step is an important end to testing. You need690
to check the specification for the installation to make sure that it has been met. For691
example, if a user requested an upgrade to make their display run at 1920 x 1200,692
then the ICT professionalshould check that the graphics card and screen can do this.693
694
External Visual Inspection695
The external visual inspection consists of a quick inspection of the exterior of696
the computer, the monitor, the keyboard, any peripherals, and cables. While697
performing the visual inspection, make any necessary corrections. To perform the698
external visual inspection, perform the following steps:699
1. Turn off the computer, the monitor, and all peripherals.700
2. Verify that all power cables are properly connected to the computer, the701
monitor and peripherals, and their power sources.702
3. Verify that the keyboard and mouse interface cables are firmly attached to the703
proper connectors on the back of the computer.704
 For a PS/2-compatible mouse, the keyboard and mouse interface cable705
connectors are identical except for their labels.706
 For a serial mouse, the mouse interface cable must be firmly attached707
to one of the serial port connectors, and its captive screws must be708
secure enough to ensure a firm connection.709
4. Verify that network cables (if present) are properly attached.710
5. Verify that any devices attached to the serial and parallel port connectors are711
properly connected.712
 Each of the serial and parallel port interface cables must be firmly713
attached to an appropriate connector on the back of the computer as714
well as to the interface connector on the device. The captive screws715
that secure these connectors at each end of the interface cable must716
be secure enough to ensure a firm connection.717
6. Verify that the video interface cable is firmly attached to the video connector718
on the back panel or to a video expansion card, and also to the connector on719
the back of the monitor. For proper connection of the video monitor, see the720
documentation for the monitor.721
7. Inspect all external monitor controls for any obvious damage or improper722
settings. For proper settings of the video monitor controls, see the723
documentation for the monitor.724
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys725
are sticking, it may be necessary to replace the keyboard.726
9. Inspect the exterior of the computer, including all controls and indicators, and727
all user-accessible data storage devices for any signs of physical damage.728
729
Does the inspection reveal any problems?730
731
Yes. Proceed to the appropriate procedure in "Removing and Replacing732
Parts."733
131
734
No. Proceed to "Observing the Boot Routine."735
736
Observing the Boot Routine737
After you have performed an external visual inspection as described in the738
previous section, you should boot the system and, while the boot routine is running,739
observe the system for any indications of problems.740
741
742
To observe problem indications during the boot routine, perform the following steps:743
1. If the system is off, turn on all peripherals and the computer.744
2. Check the power supply fan.745
Does the fan run normally?746
o Yes. Proceed to step 3.747
o No. Troubleshoot the system power supply.748
749
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the750
upper-right corner of the keyboard. After all three indicators flash momentarily,751
and following a long pause (approximately 30 seconds), the Num Lock752
indicator should light up and remain on (unless the Num Lock option is set753
to Off in the System Setup program).754
755
Do these indicators flash on and off within approximately 10 seconds after the756
boot routine starts?757
o Yes. Proceed to step 4.758
o No. Troubleshoot the system power supply. If the troubleshooting759
procedure indicates that the system power supply is operational,760
troubleshoot the memory.761
4. During the boot routine, observe the system for any of the following762
indications:763
o Beep codes — A beep code is a series of beeps that indicates an error764
condition.765
o System error messages — these messages can indicate problems or766
provide status information.767
o Diskette-drive and hard-disk drive access indicators — These768
indicators light up in response to data being transferred to or from the769
drives. If either of these indicators fails to light up during the boot770
NOTE: Most of the steps in this procedure require observation of system
functions and indications, some of which can occur simultaneously. It may be
necessary to reboot the system several times to complete all of these steps.
132
NOTICE: Before you proceed with the internal visual inspection described in this
section, ensure that the user has saved all open files and exited all open
application programs if possible.
CAUTION: Before beginning to work inside the computer, disconnect the
power supply from the power source and the power supply cables from
the power supply.
CAUTION: The heat sink assembly can get extremely hot during system
operations. Be sure that it has had sufficient time to cool before
touching it.
CAUTION: When handling the heat sink assembly, take care to avoid
sharp edges on the heat sink.
routine, troubleshoot the diskette drive or hard-disk drive subsystem,771
as appropriate.772
5. Observe the monitor screen for the Diagnostics menu.773
Internal Visual Inspection774
A simple visual inspection of a computer’s interior hardware can often lead to775
the source of a problem, such as a loose expansion card, cable connector, or776
mounting screw. To perform the internal visual inspection, perform the following777
steps:778
1. Turn off the system, including any attached peripherals, and disconnect all the779
AC power cables from electrical outlets.780
781
2.Remove the computer’s right side cover.782
3.Verify that the chips, expansion cards, and SEC cartridge and heat sink783
assembly or assemblies are fully seated in their sockets or connectors.784
4. To ensure that the chips are fully seated in their sockets, press firmly on the785
top of each chip.786
5. Verify that all jumpers are set correctly.787
6. Check all cable connectors inside the computer to verify that they are firmly788
attached to their appropriate connectors.789
7. Reinstall the computer cover.790
8. Reconnect the computer and any attached peripherals to their power sources,791
and turn them on.792
793
133
794
Suppose that you are in the workshop carrying out hardware installations, the795
owner are very impressed with you. There has been a lot of telephone time spent796
recently explaining to customers how to test installed components of their computer797
systems. The shop has decided to create their own video that will be uploaded to the798
website and YouTube. You have been asked to create this video.799
800
1. Create a video to demonstrate how to install the hardware components.801
Make sure you include everything you need to do to work safely.802
2. Show how to configure any device installed in the computer.803
3. Create another video on the following:804
a. Undertake final inspection on the assembled computer system for805
functionality. This will be to test that the newly installed hardware806
components work without problems;807
b. Accomplish technical reports on the tests conducted; and808
c. Follow procedures in forwarding documentation to appropriate809
personnel or authority810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
134
825
826
Test I. Identification827
Direction: Identify the terms being described in the following sentences.828
1. These are mobile computers that are very handy to use.829
2. They are computers designed to provide services to client machines in a830
computer network.831
3. They are also called mid-range systems or workstations.832
4. A computer with a microprocessor and its central processing unit it.833
5. They fall in the category of laptops, but are inexpensive and relatively smaller in834
size.835
6. A type of computer which is intended be used on a single location.836
7. They use digital circuits and are designed to operate on two states, namely bits837
0 and 1.838
8. Computers that have the capacities to host multiple operating systems and839
operate as a number of virtual machines and can substitute for several small840
servers.841
9. It is a handheld computer and popularly known as a palmtop.842
10.These computers can be worn on the body and are often used in the study of843
behavior modeling and human health.844
11. It is considered as the most important program that runs on a computer.845
12.It is composed of a device that accepts data and instructions from the user or846
from another computer system.847
13.Any piece of computer hardware that displays results after the computer has848
processed the input data that has been entered.849
14.Any apparatus for recording computer data in a permanent or semi-permanent850
form.851
15.It protects a computer network from unauthorized access.852
16.Type of network that connect larger geographic areas, such as Florida, the853
United States, or the world.854
17.This is an internetworking system capable of joining together two networks that855
use different base protocols.856
18.It is consists of two or more computers that are linked in order to share857
resources (such as printers and CD-ROMs), exchange files, or allow electronic858
communications.859
19.It is a small, simple, inexpensive device that joins multiple computers together.860
20.A device filters data traffic at a network boundary.861
862
863
Test II. True or false864
Direction: Write TRUE if the statement is correct and FALSE otherwise.865
1. Always use an anti-static wrist strap when working on a computer (except866
when working on monitors)867
135
2. Always disconnect a computer from the AC power and from any powered868
peripherals while you are working on it.869
3. Always grasp a metal part of the computer chassis with your bare hand before870
you touch anything inside. Do this even if you are wearing an anti-static871
wristband.872
4. Always handle electronic components by a non-conducting (non-metallic)873
edge. Don't touch the pins or other connectors.874
5. Always use a UL-approved surge protector or an Uninterruptible Power875
Supply that incorporates surge and spike protection876
6. Never eat, drink, or smoke while working on a computer.877
7. Whenever you purchase software or hardware for your computer, you should878
first make sure your computer supports the system requirements.879
8. The speed of a computer's processor chip (technically known as its "clock880
speed") in measured in gigahertz (GHz).881
9. A computer's graphics system determines how well it can work with visual882
output.883
10.Today 40GB is an absolute minimum hard drive size for a new computer884
running Windows 7.885
11.When attaching cables, never force a connection.886
12.BIOS instruct the computer on how to perform a number of basic functions887
such as booting and keyboard control.888
13.The external visual inspection consists of a quick inspection of the interior of889
the computer.890
14.Disk management tools help detect and correct disk errors.891
15.The most basic test is to switch the system on to check it starts without errors.892
893
Test III. Multiple Choices894
Direction: Read each questions carefully and write the letter of the best answer.895
1. These are small software programs that help the operating system use the896
device.897
a. Application898
b. Driver899
2. Which of the following is software shared on a small memory chip on the900
motherboard?901
a. Installer
b. Application
c. Driver
d. BIOS
3. It is the way to set up a system or the assortment of components that make up902
the system.903
a. Configuration
b. Set up
c. Driver
d. Installation
4. Which of the following is not a Windows XP minimum requirement?
a. 128MB RAM or higher
b. CD- ROM or DVD ROM
c. Lower resolution monitor
d. 4.3 GB hard disk space or more
136
5. If you see a message to press any key to boot the CD and you fail to do so,
what do you think will happen?
a. The computer will restart
b. Set up inspecting your system will appear
c. It will be prompted to BIOS setup
d. It will return to boot menu
6. What key should you press if you need to install any third- party or RAID
drivers?
a. F2
b. F6
c. F9
d. F12
7. Where do we typically install the operating system?
a. Drive C
b. DVD
c. External Drive
d. Floppy Drive
8. Suppose that you will install Windows XP on a system with more than one
partition, what important process should be done?
a. Change the file system
b. Delete the data and files on the different partition
c. Examine the partition
d. Format the correct partition
9. What file system is usually used during installation?
a. FAT
b. FAT32
c. NTFS
d. NTFS32
10.Which of the following is a connector on the back of a computer or other
device?
a. Modem
b. Port hub
c. Router
d. Network Gateway
137
Test IV. Matching Type
Direction: Match column A with Column B and write your answer on a separate
sheet of paper.
A.
1) It serves as the brain of computer.
2) Printed-circuit boards (also called interface
cards) that enable the computer to use a
peripheral device
3) Also called read/write memory
4) Small portable disk drive usually used for
backing up files
5) Main board of a computer
6) Also called diskette
7) Acts as a pointing device
8) Device that makes sounds, clips and any
audio materials be heard.
9) Component that reads and record data in
CDs and DVDs.
10)It is a visual device that displays the
information
11)Plug- and play portable storage device
12)Prints text and illustrations in paper
13)Converts AC into DC
14)Allows more than one program to run
concurrently
15)Handheld computer
B.
a) Adapter
b) CD- ROM
c) CPU
d) Flash Drive
e) Floppy disk
f) Microphone
g) Monitor
h) Motherboard
i) Mouse
j) Multitasking
k) Optical Discs
l) PDA
m) Power supply
n) Printer
o) RAM
p) Register
q) ROM
r) Speaker
s) Tablet
t) Zip Drive
138
SKILLS TEST
Direction: Listed below are some of the most important skills that you must gain in
order to render quality service when you enter the real world of Computer Hardware
Servicing. Read the skills carefully. Write “YES” if you are familiar with the skill and “NO” if
not. Feel free to answer each skill. Write your answers in your notebook.
Skills in Computer Hardware Servicing YES NO
I can open a computer case.
I can connect the mouse.
I can connect the keyboard.
I can connect the monitor.
I can apply occupational health and safety precautions while working.
I can remove the system fan.
I can detach the power supply from the system unit.
I know how to remove the RAM from the motherboard.
I can remove the hard drive from the system unit.
I can install the power supply.
I know how to install the motherboard.
I can install the internal drives in a system unit.
I know how to attach RAM in the memory socket.
I can install CD / DVD drives.
I know how to install an operating system
I know how to configure a hardware components
I know the procedures in inspecting operating systems and software components
139
adapters - These are printed-circuit boards that enables the computer to use a
peripheral device for which it does not have the necessary connections or circuit
boards.
Analog Computers- It uses continuous variables for mathematical operations and
utilizes mechanical or electrical energy.
Bridge is a device filters data traffic at a network boundary
Digital Computers- They use digital circuits and are designed to operate on two
states, namely bits 0 and 1
Digital multimeter is a device that can take many types of measurements. It tests
the integrity
Drivers- are small software programs that help the operating system use or “drive”
the device
Ethernet switch is a device that gathers the signals from devices that are connected
to it
hard disk drive- Is a magnetic storage device that is installed inside the computer.
hardware- These are the tangible component of a computer system.
hazard- Is a situation in the workplace that has the potential to harm the health and
safety of people or to damage plant and equipment.
Hub- is a small, simple, inexpensive device that joins multiple computers together
Hybrid Computers- a combination of both digital and analog computers
Loopback adapter- is also called a loopback plug, tests the basic functionality of
computer ports
Mainframe Computers- these are computers have the capacities to host multiple
operating systems and operate as a number of virtual machines and can substitute
for several small servers
Microcomputers- A computer with a microprocessor and its central processing unit
it is known as a microcomputer
Minicomputers- are also called mid-range systems or workstations
140
motherboard- The main circuit board of a computer containing all the essential parts
of a PC.
Network firewall - protects a computer network from unauthorized access
Personal Digital Assistants (PDAs)- is a handheld computer and popularly known
as a palmtop
smart board - Type of display screen that has a touch sensitive transparent panel
covering the screen.
static electricity - An accumulation of electric charge on an insulated body.
Servers- They are computers designed to provide services to client machines in a
computer network
141
ATA- Advance Technology Attachment
BIOS- Basic Input Output System
CD- Compact Disc
CHS- Computer Hardware Servicing
CRT- Cathode Ray Tube
ESD- Electro Static Discharge
DVD- Digital Versatile Disc
FAT- File Allocation Table
GB- Giga Byte
HDD- Hard Disk Drive
LAN- Local Area Networking
LCD- Liquid Crystal Display
LED- Light Emitting Diode
MB- Mega Byte
NTFS- New Technology File System
OHS- Occupational Health and Safety
OS- Operating System
PDA- Personal Digital Assistant
PPE- Personal Protective Equipment
RAM- Random Access Memory
142
ROM- Read Only Memory
SATA- Serial Advance Technology Attachment
USB- Universal Serial Bus
WAN- Wide Area Network
VGA- Video Graphic Array
143
Books and Articles and Printed Materials:
1. Barry Press, Marcia Press, PC Upgrade and Repair Bible,
a. Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint
b. Boulevard, Indianapolis, IN 46256
2. Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475
a. Crosspoint Boulevard, Indianapolis, IN 46256
3. Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop
a. Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard,
Indianapolis,
b. IN 46256
4. K to 12 Basic Education Curriculum- Technology and Livelihood
Education
a. Learning Module –Computer Hardware Serviciing- RONALDO V.
RAMILO and
b. DEOVER M. PASCO
5. Technology and Livelihood Education- Information and Communications
Technology Learners Manual – Grade 7 & 8 - Marigen N. Leosala, Bobby
P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero
Electronic Resources:
1. http://www.buzzle.com/articles/computer-memory-types.html
Computer Memory Types
2. http://www.athropolis.com/popup/c-comp2.htm
Measurements for Memory & Storage
3. http://www.ustudy.in/ce/hard/u1
Fundamentals of PC repair
4. http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20-
%20With%20Oral%20Questioning_0.pdf
Occupational Health and Safety Precautions
5. http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp
Puzzles for Activities
144
6. http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_
v40_Chapter2.pdf
Occupational Safety Precautions
7. http://www.youtube.com/watch?v=6N7bqBsFL0w-
Computer Hardware Basics
8. http://www.wikihow.com/Install-Computer-Hardware-
How to install Computer Hardware
9. http://www.directron.com/howtoupsys.html-
How to install Computer components
10.http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20
10/ProperToolSelection.pdf
Tool Selection
11.http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html
12.http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics
13.www.professormesser.com- PC Hardware, Networking ,Operating Systems
and Troubleshooting
144
K to 12 Basic Education Curriculum
Technology and Livelihood Education
Content Standard Performance Standard
The learner demonstrates understanding
of the underlying concepts and principles
on diagnosing and troubleshooting of
computer systems.
The learner independently diagnoses
and troubleshoots computer systems as
prescribed in the TESDA Training
Regulation.
MODULE 4:
DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)
Number of Sessions (Time Allotment): 60 hrs
Republic of the Philippines
DEPARTMENT OF EDUCATION
145
Welcome to the next level of your modular training in Computer Hardware
Servicing (CHS) under the Information and Communications Technology (ICT)
Course. In this module you will have a great deal of diagnosing and troubleshooting
computer system. At the end of this module you will be able to plan and prepare for
diagnosis of computer system errors, configure, inspect and test computer system
networks and errors. Those skills are essential for you to reach the door of National
Certification II in Computer Hardware Servicing.
In this module, topics will be introduced progressively lesson by lesson for
easy understanding. After carefully answering the diagnostic assessment, reading all
the lessons, answering all the guide questions, masterfully performing all the
activities, showing evidences of learning and finally answering the summative test,
then you will have a considerable knowledge and skills in diagnosing and
troubleshooting computer system essential to be successful in computer hardware
servicing as one of the career option in ICT.
Reminder! Just follow the instructions given in this module. Now let us start
exploring new things in this module.
146
In this module, there will be four (4) major topics that you will encounter: (1)
be plan and prepare diagnosis of computer system errors; (2) diagnose and
configure computer systems and networks ; (3) inspect and test the configured
computer systems and networks ; and (4) test systems and networks. The four major
topics contains sub-topics which all leads to diagnose and troubleshoot computer
systems. This module contains what to KNOW, what to PROCESS, what to
REFLECT and UNDERSTAND as well as what to TRANSFER. The competencies
for this module are:
LO 1. Plan and prepare for diagnosis of computer systems errors
 Follow OHS procedures in planning and preparing diagnosis of computer
systems errors
 Determine the computer systems errors using manual and software diagnosis
LO 2. Diagnose and configure computer systems and networks
 Follow OHS procedures in planning and preparing diagnosis of computer
systems and network errors
 Identify the diagnosed computer systems and network errors based on the job
requirements
 Configure computer systems and networks
LO 3. Inspect and test the configured computer systems and networks
 Follow OHS procedures in inspecting and testing configured computer systems
and networks
 Inspect configured computer systems and networks
 Replace defective components
 Reinstall defective computer systems
 Identify networks errors
 Repair networks errors based on standard procedures
 Test the configured computer systems and networks
LO 4. Test Systems and Networks
 Follow OHS procedures in testing systems and networks
 Test computer systems and networks in accordance with the job requirements
 Accomplish technical reports on the tests conducted
In order to master the above listed competencies, you must be knowledgeable
of the topics under what to KNOW, perform activities required under what to
PROCESS, accomplish additional meaningful tasks under what to REFLECT and
UNDERSTAND and finally show some evidences of your learning by transferring
what you have learned in a different context under what to TRANSFER.
147
You will be challenged to dig deeper into your prior knowledge and previous
experiences about computer hardware servicing.
Instruction:
 Read each of the statements in the left-hand column of the chart.
 Place a check on the column that indicates your answers.
Knowledge
able
Have a little
Knowledge
No
Knowledg
e at All
Plan and prepare work to ensure occupational health
and safety (OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to on form with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with
job requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration
in accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures
(SOP)
Configure the identified systems and networks based on
specifications and job requirements
Inspect and test configured computer systems and
networks in conformity with manufacturer's
instructions/manual
Correct/Adjust components or parts of computer
systems and networks in accordance with job
requirements
Test computer systems and networks to ensure safe
operation
Perform scheduled/periodic maintenance in accordance
with manufacturer's requirements
Make needed repairs/replacements in accordance with
established procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials
in accordance with company SOP
148
LESSON 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEMS
ERRORS
SAFETY PRECAUTIONS
Personal Protective Equipment
Proper preparation is the key to a successful work. Before you begin, make
sure that you have the tools you will need, and secure a clear well-lit workplace.
Gather all the components you’ll be using and unpack them at the same time.
Always keep in mind that personal protection is one of the traits of a good computer
technician.
Types of personal protective devices
1. Anti-static devices
2. Power surge protectors
3. Personal equipment
Anti-static devices
Devices designed to protect the computer from static electricity.
Anti – static wrist strap Anti- static
mat
149
Power surge protectors
Devices designed to protect the computer from sudden power surges from
intermittent power sources.
Examples:
1. AVR (Automatic Voltage Regulators)
2. UPS (Uninterrupted Power Supply)
Personal Equipment
Small paint brush
Anti- static bag
Anti-static spray
150
Screw drivers
Pliers and tweezers
Compressed air
Handheld vacuum
Directions: Perform the activity below.
 Choose a partner
 Do a simulation exercise
o One will act out the role of a computer teacher.
o The other will be the student
Situation: Computer teacher will show/demonstrate to the students the
Personal Protective Devices, what they are and how they are used.
The Student keeps on asking about the Personal Protective
Devices/Equipment and how they can be maintained in good condition of PC.
151
Answer the following questions in your own answer/test notebook
1. For somebody who always works (do troubleshooting) with computers, what
personal protective devices do you usually use? How often do you use them?
2. Computers should be protected from static electricity to prevent component
malfunction. What anti-static devices can you utilize to avoid such
malfunction?
TYPES OF COMPUTER SYSTEM ERROR
There are several errors in a computer from the point you open it up to the point you
reach the stand by window (reaching standby windows means boot process has no
error). Here's a list of computer error.
1. No Video Output - When you open your PC, nothing shows up in your monitor and
the LED indicator of your monitor is flashing in yellow color.
2. No Video Output - Same as number one but now the LED indicator of your
monitor is in steady orange color.
3. Doesn't Boot - When you open your PC it will show the processor brand and/or the
motherboard brand but doesn't continue. Usually this error will result to system
restart over and over again.
4. Never Ending Loading of Operating system - The computer opens up then boots
but when the operating system loads it doesn't continue and it will take a lifetime if
you're going to wait for it to load.
5 Lots of pop up windows showing on standby mode - This also happens even if you
try disconnecting your computer set from the internet. This is what we called
aftershock virus which will continue to run even if internet is disconnected.
6. Lots of hardware installation windows appear - This happens even if you try
installing the hardware. When you restart your set it will happen again.
7. Safe mode doesn't work - When you try going to safe mode all you will see is a list
of files in Command prompt style.
152
8. Keyboard and mouse system restart - This will happen only in standby mode,
when you move your mouse or type something, your system will automatically restart
and the worst part is it will delete a file at random.
9. Sound on/off error - Upon loading the operating system, you will hear a loading
sound and then the sound stops, when you try running an audio file, no sound will be
heard.
10. Application causes system to restart - Just like the mouse problem, when you
open a program that will take the whole screen like for example a game and/or a
program applications, when you close it, it will cause your system to restart.
Aside from the common computer errors, computers also can have different
Operating System (OS) errors. OS errors can be classified into various categories,
such as:
1. System errors – These are moderately dangerous types of errors among
those that can pop up on your PC. System errors are caused by
malfunctioning hardware components, corrupted operating system modules,
etc.
2. Runtime errors – Runtime errors are caused by corrupted or malfunctioning
system files or software executables. Most runtime errors cause the
application that caused it to shut down. However, more serious runtime errors
may cause the system to become unstable or unresponsive, leaving you with
no choice but to reach for the Reset button.
3. Stop errors – Stop errors are caused by corrupted hardware, especially
malfunctioning RAM modules and bad sectors on hard disks. Stop errors can
be difficult to resolve at times.
4. Device Manager Errors – These are usually caused by corrupted driver files
or malfunctioning hardware components. In case of the former cause, the
problem is usually solved simply by reinstalling or updating the drivers.
However, the latter cause can often be solved only by replacing hardware
components.
5. POST code errors – POST code errors are caused by malfunctioning
hardware components, and are characterized by short beep sounds from the
tiny internal speaker of your motherboard. POST code errors occur when you
press the power button to turn on your PC..
6. Application errors – These can be caused at any point of time. As the name
suggests, these are caused by applications while those are running. These
are usually caused by glitches in the program code itself. These are usually
resolved by updating the program to its latest version.
7. Browser Status Codes – These are caused by problems faced by browsers
when trying to access a website. These can be caused by misplaced web
pages in the server of the website itself, or due to connection problems. For
153
instance, a 404 error would indicate that the browser is trying to access a
webpage that does not exist in the specified location.
DIAGNOSING COMPUTER SYSTEMS
PC Diagnosing
Probably the most frustrating problem computer users run into
are startup problems, where your computer won’t boot. Equally
annoying are error messages you constantly run into during your
computer’s startup process. In this module you will be given a
few tips on how you can avoid some of the most common
problems that happen right after your computer is turned on.
Here you will learn the basic troubleshooting.
 Trial and error: When you find a faulty component in your computer, check it
with the other computers so that you can make sure whether the fault is in the
component or not.
 Check cables: In case of any device failure, check all the cables of your
computer such as data cables, power cable, internal circuitry cables and
make sure that all these are plugged in and working fine.
 Hardware settings: Check the hardware settings in the CMOS and in the
device manager of the system and make all the device drivers up to date and
all the cards are plugged in properly.
 Notice changes: When you notice a software or hardware error in your
computer, determine what was changed before the problem occurred.
 Event viewer: In the event viewer, you will find the error or warning
messages associated with any faulty hardware or software.
 Make notes: Troubleshooting is a big learning option and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a record on
how a certain problem occurred and how did you solve it.
Common PC Problems and solutions
You are working away at your computer when suddenly, up comes an error
message – or worse, your computer comes to a screeching halt. Here are the
common computer problems and solutions that can help you.
154
Steps
1. Check the POST. POST stands for Power On Self-Test. This is generally the first
or second thing that appears on a computer after turning on the power. This appears
before the operating system begins to load. The POST will display any problems
found with hardware that makes the computer unable to boot, POST may also
display problems with hardware that allow the computer to boot, but not operate at
its full capacity during operation.
2. Notice the load time of the OS (operating system). A longer than usual load
time may indicate errors in the hard drive.
3. Notice any graphics problems once the OS has loaded. Reduced graphics
may indicate driver failures or hardware failures with graphic cards.
4. Perform an auditory test. An auditory test is an unorthodox, but still effective way
of judging how a computer is working. With the computer on and running, play any
decent length audio file (usually above 30 sec). If the audio is choppy or slow, it
usually means that the processor is working at an elevated level, or there is not
enough RAM to run all programs loading. Changing the startup sound is a great way
to apply this test. Another issue associated with choppy sounds is PIO (Programmed
Input/Output) Mode. This affects how the hard drive reads and writes data from a
drive. Switching to Direct Memory Access (DMA) allows for faster reads and writes,
and can sometimes repair choppy audio.
5. Check any newly installed hardware. Many operating systems, especially
Windows, can conflict with new drivers. The driver may be badly written, or it may
conflict with another process. Windows will usually notify you about devices that are
causing a problem, or have a problem. To check this use the Device Manager, this
can be accessed by entering the Control Panel, clicking the System icon, clicking
the Hardware tab, and clicking on Device Manager. Use this to check and arrange
the properties of hardware.
6. Check any newly installed software. Software may require more resources than
the system can provide. Chances are that if a problem begins after software starts,
the software is causing it. If the problem appears directly upon startup, it may be
caused by software that starts automatically on boot.
7. Check RAM and CPU consumption. A common problem is a choppy or sluggish
system. If a system is choppy it is good practice to see if a program is consuming
more resources than the computer can provide. An easy way to check this is
to use the Task Manager, right click on the taskbar select Task Manager, and click
the Processes tab. The CPU column contains a number that indicates the
155
Network
HUB
Network
cable
Network
card
percentage of CPU the process is consuming. The Memory Usage column indicates
how much memory a process is consuming.
8. Listen to the computer, if the hard drive is scratching or making loud noises,
shut off the computer and have a professional diagnose the hard drive. Listen
to the CPU fan, this comes on a high speed when the CPU is working hard, and can
tell you when the computer is working beyond its capacity.
9. Run a virus and malware scan. Performance problems can be caused by
malware on the computer. Running a virus scan can unearth any problems. Use a
commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus)
10. Check for the problem in safe mode. To enter safe mode, tap F8 repeatedly
during POST (this works on most systems). If the problem persists in safe mode, it is
a fair bet that the operating system itself is to blame.
Common Trouble shooting for Computer Units
1. Double check the power connections.
2. Voltage Regulator and power supply could
cause power failure in the computer unit.
3. Check the power cords and cable connectors
in your computer unit.
4. Unseated card. Loose cards could cause
malfunction.
5. Check the boot sequence configuration in the advance BIOS (Basic Input
/Output Unit) setup.
Diagnosing Network Connection
Things to look for if a PC is connected to the internet or network:
 First check the cable connecting to the
network card into the network hub.
 Check the back of the computer to see if
the network card light is on
 Check the network cable ( use cable
tester)
 Check the network HUB
(use multi-tester)
156
Identify the following:
1. Moderately dangerous types of errors among those that can pop up on your
PC.
2. Caused by malfunctioning hardware components, and are characterized by
short beep sounds from the tiny internal speaker of your motherboard.
3. Caused at any point of time. As the name suggests, these are caused by
applications while those are running.
4. Usually caused by corrupted driver files or malfunctioning hardware
components.
5. Caused by corrupted or malfunctioning system files or software executables.
6. Caused by corrupted hardware, especially malfunctioning RAM modules and
bad sectors on hard disks.
7. Caused by problems faced by browsers when trying to access a website.
Task: Develop a Sample Diagnostic Plan
List down all possible components to be checked based on the symptoms.
Symptoms: Dead Computer Monitor Good Defective Remedy
AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch
Power Supply
157
Diagnosing a Computer Power Supply
Create a diagnostic plan for troubleshooting a power supply with the use of
the following tools, materials and equipment.
You will be assessed using the following criteria
CRITERIA Passed Failed
1. Sequence of steps in diagnosing is followed.
2. Safety precaution is observed.
3. Appropriate tools are used in diagnosing.
4. Diagnostic plan for troubleshooting is created.
PERFORMANCE RATING
158
LESSON 2. DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND
NETWORKS
SAFETY PRECAUTIONS
Occupational Health and Safety (OHS) refers to the legislation, policies,
procedures and activities that aim to protect the health, safety and welfare of all
people at the workplace.
Every worker has a right to healthy and safe work and to a work environment
that enables them to live a socially and economically productive life. Safety practices
should be learned early and always adhered when working with any electrical device
including personal computers and peripherals.
Personal safety while working with PC’s
The following statements are some safety precautions to take before working with
any computer devices:
 Before doing anything, listen to your teacher’s instruction to prevent accidents
or any unwanted events that may occur on your workplace.
 Do not work on computer when you are wet because you might get
electrocuted.
 Do not remove internal devices of the computer when it is turned on.
 Avoid playing or running while inside the room.
 Always wear personal protective equipments (PPE) like coverall, shoes with
rubber sole, anti-static wrist strap, etc.
 Ask for assistance from your teacher when it comes on dealing with computer
devices.
 Applying safety measure when handling tools and equipment are necessary
to avoid certain damages.
The student is further expected to maintain good health, to be neat in personal
appearance and to practice safe working procedures at all time with appropriate
equipment.
159
Basic Concepts of Electricity
This lesson will introduce us to the fundamental knowledge of electricity. It will
enable student to be equip with the basic knowledge in electricity.
Basic Electrical Terms
 Electricity is define as the flow of electron or electric current. It
is an invisible form of energy that can be transform
into other form of energy like heat light and
mechanical.
 Electron is the negatively charge component of an atom. It
has the ability to flow.
 Proton is the positively charge component of an atom. It
had the ability to attract electron.
 Matter is anything that occupy space and has mass. It can
be a solid, liquid or gas in state.
 Atom Basic component of matter. It composes of a
nucleus which is the central part, the protons and
electrons.
 Current Same as electricity or flow of electron. The amount
of current flowing in a circuit can be measured in
ampere (I).
 Voltage the amount of pulling force that makes the electron
flow. Also known as potential difference or
EMF(electromotive force). The amount of voltage
can be measured in volt (V).
 Resistance define as the opposition to the flow of current. The
amount of resistance can be measure in ohms (Ω).
160
Conductors and Insulators
 Conductors are materials that easily allow the flow of current, or it has a low
resistance to current flow.
Examples; aluminum, gold, silver, copper, iron
 Insulators are materials that do not easily allow the flow of current, or it has a
high resistance to current flow.
Examples; rubber, plastic, paper
Types of Current
1. Direct Current
In direct current (DC), the flow of electric charge is only in one direction. This
is the type of electricity is produced by batteries, static, and lightning. A voltage is
created, and maybe stored, until it is consumed. When the current flows directly, in
one direction. In the circuit, the current flows at a specific, constant voltage (this is
oversimplified somewhat but good enough for our needs.) When you use a flashlight,
pocket radio, portable CD player or virtually any other type of portable or battery-
powered device, you are using direct current.
Most DC circuits are relatively low in voltage; for example, your car's battery is
approximately 12V, and that's about as high a DC voltage as most people ever use.
Figure 1. Direct Current
An ideal 12 V DC current. The voltage is considered positive because its potential is
measured relative to ground or the zero-potential default state of the earth.
Direct currents flow in one direction only, and are constant in time. Their
appearance is that of a straight line which does not vary. They are produced from
power sources such as batteries, power supplies and DC generators. Photovoltaic
devices such as solar cells also generate DC power.
2. AC Alternating Current
161
In alternating current (AC, also ac) the movement of electric charge
periodically reverses direction. This type of electricity is produced or generated by
AC generators commonly from a hydro electric plant. It is the commercial power that
we use in homes and offices. Delivered through a power transmission lines. AC
current can be reduced through the use of power transformer to suite for its
application. It can also be converted to DC for a specific purpose. In the Philippines
AC is rated as 220V AC at 60 Hz.
Alternating currents change direction, flowing first one way and then the other.
They are sinusoidal waves, so that they change in time. They are produced from
sources such as power supplies and AC generators. In North America, AC is 120
volts and 60 hertz or cycles per second. This means it changes direction 60 times
per second. In Europe, it is generally 50 hertz with 220 to 240 volts.
Figure2. Alternating Current
Why does standard electricity come only in the form of alternating current?
There are a number of reasons, but one of the most important is that a characteristic
of AC is that it is relatively easy to change voltages from one level to another using a
transformer, while transformers do not work for DC. This capability allows the
companies that generate and distribute electricity to do it in a more efficient manner,
by transmitting it at high voltage for long lengths, which reduces energy loss due to
the resistance in the transmission wires. Another reason is that it may be easier to
mechanically generate alternating current electricity than direct current.
PC’s use only direct current, which means that the alternating current
provided by your utility must be converted to direct current before use. This is
the primary function of your power supply.
162
Figure 3. Simplified block diagram of a PC power supply
Electric Circuit
Electric circuit - is the pathways for electricity to flow.
Components of Circuit
 Load - commonly represented by a bulb or any electrical component that
consumes electricity.
 Supply - Commonly represented by a cell or a battery
 Switch - an electrical device that opens or closed a circuit.
Figure4. A simple circuit
Types of Circuit
1. Open Circuit - a type of circuit that has an open path for current to flow. It means
that current cannot flow in open circuit.
AC POWER PC’s PSU DC POWER
MOTHERBOARD
DRIVES
COOLING FANS
Load
Switch
Supply
163
Figure5. An open circuit
The switch is said to be “OPEN” the current can’t flow into the circuit and the
bulb is “OFF”
2. Closed Circuit - a type of circuit that has a closed path for current to flow. It
means that current can flow in a closed circuit.
Figure 6. A closed circuit
The switch is said to be “CLOSED” the current can’t flow into the circuit and
the bulb is “ON”
Load
Switch
Supply
- +
Load
Switch
Supply
- +
164
I. Identification:
Direction: Identify the following statement.
_________1. Define as the flow of electron or electric current. It is an invisible form of
energy that can be transform into other form of energy like heat light and
mechanical.
_________2. The negatively charge component of an atom. It has the ability to flow.
_________3. Define as the opposition to the flow of current. The amount of resistance
can be measure in ohms (Ω).
_________4. The positively charge component of an atom. It has the ability to attract
electron.
_________5. Anything that occupy space and has mass. It can be a solid, liquid or gas
in state.
_________6. Basic component of matter. It composes of a nucleus which is the central
part, the protons and electrons.
_________7. Same as electricity or flow of electron. The amount of current flowing in a
circuit can be measured in ampere (I).
_________8. The amount of pulling force that makes the electron flow. Also known as
potential difference or EMF (electromotive force). The amount of voltage
can be measured in volt (V).
_________9. Materials that easily allow the flow of current, or it has a low resistance to
current flow.
_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.
_________11. A computer power supply converts AC to ___________________.
_________12. Define as the pathways for electricity to flow.
165
_________13. A component of a circuit that is commonly represented by a bulb or any
electrical component that consumes electricity.
_________14. A component of a circuit that is commonly represented by a cell or a
battery.
_________15. An electrical device that opens or closed a circuit.
_________16. A type of circuit that has a closed path for current to flow. It means that
current can flow in this circuit.
_________17. A type of circuit that has an open path for current to flow. It means that
current cannot flow in this circuit.
_________18. A circuit connection has only one path of current flow. In this circuit
connection the current remain constant.
_________19. A circuit connection that has 2 or more path of current. In this circuit the
voltage remains constant.
_________20. An invisible form of energy.
Techniques for diagnosing computer systems
Computer Diagnosis
Sometimes when the problem with a system is not totally apparent and the
problem may be intermittent, using a basic common diagnostic procedure may help
determine what is wrong. This procedure has a number of steps that, if followed
each time, can be of help.
Rules in Diagnosing Computer System
1. Know the facts
 Educate oneself on all aspects and operation of computer parts.
 Continuous learning on computer technology.
2. Use your common sense
3. Focus on Field Replaceable Units
166
 Identify the different types of FRU that can be used for replacement or
sub assembly.
4. Proper assembly and disassembly
5. Factors Causing Computer Failures and Defects
People ware
 Untrained personnel would probably damage programs in PC.
Firmware
 Programs or software burnt in chips may be corrupted.
Software
 Corrupted operating systems would cause the system to fail.
Hardware
 Defective hardware components would lead to computer malfunction.
 Hardware conflicts and viruses can hinder your computers performance.
ESD (Electro Static Discharge)
Electro static discharge can easily damage sensitive components in your
computer.
Electricity
Incoming supply from AC outlet must be regulated; power surges can damage
computer units.
Problem Isolation
Problem isolation is a detective work in which you need to determine what is
out of the ordinary by making detailed observation of what is not working normally
and record any information as you proceed. The information you will be able to
gather will help diagnose your computer. You need to observe wisely. Look for any
abnormalities in the unit, any change in smell or foreign smell, listen to all the
sounds, and error codes.
Component Isolation
This section will aid in determining components in your system which are
failing. First, most systems have 3 major components; monitor, system unit, and
printers. Some have multiple external devices. To troubleshoot, you need to isolate
major components which are failing to operate.
Diagnostics Procedure for ATX Power Supply Failure
1. Determine whether or not the power comes on.
167
2. Check the switch operation with a Digital Volt Meter on the continuity or
resistance setting.
3. Check the pins if the corresponding voltage are properly regulated to
the motherboard.
4. Replace the power supply unit if defective.
ATX Version 1.2 - 20 wire motherboard connector
Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8 Pin 9 Pin 10
3.3V 3.3V Gnd 5V Gnd 5V Gnd P_OK 5VSB 12V
Oran Oran Blk Red Blk Red Blk Gray Purp Yell
Oran Blue Blk Green Blk Blk Blk White Red Red
3.3V -12V Gnd P_ON Gnd Gnd Gnd -5V 5V 5V
Pin 11 Pin 12 Pin 13 Pin 14 Pin 15 Pin 16 Pin 17 Pin 18 Pin 19 Pin 20
168
Flowchart for ATX Power Supply Repair
Warning! You must unplug your ATX power supply from the wall before
working inside the case.
ATX Diagnostic chart
169
Things to Consider
There are many devices, parts, cords, and connections on a computer, which
means that there are many possible problems that could arise. In addition, your
computer uses a variety of software, which can also cause problems. However, no
matter what the problem is, you can use the following tips to help you find a
solution:
 Always check the cables: Many computer problems are related to an issue in
the cables and connections. The easiest first step you can take to troubleshoot
most problems is to check all related cables and connections.
 Isolate the problem: If possible, try to isolate the problem. For example, if you
can't get the cursor to move on the screen, try to determine if the issue is with the
mouse. If you have an extra mouse, you can alternate devices to see if the one
plugged in is the issue, or use the arrow keys on the keyboard to help determine
if the mouse is the source of the problem. When trying to isolate the problem,
only make one change at a time.
Figure 7. An error message
 Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If the basic
troubleshooting steps don't work, you may need the information.
 Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you don't
repeat yourself. If you can't remember it, then write it down. If you end up asking
someone for help, it will be much easier if they know exactly which steps you've
taken.
Simple Solutions to Common Problems
Most of the time, problems can be fixed by using simple troubleshooting
techniques, such as closing and re-opening the program. It's important to try these
simple solutions before resorting to more extreme measures. If the problem still isn't
fixed, you can then try other troubleshooting techniques, such as reinstalling the
software.
170
Program Runs Slowly or Isn't Working Right
 If a program is running slowly or otherwise isn't working right, the first thing you
should try is closing the program and re-opening it.
 You can also shut down your computer, wait a few seconds, and boot it up
again. Some minor problems will work themselves out when you do this.
 Check with the company for any known problems or updates to the software.
Figure 8. Checking for updates
Program is Completely Unresponsive
 If a program has become completely unresponsive, you can press (and hold)
Control+Alt+Delete on your keyboard to open the Task Manager. You can then
select the program that isn't working and click End Task. If you are using a Mac,
you can press Option+Command+Esc to open a similar dialog box.
Figure 8. The Task Manager
171
Problems Starting or Shutting Down the Computer
Power Button Will Not Start Computer
Figure 9. Resetting a surge protector
 If your computer does not start, begin by checking the power cord to confirm
that it is plugged securely into the back of the computer case and the power
outlet.
 If it is plugged into an outlet, make sure it is a working outlet. Often, this will
require you to plug a lamp or other electrical device into the outlet to make sure it
is receiving power.
 If the computer is plugged into a surge protector, verify that it is turned on. You
may have to reset the surge protector by turning it off and then back on. You can
also plug a lamp or other device into the surge protector to verify that it is on.
 If you are using a laptop, the battery may not be charged. Plug the AC adapter
into the wall and then try to turn on the laptop. If it still doesn't start up, you may
need to wait a few minutes and then try again.
"Non-System Disk or Disk Error" Message
If you get this message when you boot up your computer, it usually means
there is a CD, DVD, USB flash drive, or floppy disk in your computer, which is
interfering with your computer's booting process. Remove the disk from the drive
and restart the computer.
Figure 10. The Non-System Disk or Disk Error Message
172
Windows Shutting Down Message Will Not Disappear
Sometimes Windows will freeze during the shutdown process. If this
happens, the Windows is Shutting Down message screen will stay active on
your screen. To finish shutting down the computer, press and hold the power
button for about 10 seconds, or until the computer turns off.
Figure 11. The Windows shutdown screen
Computer Begins Randomly Rebooting or Crashing
 Check for overheating. Make sure the vents in the case are not blocked. Confirm
that there is good air flow around the computer.
 Update your antivirus software and scan for viruses.
Figure 12. Virus Scanning
173
Problems with the Monitor and Speakers
No Picture on the Monitor
 Confirm the computer is turned on.
 Check the brightness control, located on your monitor or your keyboard, and
make sure it is not set too low.
 Check the connections for the monitor and surge protector, and make sure the
surge protector is turned on.
Figure 13. Cable plugged into monitor
Monitor Goes Blank Periodically
 You may have the screensaver enabled.
If the screen saver is enabled, just move
your mouse back and forth and your
original screen will appear. You can
change the screensaver settings by
going to your Control Panel (or your
System Preferences if you're using a
Mac).
Figure 14. Opening the Control Panel
174
No Sound
Figure 15. Adjusting the sound volume on a Mac
 Check the volume control on your computer. In Windows, the sound icon will
usually be on the taskbar, and you can also access the sound options in the
Control Panel. On Macs, the sound options are found at the top of the screen or
in System Preferences.
 Most media programs (such as iTunes or Windows Media Player) have a
volume control, which will need to be turned up.
 Make sure the speakers are turned on, if using external speakers.
 Make sure external speakers are connected to the correct audio port or a USB
port. If your computer has color-coded ports, the audio output will usually be
green.
 Connect headphones to the correct audio port and determine if sound is audible
from the headphones.
Searching the web for a solution
If you still haven't found a solution to your problem, you may need to ask
someone else for help. Try searching the web for the problem that you're having, as
other people may have had similar problems. Also, if you have a friend or family
member who knows a lot about computers, they may be able to help you.
Keep in mind that most computer problems have simple solutions, although it
may take some time to find them. For very difficult problems, a more drastic
solution may be required, such as reformatting your hard drive, reinstalling
programs, or reinstalling your operating system. If you're not a computer expert, it's
possible that you could make the situation worse, so it's best to consult a
professional if you think a drastic solution is needed.
175
Task. Examining the Motherboard in Detail
1. Look at the back of your computer. Without opening the case, list the ports that
you believe come directly from the motherboard.
2. Remove the cover of the case. List the different expansion cards in the expansion
slots. Was your guess correct about which ports come from the motherboard?
3. To expose the motherboard so you can identify its parts, remove all the
expansion cards.
4. Draw a diagram of the motherboard and label these parts: Processor (Include the
prominent label on the processor housing.)
a) RAM (each DIMM slot)
b) CMOS battery
c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe x16,
and AGP.) Each port coming directly from the motherboard Power supply
connections, SATA or IDE drive connectors and floppy drive connector
5. Draw a rectangle on the diagram to represent each bank of jumpers on the
board.
6. What is the brand and model of the motherboard?
7. Locate the manufacturer’s Web site. If you can find the motherboard manual on
the site, download it.
8. You can complete the following activity only if you have the documentation for the
motherboard:
 What do you do if a program on a PC is completely unresponsive? What about
a program on a Mac?
 What should you do if you've tried everything and the problem still isn't fixed?
Diagnosing Power Supply Failure
176
Directions: Divide the class into five (5) groups. Choose a leader for each group.
The group will prepares a chart and perform the tasks required by the Diagnostics
Procedure of ATX Power Supply Failure. After the activity they will be graded
through the given Performance Score Card below:
PERFORMANCE SCORE CARD
Performance Criteria Passed Failed
1. The students clearly identified the problem and applied the
possible solution correctly.
2. The students utilized actual tools/device in performing the actual
usage of each tools and OHS was observed.
3. The students applied safety precautions during the Activity.
4. The activity gave students more critical thinking on the personal
protective equipment.
5. The students cooperatively performed the activity.
177
Tools for Testing Computer System
Tools and equipment play vital roles in troubleshooting. They help the user
determine the errors found in their computer hardware and network.
Tools used to test hardware problems:
1. Screw drivers - are used for installing and removing screws in the computer unit.
Figure 16. Screw Drivers
2. Pliers and tweezers - are used for picking small parts in the computer unit.
Figure17. Pliers and Tweezers
3. Soldering iron- is primarily used for connecting terminals in the power supply and
circuit board with the use of a soldering lead.
178
Figure18. Soldering iron
4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic
discharge in the work area.
Figure19. Anti- static wrist strap, mat and spray
5. Lens cleaner – a device used for cleaning optical media, such as DVD-ROMS and
CD-writers.
Figure20. Lens Cleaner
6. Thermal paste-is a paste used for heat dissipation of the processor.
Figure21. Thermal Paste
179
Network Troubleshooting Tools
1. LAN Tester – is a device used for testing the network connection.
Figure22. LAN Tester
2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP cable.
Figure23. Crimping Tool
Direction: Answer the following question. Write your answers on your notebook.
.
Enumerate the six tools used for
troubleshooting.
1.
2.
3.
4.
5.
6.
2. Enumerate the two network
troubleshooting tools.
a.
b.
180
Troubleshooting computer system network
Causes of Network Trouble
If a computer is unable to connect to a network or see other computers on a
network, it may be necessary to troubleshoot the network. A network may not work
because of any of the reasons below.
1. Network card not properly connected.
2. Bad network card drivers or software settings.
3. Firewall preventing computers from seeing each other.
4. Connection related issues.
5. Bad network hardware.
Solution
Because of the large variety of network configurations, operating systems,
setup, etc... Not all of the below information may apply to your network or operating
system. If your computer is connected to a company or large network, or you are not
the administrator of the network, it is recommended that if you are unable to resolve
your issues after following the below recommendations that you contact the network
administrator or company representative.
Verify connections / LEDs
Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable, ensure
that the LEDs on the network are properly illuminated. For example, a network card
with a solid green LED or light usually indicates that the card is either connected or
receiving a signal.
If, however, the card does not have any lights or has orange or red lights, it is
possible that either the card is bad, the card is not connected properly, or that the
card is not receiving a signal from the network.
If you are on a small or local network and have the capability of checking a
hub or switch, verify that the cables are properly connected and that the hub or
switch has power.
181
Adapter resources
Ensure that if this is a new network card being installed into the computer that
the card's resources are properly set and not conflicting with any hardware in the
computer.
Adapter functionality
Verify that the network card is capable of detecting or seeing itself by using
the ping command. Windows / MS-DOS users ping the computer from a MS-DOS
prompt. Unix / Linux variant users ping the computer from the shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping local host
This should show a listing of replies from the network card. If you receive an
error or if the transmission failed, it is likely that either the network card is not
physically installed into the computer correctly, or that the card is bad.
Protocol
Verify that the correct protocols are installed on the computer. Most networks
today will utilize TCP/IP, but may also utilize or require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other computer
assigns the IPX address, the user must specify an IP address as well as a Subnet
Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do
not click on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192
7. When specifying these values, the computers on the network must all have
the same Subnet Mask and have a different IP Address. For example, when using
the above values on one computer you would want to use an IP address of
102.55.92.2 on another computer and then specify the same Subnet Mask.
Firewall
If your computer network utilizes a firewall, ensure that all ports required are
open. If possible, close the firewall software program or disconnect the computer
from the firewall to ensure it is not causing the problem.
182
Additional time
In some cases it may take a computer some additional time to detect or see
the network. If after booting the computer you are unable to see the network, give
the computer 2-3 minutes to detect the network. Windows users may also want to try
pressing the F5 (refresh) key when in Network Neighborhood to refresh the network
connections and possibly detect the network
Additional troubleshooting
If after following or verifying the above recommendations you are still unable to
connect or see the network, attempt one or more of the below recommendations.
If you have installed or are using TCP/IP as your protocol you can ping another
computer's IP address to verify if the computer is able to send and receive data. To
do this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant
users must open or be at a shell.
Once at the prompt assuming, that the address of the computer you wish to
ping is 102.55.92.2, you would type:
ping 102.55.92.2
If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the network.
If you are still unable to connect or see the network, it is possible that other issues
may be present.
Another method of determining network issues is to use the tracert command
if you are a MS-DOS or Windows user or the trace route command if you are a Linux
/ Unix variant user. To use this command you must be at the command prompt or
shell. Or trace route 102.55.92.2
This should begin listing the hops between the computer and network
devices. When the connection fails, determine what device is causing the issue by
reviewing the trace route listing.
Networking with DHCP
Task: Setting up a local area network with a Dynamic Host Control Protocol
(DHCP) server is easy! The DHCP server provides all the information your computer
needs to get up and running on the network. Once connected, you will check
network connectivity with the router and at least one other peer on the network.
183
Procedure
Getting connected
1. Before connecting your PC to the network, be sure the Windows XP operating
system is running on your computer. You will use Windows XP sp2 throughout this
activity.
2. Next, open a terminal window on your computer by clicking on Applications-
>Accessories->Terminal.
3. In the terminal window, type ipconfig and press Enter.
a. How many network devices are listed in the output? Record their names in your
worksheet.
b. Is there an IPv4 address listed for any of the network devices? If so, record your
IP address (es) in your worksheet.
4. Connect your computer to a network switch using a patch cable. Did you get a
light on the switch? Record the port number you connected to in your worksheet.
5. Draw a diagram of the entire local area network in the space below, including the
router, any switches or hubs, and all connected PCs.
6. Run ifconfig again. Do you see an IP address? If so, record it in your worksheet.
7. In the terminal window, type dhclient eth1 and press Enter. Describe what
happens.
Checking your connection
1. Check connectivity with the router with the ping command. Type ping -c4 10.0.1.1
and press Enter. Record the times listed in the last column of the output. What was
the average round trip time (rtt) from your computer to the router and back?
2. Ask another group for their IP address. Check connectivity with that group's
computer with ping. Run ping as shown above, substituting the new IP address for
the one listed in the previous item. Record the times listed in the last column below.
What was the average round trip time (rtt)?
3. When you have completed the activity, shut down your computer and return to
your seat.
184
Title: Networking with Static IPs
Purpose: While setting up a network with a Dynamic Host Control Protocol
(DHCP) server is very convenient, it is sometimes preferable to use static IP
addresses. In this activity, you will join the network using an IP address and netmask
provided by your instructor. Once connected, you will check network connectivity
with at least one other peer on the network.
Procedure
Getting connected
1. Before connecting your PC to the network, be sure the windows Operating
system is running on your computer.
2. When the boot process is completed, connect your computer to the network
switch using a patch cable. Did you get a light? What port number did you connect
to on the switch?
3. Draw a diagram of the entire network in the space below.
4. To configure your network settings, click System->Administration->Network.
5. In the Network settings window, make sure the Connections tab is selected.
6. Click on Wired connection, and then click the Properties button.
7. In the Interface properties window, change the Configuration setting to Static IP
address.
8. Enter the IP address provided by your instructor in the IP address field.
9. Enter 10.0.1.0 in the Gateway address field.
10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to close the
Interface
properties window.
11. Click OK to close the Network settings window.
Checking your connection
1. Open a terminal window on your computer, if one is not already open, by clicking
Applications->Accessories->Terminal.
2. Type ipconfig and press Enter. Are your network setting correct? If not, repeat the
steps 4–11 in the previous section
185
3. Ask another group for their IP address. Check connectivity with that group's
computer with ping. For example, ping -c4 10.0.1.200. Record the times listed in the
last column below. What was the average round trip time?
4. Ask a second group for their IP address. Check connectivity to that group's
computer with ping. Record the times listed in the last column below. What was the
average round trip time?
CRITERIA
Evaluation:
Passed Failed
1. Sequence of steps in diagnosing is followed.
2. Safety precaution are observed.
3. Appropriate tools are used in diagnosing.
4. Diagnostic plan for troubleshooting is created.
Remarks
186
Computer System and Network Configurations
Computer Networks
Networks are collections of computers, software, and hardware that are all
connected to help their users work together. A network connects computers by
means of cabling systems, specialized software, and devices that manage data
traffic. A network enables users to share files and resources, such as printers, as
well as send messages electronically (e-mail) to each other.
The most common networks are Local Area Networks or LANs for short. A
LAN connects computers within a single geographical location, such as one office
building, office suite, or home. By contrast, Wide Area Networks (WANs) span
different cities or even countries, using phone lines or satellite links.
Network System Configuration
All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.
Designing Your Network
Plan on the design phase to take anywhere from one to three working days,
depending on how much help you have ad how big your network is.
Here are the key tasks:
 Settle on a peer-to-peer network or a client/server network.
 Pick you network system software.
 Pick a network language.
 Figure out what hardware you need.
 Decide on what degree of information security you need.
 Choose software and hardware solutions to handle day-to-day management
chores.
Rolling Out Your Network
Rolling out your network requires the following steps:
 Run and test network cables.
187
 Install the server or servers if you’re setting up a client/server network. (If you are
setting up a peer-to-peer network, you typically don’t have to worry about any
dedicated servers.)
 Set up the workstation hardware.
 Plug in and cable the Network Interface Cards (NICs – these connect the network
to the LAN).
 Install the hub or hubs (if you are using twisted-pair cable).
 Install printers.
 Load up the server software (the NOS, or Network Operating System) if your
network is a client/server type.
 Install the workstation software.
 Install modem hardware for remote dial-up (if you want the users to be able to
dial into the network).
 Install the programs you want to run (application software).
Configuring Your Network
Network configuration means customizing the network for your own use.
 Creating network accounts for your users (names, passwords, and groups).
 Creating areas on shared disk drives for users to share data files.
 Creating areas on shared disk drives for users to share programs (unless
everyone runs programs from their own computer).
 Setting up print queues (the software that lets users share networked printers).
 Installing network support on user workstations, so they can "talk" to your
network.
Managing Your Network
The work you do right after your LAN is up and running and configured can save you
huge amounts of time in the coming months.
 Mapping your network for easier management and troubleshooting.
 Setting up appropriate security measures to protect against accidental and
intentional harm.
 Tuning up your LAN so that you get the best possible speed from it.
 Creating company standards for adding hardware and software, so you don’t
have nagging compatibility problems later.
 Putting backup systems in place so that you have copies of data and programs if
your hardware fails.
 Installing some monitoring and diagnostic software so that you can check on your
network’s health and get an early warning of impleading problems.
 Figuring out how you plan to handle troubleshooting – educating your LAN
administrator, setting up a support contract with a software vendor, and so on.
188
Smooth Setup
One key advantage of a peer-to-peer network is that it’s easy to setup. With
the simplest sort of peer-to-peer network, you just use the built-in networking that
comes with your operating system (Windows 98, Windows XP, Windows 7,
Windows 8 and so on) and you have very little software to set up – even less if you
have computers that have the operating system preinstalled, as most computers do
these days.
For Windows XP and Windows 7, the basic steps to setting up a peer-to-peer
network are as follows:
(Review for Cabling) UTP Cable
A UTP cable (category 5) is one of the most popular LAN cables. This cable
consists of 4 twisted pairs of metal wires (that means there are 8 wires in the cable).
Adding RJ45 connectors at both ends of the UTP cable it becomes a LAN cable they
usually use.
Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter
Figure24. Materials for Cabling
Making Cable
Follow the steps below.
189
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this
side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire arrangement
table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable. (Any
cable in this page is directionless --- that means you can set either end of the
cable to either device.)
How to see the wire arrangement
Take the UTP cable with your left hand and a RJ45 connector with your right
hand. Hold the RJ45 connector in the way you can see the contact metal face of the
RJ45 connector.
The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white twisted
pairs.
10 Base T / 100 Base T Straight
10BaseT and 100BaseT are most common mode of LAN. You can use UTP
category-5 cable for both modes. (You can use UTP category-3 cable for 10BaseT,
in which there are only 3 wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it to
connect 2 hubs in the case one of the hubs has an uplink port (and you use normal
port on the other hub).
190
10 Base T / 100 Base T Cross
A cross cable for 10BaseT and 100BaseT is used to connect 2 computers
directly (with ONLY the UTP cable). It is also used when you connect 2 hubs with a
normal port on both hubs. (In other words, the cross cable is used relatively in a rare
case.)
Pin ID side A side B
1 orange-white green-white
2 orange green
3 green-white orange-white
4 blue blue
5 blue-white blue-white
6 green orange
7 brown-white brown-white
8 brown brown
To create a peer network, you must have the following components:
Pin ID side A side B
1 orange-white orange-white
2 orange orange
3 green-white green-white
4 blue blue
5 blue-white blue-white
6 green green
7 brown-white brown-white
8 brown brown
191
• A network interface or Local Area Network (LAN) adapter for each computer. The
same manufacturer and model of network card is preferred.
• Cabling that is supported by the network cards.
• Windows XP or 7 drivers for the network cards.
• A common network protocol.
• A unique computer name for each computer.
Task. Creating Peer to Peer Network
To create a peer network, follow these steps for each computer connected to the
network:
1. Shut down the computer and install the network card and appropriate cabling for
each computer.
2. Start Windows and install the network drivers. Windows may detect your network
card and install the drivers when you start the computer. If the network card drivers
are not included with Windows, follow the manufacturer's instructions about how to
install the network drivers.
3. Choose a client and a common protocol for each computer. To do this, follow
these steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click Add, click Client, and then click Add.
c. In the Manufacturers box, click the appropriate manufacturer, click the
appropriate client in the Network Clients box, and then click OK.
d. Click Add, click Protocol, and then click Add.
NOTE: For information about how to configure your network adapters and physically
connect your computers, consult the documentation included with your network adapters
or contact the manufacturer(s) of your network adapters.
192
e. In the Manufacturers box, click the appropriate manufacturer, click the
appropriate protocol in the Network Protocol box, and then click OK.
4. Configure a peer server. Each computer that is configured for File and Printer
Sharing can act as a server. To configure a computer for File and Printer Sharing,
use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click File and Print Sharing, click one or both options to share files and printers,
click OK, and then click OK again.
c. Click Yes when you are prompted to restart your computer.
1. Give each computer a unique computer name. To do this, use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. On the Identification tab, type a unique name in the Computer name box.
c. Click OK, and then click Yes when you are prompted to restart your computer.
:
Task. Setting Windows Network Connection
Equipment, Tools and Materials Required:
- UTP cables
- 4 Computer units
- 1 hub
NOTE: The computer name must be unique for each computer on the network and
should be no more than 15 characters in length. In small networks, the workgroup
name should be the same for each computer so that all computers are visible in the
same workgroup when browsing. You should not use spaces or the following
characters in computer and workgroup names
193
Given the following materials, set-up a network connection on four computers.
Task 2. Using the Internet for Research
In this project, you will learn how useful the Internet can be for a PC support
technician.
1. Using your own or a lab computer pretend that the motherboard manual is not
available and you need to replace a faulty processor. Identify the manufacturer and
model of the mother board by looking for the manufacturer name and model number
stamped on the board. Research the Web site for that manufacturer. Print the list of
processors the board can support.
2 .Research the Web site for your motherboard and print the instructions for flashing
BIOS.
3.Research the Abit Web site (www.abit.com.tw) and print a photograph of a
motherboard that has a riser slot. Also print the photograph of the riser card that fits
this slot. What is the function of the riser card?
More Security for Remote Desktop
Task. Analyze the situations below and answer the questions that follows.
When Jacob travels on company business, he finds it’s a great help to be able to
access his office computer from anywhere on the road using Remote Desktop.
However, he wants to make sure his office computer as well as the entire corporate
network is as safe as possible. One way you can help Jacob add more security is to
CRITERIA 1 2 3 4 5
 Safety Precautions are observed.
 All the UTP are properly connected to the computer and
hub.
 Computers are properly connected and seen in the
network.
 Proper boot-up and shutdown of the computer is
observed.
Total:
194
change the port that Remote Desktop uses. Knowledgeable hackers know that
Remote Desktop uses port 3389, but if you change this port to a secret port, hackers
are less likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop uses.
Practice implementing this change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use another
computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer using
the secret port. Print a screen shot showing how you made the connection using
the secret port. Verify the session works by transferring files in both directions.
3. What secret port did you use?
195
Lesson 3. INSPECT AND TEST THE CONFIGURED COMPUTER SYSTEMS AND
NETWORKS
General Safety Tips and Reminders
 Observe good housekeeping in the area of the machines during and after
maintenance.
 Place removed covers and other parts in a safe place, away from all personnel,
while you are servicing the machine.
Dress for the Job
 Keep your tool case away from walk areas so that other people will not trip over
it.
 Do not wear loose clothing that can be trapped in the moving parts of a machine.
Ensure that your sleeves are fastened or rolled up above your elbows. If your hair
is long, use hair net or hair cap.
 Insert the ends of your necktie or scarf inside clothing or fasten it with a
nonconductive clip, approximately three (3) inches from the end.
 Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.
 After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
 Finally, reinstall all covers correctly before returning the unit to the customers.
Electrical safety
Electric current from power, telephone, and communication cables can be
hazardous. To avoid personal injury or equipment damage, disconnect the attached
power cords, telecommunications systems, networks and modems before you open
Remember: Metal objects are good conductors
196
the server/workstation covers, unless instructed otherwise in the installation and
configuration procedure.
Precautions
 Disconnect all power before:
 Performing a mechanical inspection
 Working near power supplies
 Removing or installing main units
 Before starting work on the machine, unplug the power cord.
 Never assume that power has been disconnected from a circuit. First, check that
it has been powered-off.
 Always look carefully for possible hazards in your work
 Moist floors
 Non-grounded power extension cables
 Power surges.
 If an electrical accident occurs:
 Switch off power
 Send another person to get medical aid
Safety Inspection Guide
1. These steps will help you identify potentially unsafe conditions on electrical
products:
 Check exterior covers for damage (loose, broken, or sharp edges)
 Power-off computer. Disconnect the power cord.
 The power cord should be the appropriate type.
 Insulation on the power cord must not be frayed or worn out.
 Remove the cover.
 Check for any obvious alteration. Use good judgment as to the safety of
any alterations.
 Check for worn out, frayed or pinched cables.
 Check that the power-supply cover fasteners (screws or rivets) have not
been removed or tampered with.
Accident Reporting Policy and Procedure
There must be a process put in place to report accidents, incidents or near misses
for immediate action and to help track causes. The organization needs to identify what
needs to be reported, to whom it is to be reported, and how to report it, then put this
process into a written procedure.
For example:
Any accident, incident, or "near miss," no matter how slight the injury or damage, must be
reported to the department supervisor immediately for appropriate action.
197
The supervisor is responsible for taking appropriate follow-up action, including getting
medical attention for the injured, completing an investigation report and recommending or
implementing appropriate corrective actions.
The primary purpose of the accident investigation is to identify the cause(s) of the
accident, incident or "near miss" and take action to prevent a similar occurrence in the
future. In some instances, an employee's or volunteer's failure to follow recognized safety
procedures requires disciplinary action to protect co-workers.
Remember: One person's actions can jeopardize the safety of others in the workplace.
Accident Reporting Policy
Sample
Approved by
Chairman:
Date:
1. Purpose [complies with legislation, ensure the necessary action to prevent any
recurrence and to enable the organization to maintain proper records.
2. Scope [accident, incident, near-miss; employee, volunteer, anyone on site or
involved in organization-sponsored activities]
3. Definitions [of terms]
4. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) • OSHA,
NIOSH?]
5. Absence resulting from an accident [who to report to, Return-to work]
6. Accident Investigation [who investigates, what to do with resulting
recommendations]
7. Forms [Names, where to find them]
8. Reportable Diseases [communicable diseases listed where?]
Accident Investigation Procedures
The senior staff member available at the accident scene or the first member notified
should complete the appropriate investigation reporting form (accident, incident, near
miss). The completed form should be given to the organization's safety committee,
which will forward a copy of the report to the safety coordinator for review.
When an employee or volunteer is injured:
1. Get the person professional medical attention.
2. Protect others.
3. Minimize property damage.
4. Stabilize the situation.
198
5. Conduct an investigation.
General guidelines for investigating accidents:
 Go to the scene of the accident while the facts are fresh.
 Inspect and record any changed physical characteristics or conditions of the
accident site
 Preserve any physical evidence, such as potentially defective equipment.
 Take photos to help preserve the scene (i.e., puddles on the floor, overturned
storage shelves and spilled contents).
 Talk to the injured person, if possible.
 Talk to any eyewitnesses.
 Ask simple open-ended questions, one question at a time, and attempt to have
events related chronologically to ensure thorough coverage.
 Distinguish a person's actual knowledge from hearsay.
 Ask when, where, who, how, and what was said or done.
 Avoid opinions, judgments or conclusions and be as objective as possible. Avoid
commenting on the information gathered except to confirm your understanding or
to clarify.
 Stress getting the facts.
 Do not comment on liability or fault during the investigation. Listen for clues in the
conversation around you.
 Unsolicited comments often have merit.
 Review and finalize any notes immediately upon completion of your inspection
and any interview or other communication with those involved.
 Fill out the appropriate accident, incident or near-miss form, giving an accurate
account of the facts.
 Send the form to the safety coordinator and safety committee for their review.
Accident reports
Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.
Accident reports contain the following details:
 Name of the person injured
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents
199
Task. Accomplish the sample Accident report sample form
Form No: Accident Report Form
Date:
Rm. No:
Name: Yr/Sec:
Type of Injury Cause of Injury Remedy
200
Replacing different Components
Computer Parts Replacement
When replacing computer parts and peripherals, you need to consider the
following factors:
1. Compatibility of the component or part
2. Consider the component specification
3. Components form factor
Compatibility of the Component
When replacing computer parts you should check if it is compatible with your
unit. Double check on your computer manual if the component you are replacing is
compatible or not with the unit because this may lead to system crash.
Component Specification
This focuses on the specification of the component. Check if the voltage
rating, current rating, memory size and frequency matches your computer unit.
Form factor
The components’ manufacturer should be considered. Check if the unit you
are trying to repair or upgrade is generic or branded units. Branded units have their
own set of components compatible only to their units, while genetic types can be
used only to generic type of units.
List of Components Commonly Replaced in a Computer System
Note: Please refer to the Video for Proper Replacement of the components or parts
of the computer.
Memory-is technically any form of electronic
storage; it is used most often to identify fast,
temporary forms of storage. It is commonly
called RAM (Random Access Memory).
Figure25. Memory
201
Video Cards-also referred to as a graphics
accelerator, is an item of personal computer
hardware whose function is to generate and
output images to a display.
Figure26. Video Card
Network Interface Card – is also known as LAN
card. A PC interface to network cabling. It is a
piece of computer hardware designed to allow
computers to communicate over a computer
network
Figure27. LAN Card
Hard disk drive – is a fixed computer storage
medium
Figure27. LAN Card
Motherboard – is also known as the mainboard. It
contains circuits that perform various functions.
Figure28. Motherboard
Processor – is also known as CPU or the Central
Processing unit
Figure28. CPU
202
CMOS Battery-Refers to a small memory on PC motherboards
that is used to store BIOS settings.
Figure29. CMOS Battery
CD/DVD Drive- A DVD is an optical disc storage media
format, invented and developed
by Philips, Sony, Toshiba and Panasonic in 1995
Figure30. CD/DVD
Sound card - is an internal computer expansion card that facilitates
the input and output of audio signals
Figure31. Sound Card
Directions: Write your answer on your notebook
1. Give the functions of each component.
1. Memory
2. Video card
3. NIC
4. Motherboard
5. HDD
2. Factors to consider when replacing a component.
1._____________________
2._____________________
3._____________________
203
Upgrading Your Computer Components
To upgrade means to change some parts with faster and better performing ones.
These parts may even cost less and more powerful.
Commonly Upgraded Computer Parts
1. Monitors- replace old CRT monitors to new LCD or LED monitors.
2. Optical drives- old CD-ROMs drives are commonly replaced with DVD-ROM and
DVD writers.
204
Hard Drives- small capacity hard drives are replaced with faster and high capacity
hard drives.
Keyboards and mouse- keyboards and mouse are commonly replaced with optical
mouse and wireless keyboards.
RAM (Random Access Memory)- upgrading the computer’s memory or RAM
speeds up the performance of the computer
205
Video cards- upgrade computer’s graphics card to improve the computer
performance in terms of graphics and games.
Processors- replacing the processors increase the data processing speed.
Modem- installing a modem enables your computer to connect to the internet.
206
How to Speed up the Computer
1. Defragmenter utility: Automatically analyzes the empty disk space on the hard
disk and defrag all scattered files.
Figure31. Defragmenter Utility
2. Shutdown Unnecessary programs: Close all unwanted programs at the
Windows start up and this will automatically increase the windows loading time
and speed of the computer will also be increased.
3. Increased memory: Increasing the memory in the system will result to
exceptional speed of your computer.
Figure32. Increasing the memory
207
4. Disk Cleanup: You can delete unwanted programs and files from your computer
and this will be helpful in increasing the speed.
Figure33. Disk Cleanup
5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you
will get the space of C drive for reusability.
Figure34. Emptying the recycle bin
Memory Upgrade
To make your computer faster, you can upgrade its memory. Here are the
steps in upgrading your computer’s memory
1. Remove the memory modules from the slot.
Figure34. Removing memory module from the slot
208
2. In Fig 35 the notches we have marked as A are
used for the ejector clip on the DIMM slot.
The notches we have marked as B are used to align
the memory module with the DIMM slot key C as
shown in Figure 36.
In Figure 36 you can see the ejector clips (D), using
your finger, push these into the down position as
shown in Figure 36 this allows the memory to be
inserted.
Figure 35. Notch A
Figure 36. DIMM Slot
3. Now you are ready to install the module,
ensuring the notches line up with the keys gently
but firmly push the memory into the slot until it is
seated fully(see Fig 37 the ejector clips should rise
to the vertical position as shown in Fig 38).
4. Now your memory is installed. Be sure you have
not loosened any cables while working and also
ensure that the memory module is fully seated and
the ejector clips are in the vertical position.
Figure 37. Ejector clips
Figure 38. Ejector clips in vertical
position
Video card Upgrade
Installing the video card
Next, take the video card (hold it by the edges) and line it up with the slot
paying careful attention to the alignment notch. When it is aligned correctly, press
gently but firmly until the card is seated fully and evenly into the slot (see fig 39).
209
Figure39. Video card seated fully and evenly on a slot
When you are happy that the card is firmly in place, insert the fixing screw (fig
40) and check to make sure you have not loosened anything during installation.
Replace the case cover and reconnect the mains power.
Figure40. Inserting fixing screw
When you reboot your machine Windows (or other OS) should find the card
automatically, it may then ask you to insert the disk/CD that came with your video
card, insert the CD and follow the on-screen instructions to install the video card
driver.
Hard Drive Upgrade
The first thing to do (after removing the case covers) is to locate the drive bay
where the hard drive will go (see fig 41 below).
Figure41. Locate the drive bay
210
The next step is to attach the IDE and power cables.
In figure 42 below you can see a standard IDE Cable, note there are three (3)
connections (notice the difference in distance between the connectors). Connection
A plugs into the motherboard and then the slave and master connections are used
for IDE devices such as hard drives, if you are only installing one drive or the new
drive is to be the master then use the master connector, if the drive is to be the slave
then use the slave connector.
The IDE cable will be marked down one side with a red or black strip, this
denotes Pin 1, match this with the Pin 1 indicator on the back of the hard drive.
The power cable you will find in your case is attached to your power supply;
you can see an example below in figure 43.
Figure42. Standard IDE Cable Figure43. Power Cable
211
Basic Network Errors
If your network connection is not configured properly or suffers a technical
failure, you will often see some error message generated and displayed on your
screen. These messages give helpful clues to the nature of the issue. Use this list of
the common network-related error messages to help troubleshoot and fix networking
problems.
Network Problem error Messages
Network problem error message 1
Read the message in the box.
Box running software 14.8 and
above:
No network adapter. (N01)
Please make sure that your network
adapter is securely plugged into a USB
port on the back of the box.
Box running software 14.7 and below:
A network adapter was not
detected. (N01)
Please make sure that your network
adapter is securely plugged into a USB
port on the back of the box.
Possible solution for error message 1
Quick
Steps
1. If you have a TiVo Wireless G or N Adapter: Remove the adapter
from the TiVo box for 15 – 60 seconds and reconnect. Then force a
connection to the TiVo service.
2. Try another USB port (when applicable).
3. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.
212
Network problem error message 2
Read the message in the box.
Box running software 14.8 and above:
Problem with router. (N03)
It might be temporarily out of IP
addresses. Wait a few minutes, and then
try connecting again. If the DHCP server
is part of your home network, try
increasing the number of IP addresses it
can assign.
Box running software 14.7 and below:
The DHCP server was unable to
supply an IP address.(N03)
It might be temporarily out of IP
addresses. Wait a few minutes, and then
try connecting again. If the DHCP server
is part of your home network, try
increasing the number of IP addresses it
can assign.
Possible solution for error message 2
QuickSteps
1. Power cycle your network, then force a connection to the TiVo
service.
2. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if you are
unsure how to do this.
3. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.
Network problem error message 3
Read the message in the box:
Box running software 14.8 and above:
Problem with network settings. (N05)
Change your network settings to use a
different (and unused) IP address.
Box running software 14.7 and below:
The specified IP address (<IP Address>) is
already in use by another device on the
network. (N05)
Change your network settings to use a
different (and unused) IP address.
213
Possible solution for error message 3
Network problem error message 4
Read the message in the box:
Box running software 14.8 and above:
Wireless Network Not Found. (N06)
Box running software 14.7 and below:
Could not connect to the wireless network
(<Network Name>). (N06)
Possible solution for error message 4
QuickSteps
1. Verify your TiVo box has the latest software version to support the
encryption used by your router.
2. Make sure your wireless network is operational and you have
sufficient signal strength where the box is located. See How to
configure network settings on your TiVo box for instructions.
3. Verify you entered the correct the correct name of your network
and/or the correct encryption key or password.
4. Check for possible interference sources nearby, such as
microwave ovens, cordless phones, etc.
5. Power cycle your network devices, then force a connection to the
TiVo service.
6. Move your wireless adapter to improve signal strength.
7. Contact your router manufacturer to determine whether you need
to update your router firmware.
8. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.
QuickSteps 1. If the box is using a static IP address, then it will need to be
changed. See How to configure network settings on your TiVo
box for instructions.
2. Power cycle your network devices, then force a connection to the
TiVo service.
3. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if you are
unsure how to do this.
214
Network problem error message 8
Read the message in the box:
Box running software 14.8 and above:
Adapter not set up. (N08)
Select Change network settings to begin
setting up your network adapter.
Box running software 14.7 and below:
Your network adapter has not been set up
for use with the box. (N08)
Select Change network settings to begin
setting up your network adapter.
Possible solution for error message 8
QuickSteps
1. TiVo Wireless N adapter: Verify that your adapter has been set up
properly. Please see TiVo Wireless N Adapter Setup for instructions.
2. Verify you entered the correct name of your network and/or the
correct encryption key or password.
3. Verify your wireless adapter is compatible with your TiVo box.
4. Try another USB port (when applicable).
5. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.
Common Network Errors and Solutions
Network Errors Possible Solutions
Network problem is
not accessible
Message: "....is not
accessible. You may
not have permission to
use this network
resource. Contact the
administrator of this
server to find out if you
have access
permissions. The
semaphore timeout
period has expired."
1. Make sure no any firewall running.
2. Make sure you have created the same
workgroup, and the same username for logging
on a remote computer.
3. Check user's rights.
4. You may want to enable guest account on
windows.
5. if you are using simple file sharing, you may try
to disable it and re-share the drive manually.
6. If it is mixed OS network, enable NetBIOS over
TCP/IP.
7. Make sure the Computer Browser service is
started if all computers are w2k/xp.
8. Stop Computer Browser service on wwin9x, ME
and NT if this is a mixed OS network.
9. Cache credential by using net
use computernameshare /user:username
command (it is better to have the username
logon shared computer).
10. If you have tried enabling netbios over tcp/ip but
doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
215
12. Still need help, contact
consultant at http://hidev.com/contactus.asp for
the tech support.
Network problem not
available. The server is
not configured for
transactions"
1. Type command "net share" on the shared
computer. If there is not a share named "IPC$" in
the share list, use the command "net share ipc$" to
create it.
An extended error has
occurred" or "Access
Denied" Symptoms:
When mapping a
network drive using net
use or using the net
view command to view
a different computer in
the domain, you may
receive: "An extended
error has occurred" or
"Access Denied" error
messages.
1. This issue may occur if the workstation doesn't
synchronize the time with the server. After verifying
that basic network connectivity exists, you can
force time synchronization on the client computer
manually. To do this, run net time /domain /set
command.
2.
Make sure you have granted enough licenses for
clients accessing.
“Computer name is not
accessible. No
permission to access
the resources"
1. Are you sure the logon user has permission to the
shared folder?
2. Have you tried to logon using the same user name
and password of the accessed computer?
3. The last and risky one, if you enable guest account
in computer, can you access now?
"Multiple connections to
the server or shared
resource are not
allowed"
Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all previous
connections to the
server or shared
resource and try again."
1. Try using net use /d from a command to clear all
your mapped connections before joining the
domain. You can also disconnect the mapped drive
in Windows Explorer by right-click the mapped
drive and select disconnection.
216
"Network path not
found" in a domain
network 1
SYMPTOMS:
When trying to join a
domain by using he
NetBIOS domain name,
you are successful but
not the FQDN and you
may receive one of the
following error
messages:
1) The following error
occurred attempting to
join domain
"example.com": The
network location
cannot be reached.
For information about
network
troubleshooting, see
Windows Help.
2) Network path not
found.
1. This issue may occur if the TCP/IP NetBIOS Helper
Service is not running on the client computer. To
start the TCP/IP NetBIOS Helper Service, go to
MMS>Services, double-click TCP/IP NetBIOS
Helper Service.
"Network path not
found" in a domain
network 2
1. You can find some computer browser errors on the
DNS server. Disable one of two NICs will work.
More resolutions can be found in browser Issue
page.
"Network path not
found" in a workgroup
network - error 53
1. Make sure that File and Printer Sharing is enabled
on the shared computer.
Make sure that shared machine has something
shared.
2. Make sure that you have created the same
workgroup and logon the same username
Make sure that you have enabled NetBIOS over
TCP/IP if this is a mixed OS network.
"Not accessible. You
may not have
permission to use this
network resource"
Symptom: Your peer-
to-peer network, may
receive the following
1. Enable NetBIOS over TCP/IP on one or more
computers in the workgroup. To do that, go to
properties of Local Area Connection>properties
of Internet Protocol
(TCP/IP)>General> Advanced>WINS, check Ena
ble NetBIOS over TCP/IP (If you have a DHCP-
assigned IP address, select Use NetBIOS setting
from the DHCP server ).
217
error when you double-
click My Network
Places/Computers Near
Me: <Workgroup
Name> is not
accessible. You may
not have permission to
use this network
resource.
2. Make sure the Computer Browser service is
started.
"Not enough server
storage is available to
process this command."
error.
SYMPTOMS: When
accessing shares on a
server from a client, you
may receive "Not
enough server storage
is available to process
this command." error.
You may receive this
message and Event ID:
2011 after you install
Norton Antivirus for
Windows.
1. The registry value IRPstackSize may be not
explicitly present. To increase the value of the
parameter, go to the key
HKEY_LOCAL_MACHINESYSTEMCurrentContro
lSetServices LanmanServerParameters. If the
key is not present, choose Add Value in the
Registry Editor. The Value Name should be
IRPStackSize and the Data Type is
REG_DWORD.
2. Remove any unnecessary entries from this value in
the registry,
HKEY_LOCAL_MACHINESystemCurrentControlS
etServicesLanmanServerParametersNullSession
Pipes.
3. Disable Norton antivirus to see if that will fix the
problem.
"No logon server
available"
Symptoms: you can
ping the server by ip
and name but can't
map the shared
drive by using net
use ip or servern
ame. If you try, you
may receive the "No
logon server
available".
This sounds like cache credential issue.
1. Make sure the computers in the same network, the
same workgroup/domain and have created the
same username.
2. Use net use servernamesharename password
/user: username to cache the credential.
Still need help, contact
consultant at http://hide
v.com/contactus.asp for
the tech support.
1. Disable ICF if you don't need it.
2. Open port # (UDP and TCP) from 135 through 139
and/or 445. to do this, go to the properties of the
connection>Advanced>ICF>Settings>Services. For
Microsoft file sharing SMB: add (UDP and TCP)
218
"System error 6118
has occurred. The list
of servers for this
workgroup is not
currently
available." Symptoms:
When using the net
view
computername comm
and, you receive the
following error
message: System error
6118 has occurred. The
list of servers for this
workgroup is not
currently available.
ports from 135 through 139. For direct-hosted SMB
traffic without network basic input/output system
(NetBIOS) uses port (TCP and UDP) 445. Note: the
external and internal port numbers should be
identical.
"The password is
incorrect. Try again"
1. You need to setup every user that needs access to
the shared folder on every computer they have to
connect to. Then give the proper user proper
permission to the shared folder.
2. Logon the same user and password.
3. As always, you can try to enable a guest account
on the accessed machine.
"There are no entries on
the list"
Symptom: when using
net
view remotecomputer
command, you may
receive "There are no
entries on the list". And
you may have a
problem to access the
remote computer.
1. If there are no file or print shares on the computer,
the net view command displays a "There are no
entries in the list" message. So, make sure there
are file or print shares on the computer. Or to use
net share command to check sharing status.
2. Make sure no firewall running because the firewall
may block sharing.
"Unable to access
Computers near Me" or
"Workgroup is not
accessible" errors
1. NetBIOS over TCP/IP. To do that, go to the
properties of TCP/IP>Advanced>WINS. If you are
using a static Internet Protocol (IP) address, click
2. Enable NetBIOS over TCP/IP. If you have a DHCP-
assigned IP address, click Use NetBIOS setting
from the DHCP server.
No Master Browser or too many browsers may
cause this issue. Check Browser issue.
219
"Unable to Browse
Network"
Symptom: When you
attempt to browse your
network by opening
Entire Network in My
Network
Places/Network
Neighborhood, you may
receive the following
error message: Unable
to Browse Network.
1. Have you loaded the NIC or is it working?
2. Have you loaded common protocol, TCP/IP?
3. Does the Computer browser work?
4. Have you enable file and printer sharing in the
accessed computer?
5. Is the workstation service running?
220
Award BIOS / CMOS Setup
This is the BIOS setup for Award BIOS v6.00PG. If you have a different
version of the Award BIOS there would be a lot of similarities. If your BIOS are AMI
or Phoenix then the common BIOS features would have some similarities. Whatever
BIOS you have, this setup guide should give you an idea about how to setup BIOS.
Please note that setting up BIOS incorrectly could cause system malfunction,
therefore it is recommended that you also follow the BIOS guide provided on your
motherboard manual. If you decide to make changes to certain options it is safer to
make a note of what you have changed. Then restart the system to see how it
performs. If the system behaves abnormally or becomes unstable you can revert
back to your previous settings.
Soft menu III
Soft menu III is where you can setup up the CPU without setting jumpers on
the motherboard. You can setup the CPU simply by selecting the speed i.e. Pentium
III 750 from the list. This ensures that the CPU bus, multiplier, voltage etc, is
correctly set for that particular CPU. However you can manually setup each feature if
required. Once you have finished with the setup press ESC to return the previous
menu.
Figure44. BIOS CMOS Setup Utility
221
Standard CMOS Features
Here you can setup the basic BIOS features such as date, time, type of floppy
etc. Use the arrow keys to move around and press enter to select the required
option. You can specify what IDE devices you have such as Hard drive, CD-ROM,
ZIP drive etc. The easiest way to setup the IDE devices is by leaving it set to auto.
This allows the BIOS to detect the devices automatically so you don't have to do it
manually. At the bottom, it also displays the total memory in your system.
Figure45. Standard CMOS Feature
Advanced BIOS Features
As you can see from figure 3, there are numerous advance settings which you
can select if required. For most cases leaving the default setting should be adequate.
As you can see the first boot device is set to floppy. This ensures that the floppy disk
is read first when the system boots, and therefore can boot from windows boot disk.
The second boot device is the Hard disk and third is set to LS120. If you want to boot
from a bootable CD then you can set the third boot device to CD/DVD-ROM.
222
Advanced Chipset Features
Here you can setup the contents of the chipset buffers. It is closely related to
the hardware and is therefore recommended that you leave the default setting unless
you know what you are doing. Having an incorrect setting can make your system
unstable. If you know that your SDRAM can handle CAS 2, then making changes
can speed up the memory timing. If you have 128MB SDRAM then the maximum
amount of memory the AGP card can use is 128MB.
Figure47. Advance Bios Chipset
Figure46. Advance Bios Feature
223
Integrated Peripherals
This menu allows you to change the various I/O devices such as IDE
controllers, serial ports, parallel port, keyboard etc. You can make changes as
necessary.
Figure48. Integrated Peripherals
Power Management Setup
The power management allows you to setup various power saving features,
when the PC is in standby or suspend mode.
Figure49. Power Management setup
224
PnP/PCI Configurations
This menu allows you to configure your PCI slots. You can assign IRQ's for
various PCI slots. It is recommended that you leave the default settings as it can get
a bit complicated messing around with IRQ's
Figure50. Pnp /PCI Configurations
PC Health Status
This menu displays the current CPU temperature, the fan speeds, voltages
etc. You can set the warning temperature which will trigger an alarm if the CPU
exceeds the specified temperature.
Figure51. PC Health Status
225
Load Fail-Safe Defaults
If you made changes to the BIOS and your system becomes unstable as a
result, you can change it back to default. However if you made many changes and
don't know which one is causing the problem, your best bet is to choose the option
"Load Fail Safe Mode Defaults" from the BIOS menu. This uses a minimal
performance setting, but the system would run in a stable way. From the dialog box
Choose "Y" followed by enter to load Fail-Safe Defaults.
Figure52. Load fail-safe defaults
Load Optimized Defaults
Like the Fail-Safe mode above, this option loads the BIOS default settings,
but runs the system at optimal performance. From the dialog box Choose "Y"
followed by enter to load Optimized Defaults.
Figure53. Load optimized
Set Password
To password protect your BIOS you can specify a password. Make sure you
don't forget the password or you cannot access the BIOS. The only way you can
access the BIOS is by resetting it using the reset jumper on the motherboard.
Figure54. Load optimized
226
Save and Exit Setup
To save any changes you made to the BIOS you must choose this option.
From the dialog box choose "Y".
Figure55. Save to CMOS and EXIT
Exit without Saving
If you don't want to save changes made to the BIOS, choose "N" from the
dialog box.
Figure56. Quit Without Saving
227
Task 1. The BIOS settings in the CMOS memory have become corrupted or
damaged
Task: Check the CMOS battery and replace if needed.
Procedure:
1. Power on your desktop pc and wait for the POST
2. Read the Power on self-test report and do the necessary procedure to solve the
problem.
3. Boot up your pc into BIOS setup.
4. Look for incorrect or changing time settings. A noticeable symptom is an invalid
time showing within the operating system. This symptom is confirmed if time sets
after the computer system is restarted. Under these circumstances, the CMOS
battery should be replaced.
Procedure: On how to replace the CMOS Battery.
1. Locate your CMOS battery
2. Obtain battery information
3. Removing the battery
4. Insert the new battery
5. Enter CMOS values
You will be assessed using the following criteria
CRITERIA
Evaluation
Passed Failed
1. Sequence of steps in CMOS diagnosing procedure is
followed.
2. Sequence of steps for replacing CMOS battery is
followed carefully.
3. Safety precaution is observed.
Remarks
228
Practicing TCP/IP Networking Skills
While connected to the Internet or another TCP/IP network, answer these
questions:
1. What is your current IP address?
2. Release and renew your IP address. Now what is your IP address?
3. Are you using dynamic or static IP addressing? How do you know?
4. What is your adapter address for this connection?
5. What is your default gateway IP address?
6. What response do you get when you ping the default gateway?
Task 2. Investigating Verizon FiOS
Verizon (www.verizon.com) is currently offering an alternative to DSL and
cable modem for broadband Internet access. FiOS is a fiber-optic Internet service
that uses fiber-optic cable all the way to your house for both your residential
telephone service and Internet access. Search the Web for answers to these
questions about FiOS:
1. Give a brief description of FiOS and how it is used for Internet access.
2. What downstream and upstream speeds can FiOS support?
3. When using FiOS, does your telephone voice communication share the fiber-optic
cable with Internet data?
4. What does Verizon say about FiOS cabling used for television?
5.Is FiOS available in your area?
229
Hardware Upgrade
Tool, Materials, and Equipment
Tools
Philip Screw Deriver
Anti-static wrist strap
Anti-static mat
Equipment
Network Card
Network Card Upgrade
Given the tools and materials, upgrade your computer by installing a network
card.
You will be assessed using the following criteria
CRITERIA
Evaluation
Passed Failed
1. Safety precautions are observed.
2. Appropriate tools are used in upgrading
3. Necessary improvement and adjustment are done in
terms up upgrading.
Remarks
230
LESSON 4: TEST SYSTEMS AND NETWORKS
Testing Computer System
Is your PC healthy? Don't be too sure. Think back to when you heard a
kerklunk sound coming from the hard drive. Or maybe you remember the last time
your Internet connection was down.
The best way to find out what's wrong is to take a proactive approach: Check
under your PC's hood with the following mostly free diagnostic tools, and see if
anything is amiss--before disaster strikes.
Three Major Components of Computer System:
 Hardware
 Software
 Firmware
Test Your Hardware
Checking your computer hardware and its peripherals
1. Computer Monitor and its peripherals
 Monitor and interface cables
 Video card
 Monitor power cable
Interface cables
231
2. Keyboard and Mouse
 Keyboard connector
 Mouse Connector
3. I/O port and devices
 Connection between the I/O port and the peripheral device
 A faulty cable between the I/O port and the peripheral device
 A faulty peripheral device
 Incorrect settings in the System Setup program
 Incorrect settings in the system's configuration files
 Faulty I/O port logic on the system board
Video cards
Monitor power
cable
Mouse connector
Keyboard connecter
232
4. Power supply
 Power cord
 Fuse
I/O circuit board
Parallell ports
Power supply
Fuse Power plug
233
Testing Your Software
Check the different software installed in the computer.
1. Operating system
 Run live updates for your operating systems to get the latest patches
and protection for your OS.
 Run registry scanners to check the OS registry configuration
2. Application Software
 Check for live updates
234
3. Anti-virus software
 Run anti-virus program
 Check for virus signature updates
 Check for spyware updates
Test Your Firmware
Firmware- is a combination of hardware and software integrated on a chip.
To test the firmware
Check for the correct configuration can accomplish this by configuring the
BIOS in the computer
235
Sample Accomplishment Report Form
Task to be accomplished Status
Hardware component testing Working
properly
Not working
properly
Software testing Status
Working
properly
Not working
properly
236
Error Beep codes
When a PC is first switched on or reset it performs a special diagnostic test
called a POST (Power-On Self Test), to check all components in the PC, the POST
program sends out a signal to each device initializing each device's built-in self test
procedure.
The POST test is a two stage process:
1. First, it will check all the basic components including among other things the
system clock, the processor, RAM, the keyboard
controller and the Video
2. After the video has been tested the BIOS will then
indicate any errors encountered by displaying either a
numeric code or a text message on the screen.
When a device fails the first part of the POST, the BIOS will send a series of
beeps from the PC's speaker (internal) to inform the PC user that there is a problem
these beeps are coded allowing the user to diagnose the troublesome component.
When the POST has been completed successfully, the PC will make a short beep to
let the user know everything is as it should be.
Three (3) major brands of BIOS chip
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS
237
Each type of BIOS chip has it own error code
AMI BIOS ERROR BEEP CODES
Indicator Error message Solution
1 Beep
2 Beeps
3 Beeps
4Beeps
5Beeps
6 Beeps
7 Beeps
8 Beeps
9 Beeps
10 Beeps
Memory refresh failure
Memory parity error
Memory read/write error
Motherboard timer not
functioning
Processor error
Gate A20/keyboard
controller failure
Processor exception
interrupt
Display memory
read/write failure
ROM checksum error
CMOS shutdown
read/write error
Bad cache memory
Check memory
Check memory
Check memory
Replace motherboard
Replace processor
Replace motherboard
Replace processor
Replace video card
Replace BIOS
chip/Motherboard
Replace BIOS
chip/Motherboard
Replace cache memory
238
Phoenix BIOS ERROR BEEP CODES
Phoenix BIOS beep codes are a series of beeps separated by a pause, for
example:
beep --- beep beep --- beep --- beep beep would be 1-2-1-2
Indicator Error message Solution
1-1-4-1
1-2-2-3
1-3-1-1
1-3-1-3
1-3-4-1
1-3-4-3
1-4-1-1
2-1-2-3
Cache error
BIOS ROM Checksum
DRAM test rate
Keyboard controller
test
RAM failure
RAM failure data bits
of low memory bus
RAM failure data bits
of high memory bus
ROM copyright notice
Test for unexpected
interrupt
Check cache memory
Check BIOS ROM
Check DRAM
Check keyboard
controller
Check memory
Check memory
Check memory
Check ROM
239
AWARD BIOS ERROR BEEP CODES
Indicator Error message Solution
One long beep and
two short beeps
Two short beeps
Video error
Non-fatal error
Replace video card
Reset RAM, Check
other components.
Directions: Answer the following questions and place your answers on your
answer sheet.
1. What does the acronym POST stand for?
2. What are the Three Major Brand of BIOS chips
3. Identify the following error codes:
 1-2-2-3
 1-3-4-1
 2-1-2-3
 1-1-4-1
 1-3-1-1
240
Directions:
Test I. Identify the tools presented below and write your answer in separate
paper.
1.
2.
3.
4.
5.
241
Directions:
Test II. List down at list Five (5) common problem and solution. Use a separate
sheet of paper if needed.
Task 1.Understanding Hardware Documentation
Obtain the manual for the motherboard for your PC. (If you cannot find the manual,
trydownloading it from the motherboard manufacturer’s Web site.) Answer these
questions:
1.What processors does the board support?
2.What type of RAM does the board support?
3.What is the maximum RAM the board can hold?
4.If the board has a PCIe slot, what version of PCIe does the board use?
5.What chipset does the board use?
Task 2. Teaching Yourself About Windows Meeting Space
Using the Windows Help and Support window, Search for information on
Windows Meeting Space. Describe the tool. When would you want to use it? What
can you do with Windows Meeting Space? Set up and test the tool with a friend on a
network connection.
242
Task 1. Testing a Computer Unit
Equipment, Tools, and Materials:
Tools
Multi-tester
Screw driver
Equipment
Computer unit
Monitor
Keyboard and mouse
Power cables
Materials
Bond paper
Ruler and Pencil
Hardware Testing and Documentation
Directions: Test the following computer peripherals and equipment with the use of
the tools provider. Document your testing with the use of an accomplishment form.
Assigned Task Condition
Hardware component testing Working
properly
Not working
properly
Computer monitor
Power supply
243
Keyboard
Mouse
You will be assessed using the following criteria
CRITERIA Rating
1. Sequence of steps in testing is followed. 20%
2. Safety precautions are observed. 20%
3. Appropriate tools are used in testing. 30%
4. An accomplishment report is created. 30%
Total
100%
Task 2.Identify Error codes
Equipment, Tools, and Materials:
Tools
Screw drivers
Anti-static wrist strap
Equipment
Computer unit
Memory Error Codes
244
Given the tools and equipment, identify the memory error code by removing the
module in the computer unit
You will be assessed using the following criteria
Evaluation:
CRITERIA Rating
1. Observance of safety precautions. 30%
2. Appropriate tools are used in testing. 30%
3. Identifying the error code. 40%
Total
100%
245
POST ASSESSMENT
Do the Activity on More Security for Remote Desktop
When Enzo travels on company business, he finds it’s a great help to be able
to access his office computer from anywhere on the road using Remote Desktop.
However, he wants to make sure his office computer as well as the entire corporate
network is as safe as possible.
One way you can help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses
port 3389, but if you change this port to a secret port, hackers are less likely to find
the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop uses.
Practice implementing this change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use another
computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to a secret
port. Print a screen shot showing how you made the change. Use the client
computer to create a Remote Desktop session to the host computer using the secret
port. Print a screen shot showing how you made the connection using the secret
port. Verify the session works by transferring files in both directions.
3. What secret port did you use?
246
Instruction:
 Read each of the questions in the left-hand column of the chart.
 Place a check on the column that indicate your answers
I Can YES NO
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to on form with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration in
accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures (SOP)
Configure the identified systems and networks based on
specifications and job requirements
Inspect and test configured computer systems and
networks in conformity with manufacturer's
instructions/manual
Correct/Adjust components or parts of computer systems
and networks in accordance with job requirements
Test computer systems and networks to ensure safe
operation
Perform scheduled/periodic maintenance in accordance
with manufacturer's requirements
Make needed repairs/replacements in accordance with
established procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials in
accordance with company SOP
247
Summative Test
I. Identify what computer error is illustrated on the following situations.
__________1. The LED indicator of your monitor is in steady orange color.
_________ 2. When you open your PC, nothing shows up in your monitor and the
LED indicator of your monitor is flashing in yellow color.
__________3. When you open your PC it will show the processor brand and/or the
motherboard brand but doesn't continue. Usually this error will result to system
restart over and over again.
__________4.This also happens even if you try disconnecting your computer set
from the internet. This is what we called aftershock virus which will continue to run
even if internet is disconnected.
__________5. The computer opens up then boots but when the operating system
loads it doesn't continue and it will take a lifetime if you're going to wait for it to load.
__________6. This happens even if you try installing the hardware. When you
restart your set it will happen again.
__________7. When you try going to safe mode all you will see is a list of files in
Command prompt style.
__________8. Upon loading he operating system, you will hear a loading sound and
then the sound stops, when you try running an audio file, no sound will be heard
__________9.This will happen only in standby mode, when you move your mouse or
type something, your system will automatically restart and the worst part is it will
delete a file at random.
__________10. Just like the mouse problem, when you open a program that will
take the whole screen like for example a game and/or a program applications, when
you close it, it will cause your system to restart.
248
II. Choose the letter of the best answer:
1) These are moderately dangerous types of errors among those that can pop
up on your PC. System errors are caused by malfunctioning hardware
components, corrupted operating system modules, etc.
a. System error C. Stop errors
b. Runtime errors D. Device managers errors
2) These are caused by corrupted or malfunctioning system files or software
executables. Most runtime errors cause the application that caused it to shut
down. However, more serious runtime errors may cause the system to
become unstable or unresponsive, leaving you with no choice but to reach for
the Reset button.
a. System error C. Stop errors
b. Runtime errors D. Device managers errors
3) These are caused by corrupted hardware, especially malfunctioning RAM
modules and bad sectors on hard disks. Stop errors can be difficult to resolve
at times.
a. System error C. Stop errors
b. A Runtime errors D. Device managers errors
4) These are usually caused by corrupted driver files or malfunctioning hardware
components. In case of the former cause, the problem is usually solved
simply by reinstalling or updating the drivers. However, the latter cause can
often be solved only by replacing hardware components.
a. System error C. Stop errors
b. B. Runtime errors D. Device managers errors
5) These are caused by malfunctioning hardware components, and are
characterized by short beep sounds from the tiny internal speaker of your
motherboard. POST code errors occur when you press the power button to
turn on your PC..
a. System error C. Application errors
b. B. Runtime errors D. Post Code errors
6) These can be caused at any point of time. As the name suggests, these are
caused by applications while those are running. These are usually caused by
glitches in the program code itself. These are usually resolved by updating the
program to its latest version.
a. System error C. Application errors
b. Browser status errors D. Post Code errors
7) These are caused by problems faced by browsers when trying to access a
website. These can be caused by misplaced web pages in the server of the
249
website itself, or due to connection problems. For instance, a 404 error would
indicate that the browser is trying to access a webpage that does not exist in
the specified location.
a. System error C. Application errors
b. Browser status errors D. Post Code errors
8) is define as the flow of electron or electric current. It is an invisible form of
energy that can be transform into other form of energy like heat light and
mechanical.
a. electricity C. Proton
b. atom D. Post Code errors
9) the amount of pulling force that makes the electron flow. Also known as
potential difference or EMF(electromotive force).
a. electricity C. Current
b. resistance D. Voltage
10)a type of circuit that has an open path for current to flow. It means that current
cannot flow in open circuit.
a. Open circuit C. Current circuit
b. resistance D. close circuit
III. Match Column A with Column B
Column A Column B
1. Used for installing and removing
screws in the computer unit.
A. Screw drivers
2. Used for picking small parts in the
computer unit.
B. Pliers and tweezers
3. Used for eliminating electrostatic
discharge in the work area.
C. Soldering iron
4. Primarily used for connecting
terminals in the power supply and
circuit board with the use of a
soldering lead.
D. Lens cleaner
5. It is a paste used for heat
dissipation of the processor.
E. Anti-static wrist strap, mat and
spray
6. A device used for cleaning optical
media, such as DVD-ROMS and
CD-writers.
F. Thermal paste
7. A device used to crimp the RJ45
connector to the UTP cable
G. LAN Tester
8. A device used for testing the
network connection
H. Crimping tool
I. Systems Tool Box
250
IV. Arrange the following steps in verifying the correct protocols are installed
on the computer.
_____Within the configuration tab double-click the TCP/IP protocol icon. Note: Do
not click on the PPP or Dial-Up adapter, click on the network card adapter.
_____Select the option to specify an IP address
_____Click Start / Settings / Control Panel
_____Double-click the Network icon
_____In the TCP/IP properties click the IP address tab
_____When specifying these values, the computers on the network must all have the
same Subnet Mask and have a different IP Address. For example, when using the
above values on one computer you would want to use an IP address of 102.55.92.2
on another computer and then specify the same Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an
address could be: IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192
V. List down at list Five (5) common computer problems and solutions.
Common Computer Problems Solutions
1.
2.
3.
4.
5.
251
KEY TO CORRECTIONS
Test I
1. No Video Output
2. No Video Output
3. Doesn't Boot
4. Lots of pop up windows showing on standby mode
5. Never Ending Loading of Operating system
6. Lots of hardware installation windows appear
7. Safe mode doesn't work
8. Sound on/off error
9. Keyboard and mouse system restart
10. Application causes system to restart
Test II
1. A
2. B
3. C
4. D
5. D
6. C
7. B
8. A
9. C
10. A
Test III
1. A
2. B
3. E
4. C
5. F
6. D
7. H
8. G
Test IV
3, 5, 1, 2, 4, 7, 6
Test V
Answers may vary
252
GLOSSARY OF TERMS
Computer System - The complete computer made up of the CPU, memory and
related electronics (main cabinet), all the peripheral devices connected to it and its
operating system. Computer systems fall into two broad divisions: clients and
servers. Client machines fall into three categories from low to high end: laptop,
desktop and workstation. Servers range from small to large: low-end servers,
midrange servers and mainframes.
Configuration - The makeup of a system. To "configure" is to choose options in
order to create a custom system. "Configurability" is a system's ability to be changed
or customized.
Connector - Any plug and socket that links two devices together. Although taken for
granted and rarely in the limelight, connectors are a huge industry, and the quality of
these components is more critical than most people would imagine. When not
designed or constructed properly, they often become the weakest element in an
electronic system.
Display Adapter - A plug-in card in a desktop computer that converts the images
created in the computer to the electronic signals required by the monitor. It
determines the maximum resolution, refresh rate and number of colors that can be
displayed, which the monitor must also be able to support. On many PC
motherboards, the display adapter circuits are built into the chipset, and an AGP or
PCI card is not required.
ESD (Electro Static Discharge)- A small amount of static electricity that can destroy
small parts of your computer.
Expansion Board - A printed circuit board that plugs into an expansion slot and
extends the computer's capability to control a peripheral device. All the boards
(cards) that plug into a computer's bus are expansion boards, such as display
adapters, disk controllers, network adapters and sound cards.
Expansion Bus - An input/output bus typically comprised of a series of slots on the
motherboard. Expansion boards (cards) are plugged into the bus. ISA and PCI are
the common expansion buses in a PC.
Graphical User Interface - A graphics-based user interface that incorporates
movable windows, icons and a mouse. The ability to resize application windows and
change style and size of fonts are the significant advantages of a GUI vs. a
character-based interface. GUIs have become the standard way users interact with a
computer, and the major GUIs are the Windows and Mac interfaces along with Motif
for Unix and the GNOME and KDE interfaces for Linux.
Motherboard - Also called the "system board," it is the main printed circuit board in
an electronic device, which contains sockets that accept additional boards. In a
desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP
slot, memory sockets and controller circuits for the keyboard, mouse, disks and
printer. It may also have built-in controllers for modem, sound, display and network,
253
obviating the need to plug in a card. A laptop motherboard typically has all peripheral
controllers built in.
Operating System - The master control program that runs the computer. The first
program loaded when the computer is turned on, its main part, the "kernel," resides
in memory at all times. The operating system sets the standards for all application
programs that run in the computer. The applications "talk to" the operating system for
all user interface and file management operations. Also called an "executive" or
"supervisor," an operating system performs the following functions.
Peripheral -Any hardware device connected to a computer, such as a monitor,
keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse
Server - A computer system in a network that is shared by multiple users. Servers
come in all sizes from x86-based PCs to IBM mainframes. A server may have a
keyboard, monitor and mouse directly attached, or one keyboard, monitor and
mouse may connect to any number of servers via a KVM switch. Servers may be
also be accessed only through a network connection as well.
Sound Card - Also called a "sound board" or "audio adapter," it is a computer
expansion board that records and plays back sound, providing inputs from a
microphone or other sound source and outputs to speakers or an external amplifier.
The de facto standard for sound card compatibility in PCs is Creative Labs' Sound
Blaster.
User Interface - All graphics based today, the user interface includes the windows,
menus and method of interaction between you and the computer. Prior to the Mac,
Windows and Motif (Unix) interfaces, all interaction was based on commands
entered by the user. Operating systems may support optional interfaces and allow a
new shell, or skin, to be used instead.
Virus - Software used to infect a computer. After the virus code is written, it is buried
within an existing program. Once that program is executed, the virus code is
activated and attaches copies of itself to other programs in the system. Infected
programs copy the virus to other programs.
254
REFERENCES
Books and Articles and Printed Materials:
Barry Press, Marcia Press, PC Upgrade and Repair Bible,
Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256
Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475
Crosspoint Boulevard, Indianapolis, IN 46256
Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop
Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis,
IN 46256
Ronaldo V. Ramilo and Deover M. Pasco , K to 12 Basic Education
Curriculum- Technology and Livelihood Education Learning Module –
Computer Hardware Servicing
Jethro Campos , et.al , Competency – Based Learning Materials for
Strengthening Technical Vocational Education Program
Electronic Resources:
http://www.buzzle.com/articles/computer-memory-types.html
Computer Memory Types
http://www.athropolis.com/popup/c-comp2.htm
Measurements for Memory & Storage
http://www.ustudy.in/ce/hard/u1
Fundamentals of PC repair
http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20-
%20With%20Oral%20Questioning_0.pdf
Occupational Health and Safety Precautions
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp
Puzzles for Activities
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_v
40_Chapter2.pdf
Occupational Safety Precautions
http://www.youtube.com/watch?v=tfKe8PPI2zs&feature=related
Conversion of Decimal N umber to Binary
http://www.youtube.com/watch?v=s7M6_VeDhJE&feature=related
http://www.youtube.com/watch?v=6N7bqBsFL0w-
255
Computer Hardware Basics
http://www.wikihow.com/Install-Computer-Hardware-
How to install Computer Hardware
http://www.directron.com/howtoupsys.html-
How to install Computer components
en.wikipedia.org
http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20
10/ProperToolSelection.pdf Tool Selection
http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html
http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics

More Related Content

PDF
Curriculum Guide ICT Grade 7-10.pdf
NikkiRodriguez7
 
PDF
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
paragatol258
 
PDF
K to 12 PC Hardware Servicing Learning Module
Dr. Joy Kenneth Sala Biasong
 
PDF
TLE 7-8 ICT-CSS Q1_M3 for printing.pdf
XyrevManeclang
 
PDF
K-12 Module in TLE - ICT Grade 10 [All Gradings]
Daniel Manaog
 
PDF
Computer Hardware Servicing Learner's Material Grade 10
Bogs De Castro
 
PDF
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
Bogs De Castro
 
PDF
Curriculum guide ICT 7
Annie Elloren
 
Curriculum Guide ICT Grade 7-10.pdf
NikkiRodriguez7
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
paragatol258
 
K to 12 PC Hardware Servicing Learning Module
Dr. Joy Kenneth Sala Biasong
 
TLE 7-8 ICT-CSS Q1_M3 for printing.pdf
XyrevManeclang
 
K-12 Module in TLE - ICT Grade 10 [All Gradings]
Daniel Manaog
 
Computer Hardware Servicing Learner's Material Grade 10
Bogs De Castro
 
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
Bogs De Castro
 
Curriculum guide ICT 7
Annie Elloren
 

What's hot (20)

PDF
TLE K to12 ICT - CHS learning module
Eulogio "Amang" Rodriguez Institute of Science and Technology
 
PPTX
Prepare and Interpret Technical Drawing.pptx
marygracelynquino1
 
PPTX
Performing mensuration and calculation
Norman Polilin
 
PPTX
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
Je-Jireh Silva
 
PPTX
Cookery - Module 6 -Calculating Cost of Production.pptx
RosalynCanilang1
 
PDF
TLE - Mechanical Drafting (Learning Module)
Markleen Guimbao
 
PDF
Fish Processing Learning Module
Bogs De Castro
 
PPTX
Computer hardware servicing lesson 2:Perform Mensuration And Calculation
A J
 
PDF
K to 12 pc hardware servicing teacher's guide
Tactical Foundation - Research and Extension Program
 
PDF
TLE/ HE Cookery Curriculum Guide
Dr. Joy Kenneth Sala Biasong
 
PPTX
Ekonomiks- grade 9 Aralin 5 produksyon-
Thelma Singson
 
DOCX
K TO 12 T.L.E MODULE GRADE 8
christian gurion
 
PDF
K to 12 Bread and Pastry Learning Module
Dr. Joy Kenneth Sala Biasong
 
PDF
Consumer electronics-servicing-learning-module
Bogs De Castro
 
PPTX
Personal Entrepreneurial Competencies
veevee2127
 
PDF
CARE GIVING Grade 8 Learning Module
Sheryl Maglasang
 
PPTX
Use of hand tools
Ydel Capales
 
DOC
Grade 7 Detailed Lesson Plan 2
Jurix Cabuyao
 
PDF
7_8. TLE Agricultural Crop Production Quarter 1 Module 1_ Farm Tools, Equipme...
JENNYROSEMOJICA
 
PDF
K-12 Module in T.L.E. Grade 8 Second Grading (Handicrafts)
Daniel Manaog
 
Prepare and Interpret Technical Drawing.pptx
marygracelynquino1
 
Performing mensuration and calculation
Norman Polilin
 
ICT: Computer Hardware Services - Lesson 1 use hand tools by Je-Jireh Silva
Je-Jireh Silva
 
Cookery - Module 6 -Calculating Cost of Production.pptx
RosalynCanilang1
 
TLE - Mechanical Drafting (Learning Module)
Markleen Guimbao
 
Fish Processing Learning Module
Bogs De Castro
 
Computer hardware servicing lesson 2:Perform Mensuration And Calculation
A J
 
K to 12 pc hardware servicing teacher's guide
Tactical Foundation - Research and Extension Program
 
TLE/ HE Cookery Curriculum Guide
Dr. Joy Kenneth Sala Biasong
 
Ekonomiks- grade 9 Aralin 5 produksyon-
Thelma Singson
 
K TO 12 T.L.E MODULE GRADE 8
christian gurion
 
K to 12 Bread and Pastry Learning Module
Dr. Joy Kenneth Sala Biasong
 
Consumer electronics-servicing-learning-module
Bogs De Castro
 
Personal Entrepreneurial Competencies
veevee2127
 
CARE GIVING Grade 8 Learning Module
Sheryl Maglasang
 
Use of hand tools
Ydel Capales
 
Grade 7 Detailed Lesson Plan 2
Jurix Cabuyao
 
7_8. TLE Agricultural Crop Production Quarter 1 Module 1_ Farm Tools, Equipme...
JENNYROSEMOJICA
 
K-12 Module in T.L.E. Grade 8 Second Grading (Handicrafts)
Daniel Manaog
 
Ad

Viewers also liked (20)

PPTX
T.L.E. Grade 9 Cookery Lessons
Dayleen Hijosa
 
PDF
LM Cookery G9
Cha Caunan
 
PDF
Learning Module Cookery Grade 10
Universidad De Zamboanga
 
DOC
Computer Hardware Servicing Learning Module v.2.0
Bogs De Castro
 
PPTX
Lesson 1 Personal Entrepreneurial Characteristics
stephie_04
 
PPTX
Types of embroidery machine
Meenakshi Gupta
 
PDF
K to 12 commercial cooking learning module
Noel Tan
 
PDF
K to 12 pc hardware servicing learning module
Tactical Foundation - Research and Extension Program
 
PDF
K to 12 Carpentry Learning Modules
Dr. Joy Kenneth Sala Biasong
 
PPTX
Module 1 - What is Entrepreneurship?
Omar de Silva
 
PPT
Wounds
Sadru mohamed
 
PDF
LM Cookery G10
Cha Caunan
 
PDF
K to 12 caregiving teacher's guide
Tactical Foundation - Research and Extension Program
 
PPT
Wounds
pdhpemag
 
DOC
Chapter 7 sandwiches
Dr. Sunil Kumar
 
PPTX
FUNCTION OF BASIC INGREDIENTS IN BAKING AND PASTRY
Abu Hanifah
 
PPTX
Wound management
Sumer Yadav
 
PPTX
Common Culinary Terms (Sandwiches)
lukehemmings
 
PPT
Sandwiches
ekaterina_1971
 
PDF
K to 12 caregiving learning modules
Noel Tan
 
T.L.E. Grade 9 Cookery Lessons
Dayleen Hijosa
 
LM Cookery G9
Cha Caunan
 
Learning Module Cookery Grade 10
Universidad De Zamboanga
 
Computer Hardware Servicing Learning Module v.2.0
Bogs De Castro
 
Lesson 1 Personal Entrepreneurial Characteristics
stephie_04
 
Types of embroidery machine
Meenakshi Gupta
 
K to 12 commercial cooking learning module
Noel Tan
 
K to 12 pc hardware servicing learning module
Tactical Foundation - Research and Extension Program
 
K to 12 Carpentry Learning Modules
Dr. Joy Kenneth Sala Biasong
 
Module 1 - What is Entrepreneurship?
Omar de Silva
 
LM Cookery G10
Cha Caunan
 
K to 12 caregiving teacher's guide
Tactical Foundation - Research and Extension Program
 
Wounds
pdhpemag
 
Chapter 7 sandwiches
Dr. Sunil Kumar
 
FUNCTION OF BASIC INGREDIENTS IN BAKING AND PASTRY
Abu Hanifah
 
Wound management
Sumer Yadav
 
Common Culinary Terms (Sandwiches)
lukehemmings
 
Sandwiches
ekaterina_1971
 
K to 12 caregiving learning modules
Noel Tan
 
Ad

Similar to K-12 Module in TLE - ICT Grade 9 [All Gradings] (20)

PDF
chslmgrade9-150727122959-lva1-app6892 (1).pdf
MarlRinaEsperanza
 
PDF
Ces nc ii lmg9 p1 109
ghailbebs
 
PDF
module for css
jorindaevangelista
 
PDF
Module 2-pe cs-10-chs
Janneth Centeno
 
PDF
Module_1_Personal_Entrepreneurial_Compet.pdf
jonathanlabajo2
 
PDF
Module_1_Personal_Entrepreneurial_Compet (2).pdf
RonaldCortezano1
 
PDF
pdfcoffee.com_grade-9-lm-tle-q1-q4pdf-pdf-free.pdf
nickjohntejada1
 
PDF
Grade 9 Learning Module in Technology and Livelihood Education - Selected
R Borres
 
PDF
PEC'S.pdf
SemajojIddag
 
PPTX
Personal entrepreneurial competencies (pecs)
EILLEN IVY PORTUGUEZ
 
PDF
1st quarter css week 1
LADYDIANNEMATIBAG
 
PDF
C chs tg-module1-4_dec
John Ray Velasco
 
PPTX
Pecs chs
rotzkie0310
 
PDF
LM Technical Drafting (NCII) K12
DepEd
 
PDF
K-12 Technical Drafting Learning Module
Markleen Guimbao
 
PPTX
Personal Entrepreneurial Competencies .pptx
EDISON GUTIERREZ
 
PPTX
Personal Entrepreneurial Competencies (PECs).pptx
CESARIOBOADO3
 
PDF
Useful Flash cards for literacy purposes
JUNDELYNSATO
 
DOCX
DLL_TLE_sept.-4-8.docx
Joel Manio
 
PPTX
personalentrepreneurialcompetencieICT9.pptx
abanadorgil
 
chslmgrade9-150727122959-lva1-app6892 (1).pdf
MarlRinaEsperanza
 
Ces nc ii lmg9 p1 109
ghailbebs
 
module for css
jorindaevangelista
 
Module 2-pe cs-10-chs
Janneth Centeno
 
Module_1_Personal_Entrepreneurial_Compet.pdf
jonathanlabajo2
 
Module_1_Personal_Entrepreneurial_Compet (2).pdf
RonaldCortezano1
 
pdfcoffee.com_grade-9-lm-tle-q1-q4pdf-pdf-free.pdf
nickjohntejada1
 
Grade 9 Learning Module in Technology and Livelihood Education - Selected
R Borres
 
PEC'S.pdf
SemajojIddag
 
Personal entrepreneurial competencies (pecs)
EILLEN IVY PORTUGUEZ
 
1st quarter css week 1
LADYDIANNEMATIBAG
 
C chs tg-module1-4_dec
John Ray Velasco
 
Pecs chs
rotzkie0310
 
LM Technical Drafting (NCII) K12
DepEd
 
K-12 Technical Drafting Learning Module
Markleen Guimbao
 
Personal Entrepreneurial Competencies .pptx
EDISON GUTIERREZ
 
Personal Entrepreneurial Competencies (PECs).pptx
CESARIOBOADO3
 
Useful Flash cards for literacy purposes
JUNDELYNSATO
 
DLL_TLE_sept.-4-8.docx
Joel Manio
 
personalentrepreneurialcompetencieICT9.pptx
abanadorgil
 

Recently uploaded (20)

PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
PPTX
FSSAI (Food Safety and Standards Authority of India) & FDA (Food and Drug Adm...
Dr. Paindla Jyothirmai
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
Trends in pediatric nursing .pptx
AneetaSharma15
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PDF
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
PREVENTIVE PEDIATRIC. pptx
AneetaSharma15
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
FSSAI (Food Safety and Standards Authority of India) & FDA (Food and Drug Adm...
Dr. Paindla Jyothirmai
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Trends in pediatric nursing .pptx
AneetaSharma15
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PREVENTIVE PEDIATRIC. pptx
AneetaSharma15
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 

K-12 Module in TLE - ICT Grade 9 [All Gradings]

  • 1. Information and Communications Technology Learner’s Material 9 GOVERNMENT PROPERTY NOT FOR SALE ALLOTTED TO District/ School: _________________________________________ Division _________________________________________________ First Year of Use: _________________________________________ Source of Fund (Year included):__________________________ Computer Hardware Servicing
  • 2. ii Department of Education Republic of the Philippines Technology and Livelihood Education – Grade 9 Learner’s Material First Edition, 2013 ISBN: ___________ Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Br. Armin A. Luistro FSC Undersecretary: Dina S. Ocampo, Ph.D. Assistant Secretary: Lorna Dig Dino, Ph.D. Printed in the Philippines by ____________ Department of Education-Instructional Materials Council Secretariat (DepEd-IMCS) Office Address: 2nd Floor Dorm G, Philsports Complex, Meralco Avenue, Pasig City, Philippines 1600 Telefax: (02) 634-1054, 634-1072 E-mail Address: [email protected] Development Team of the Learner’s Material Authors: Owen M. Milambiling, Cesar T. Arriola, Dante B. Bermas, Ronaldo V. Ramilo, Rosalie P. Lujero, Diana Marie B. Dagli, Dr. Virgilio O. Guevarra, and Maria Angelica G. Mates Editors: Dr. Paraluman R. Giron, Ofelia C. Flojo, and Perla H. Cuanzon Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas Illustrator and Layout Artists: Subject Specialist: Owen M. Milambiling Management Team: Dr. Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Mariñas, Dr. Jose D. Tuguinayo, Jr.
  • 3. iii TABLE OF CONTENTS Module 1: PERSONAL ENTREPRENEURIAL COMPETENCIES Explore your Understanding ………………………………………….… 1 Guide Questions …………………………………………………………. 2 Pre-Assessment …………………………………………………………. 2 Self-Assessment ………………………………………………………… 5 Lesson 1 ……………………………………………………………………. 6 Firm Up ……………………………………………………………………. 8 Deepen …………………………………………………………………... 10 Transfer ………………………………………………………………….. 12 Post-Assessment ………………………………………………………. 14 Feedback ……………………………………………………………….. 16 Module 2: ENVIRONMENT AND MARKET Explore your Understanding ………………………………………….. 18 Lesson 1: Needs and Wants of People ……………………………….. 19 Lesson 2: Generating Ideas for Business ……………………………. 20 Lesson 3: Selecting the Right Ideas…………………………………… 22 Lesson 4: Environmental Scanning …………………………………… 23 Firm Up ………………………………………………………………….. 24 Deepen ....……………………………………………………………….. 24 Transfer ………………………………………………………………….. 26 Post-Assessment ………………………………………………………. 27 Feedback ………………………………………………………………… 28 Module 3: INSTALL COMPUTER SYSTEMS AND NETWORKS Introduction ………………………………………………………………… 30 Objectives………………………………………………………………….. 31 Pre- Assessment …………………………………………… 32 Lesson 1: PLAN AND PREPARE FOR INSTALLATION …………….. 33 1.1 Safety Measures: OHS Policies and Procedures……… 33 1.2 Understanding Computer System…………………………… 37 1.3 Computer Systems, Devices and Peripheral ………..……. 42
  • 4. iv 1.4 Network…………………………..……………………………. 57 1.5 Materials, tools, equipment and testing devices………….. 61 Lesson 2: INSTALL EQUIPMENT / DEVICES and SYSTEMS ……….… 65 2. 1 Safety Precautions…………………………..……………… 65 2.2 System Specification..………………………………………. 69 2.3 Installation of Hardware components and other peripherals…… 73 2.4 Installing Operating System …………………………….…… 91 2.5 Windows 7 installation ……………………………………….. 107 2.6 Basic Computer Configuration Set- up …………………….. 119 Lesson 3: CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM ……. 127 3.1. Testing Installed equipment/devices/system………………….. 127 Summative Test ……………………………………………………………….. 134 Post- Test ………………………………………………………………………. 138 Glossary of Terms.…………………………………………………………….. 139 Acronyms ………………………………………………………………………. 141 References …………………………………………………………………….. 143 Module 4: DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEM …. 145 Pre- assessment ………………………………………………………………… 147 Lesson 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEM.. 145 1.1 Safety Precautions ………………………………………… 148 1.2 Types of Computer System Error …..…………………….. 151 1.3 Diagnosing Computer Systems …………………….. 153 Lesson 2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND NETWORKS……………………………………………………………… 158 2.1 Safety Precautions ………………………….………………. 158 2.2 Basic Concepts of Electricity……………………………… 159 2.3 Techniques for Testing Computer System…………………. 165 2.4 Tools for Testing Computer System..………………………. 177 2.5 Troubleshooting Computer System Network ……………... 180 2.6 Computer System and Network Configurations ………….. 186 Lesson 3: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND NETWORKS …………………………………………………………………….. 195 3.1 General Safety Tips and Reminders ……………………… 196 3.2 Replacing Different Components …………………………. 200
  • 5. v 3.3 Upgrading your Computer Components ……………………. 203 3.3 Basic Network Errors ………………………………………….. 211 3.4 Award BOS / CMOS Setup …………………………………… 220 Lesson 4: TEST SYSTEMS AND NETWORKS……………………………………….. 230 4.1 Testing Computer System …………………………………….. 230 4.2 Error Beep Codes ………………………………………………. 236 Post Assessment ………………………………………………………………. 245 Summative Test ………………………………………………………….……. 247 Glossary ……………………………………………………………………….. 252 References …………………………………………………………………….. 254
  • 6. 1 Technology and Livelihood Education Entrepreneurship Module 1: Personal Entrepreneurial Competencies Have you ever thought running your own business? Entrepreneurship has brought great success to some, but it's not a career path for all. Do you think you can handle the stress and hard work that go with running a small business enterprise? The key to succeed in a small business enterprise is your entrepreneurial ability to produce the desired results. Before embarking on your first business, it's worth spending some time evaluating your own preparedness for entrepreneurship. Try to examine your own personality and compare it with the Personal Entrepreneurial Competencies (PECs) of a successful entrepreneur. Ask yourself if you are ready to enter into the world of business. If your answer is yes, take this reminder: “Successful entrepreneurs continuously develop and improve their PECs”. EXPLORE Your Understanding Essential Question - How does one ensure success in a chosen career? Content Standard - The learner demonstrates understanding of Personal Entrepreneurial Competencies (PECs) Performance Standard
  • 7. 2 - The learner prepares an activity plan that addresses his/her development areas based on his/her PECs and improves further his/her areas of strength. Guide Questions: 1. Why is there a need to assess ones personal characteristics, attributes, lifestyles, skills and traits? 2. What are the personal entrepreneurial competencies of a successful entrepreneur? 3. Why is it necessary to compare ones personal characteristics, attributes, lifestyles, skills and traits to the personal entrepreneurial competencies of a successful entrepreneur? 4. How do you relate your PECs to the PECs of a successful entrepreneur? 5. Based on the data that you have gathered from the interview with the successful entrepreneur in your community, how do you develop your PECs? 6. Can you prepare an action plan that addresses your areas of development and strength based on your PECs? 7. How does your action plan help sustain your strong areas and or address your development areas based on your PECs? Hello there! Are you ready to assess yourself to become a successful entrepreneur in the future? As honest as you could, please answer the pre-assessment below. Pre- Assessment A. Matching Type Directions: Column A lists the characteristics of a successful entrepreneur. Draw a line from the items in Column A that connects the correct definition of terms listed in Column B. Column A Column B
  • 8. 3 1. Hardworking 2. Self-confident 3. Profit-Oriented 4. Goal-Oriented 5. Persistent 6. Responds to feedback 7. Willing to listen 8. Committed 9. Reliable and has integrity 10.Risk-taker a. Ability to set realistic targets. b. Interest in money generation. c. To succeed, one must believe in one’s self. d. Working diligently and industriously. e. Being able to listen to the advice of others. f. Obtaining useful feedback and advice from others. g. Being patient and strives to achieve the goal. h. Ability to take measured or calculated risks. i. Being honest, fair and trustworthy. j. A major priority in the entrepreneur’s life. Are you done? This time you will do another set of pre- assessment which could give you a better understanding of what this module is all about. Are you ready? So, let’s begin! B. Multiple Choice. Directions: Read and study the situation that describes the entrepreneurial characteristics or attributes. Answer the question by writing the letter of your choice in your assignment notebook or in the answer sheet provided. Mrs. Gina Magno opens up her own retail business. She knows that her personal entrepreneurial characteristics are insufficient to ensure a successful operationalization of a business that she has in mind. Your answers to the questions below will help in developing her PECs.
  • 9. 4 1. What PECs must she possess if there are customers who complain about the quality of her product? a. Patience b. Hardworking c. Versatile d. All of the above 2. Which of the following is NOT considered as a characteristic of an entrepreneur? a. Copes with failure b. Dependent c. Persistent d. Opportunity seeker 3. If she wants to ensure a profitable business operation, what characteristic will she maintain? a. Commitment b. Goal oriented c. Futuristic d. Opportunity seeker 4. Mrs. Magno follows the advice of a friend to be flexible especially if she intends to open a retail business. What PECs has been demonstrated by Mrs. Magno? a. Self- confidence b. Reliable and has integrity c. Open to feedback d. Persistent 5. She tells Mary, her best friend that she has a strong will and does not give up to find a solution to a business problem. What PECs has been demonstrated by Mrs. Magno? a. Hard work b. Persistence c. Self-confidence d. Risk- taking
  • 10. 5 This time evaluate your own personal entrepreneurial characteristics to determine whether you too, can become an entrepreneur. If you are ready, you may begin! C. Self- Assessment Directions: Below is a list of Personal Entrepreneurial Competencies (PECs) of a successful entrepreneur. Put a check mark on the 2nd column that indicates your strong PECs. The check mark on the 3rd column are those PECs that need to be developed. Personal Entrepreneurial Competencies of an Entrepreneur My Personal Entrepreneurial Competencies Strength Needs to be Developed Hardworking Self-confident Builds for the future Profit-oriented Goal-oriented Persistent Copes with failure Responds to feedback Demonstrates initiative Willing to listen Sets own standards Copes with uncertainty Committed Builds on strengths Reliable and has integrity Risk-taker
  • 11. 6 Did you enjoy examining yourself? You can become a successful entrepreneur someday. Please don’t feel bad when you discover that there are still to be developed. Continue your exploration to find answers to these underdeveloped PECs. Lesson1. Important Entrepreneurial Traits The following are the fundamental characteristics of an entrepreneur: 1. Hard working: If you are determined to run your own business, you must concentrate on your work either as a producer or a seller. The success of your business depends on how much time and effort you will spend on it. 2. Self- Confidence: You must have a strong faith in your ability despite the problems that you will encounter along the way. 3. Future-Oriented: Once a person enters in a line of business, you must understand that you are in a non-stop contract that an entrepreneur should understand. It may take several years to build up a business to a reasonable standard. The goal for most successful business people is to build a secure job and stable income for themselves based on their own ability. 4. Profit-Oriented: When you enter into the world of business, obviously, you are looking for income because you know that this will be your bread and butter not only for you but also for your family. Therefore, you must see to it the business can generate income. Another plan of action is to expand your own business through the use of your generated income. 5. Goal-Oriented: An entrepreneur is forward looking. You have an advanced preparation for your business. You set a long-term goal for the activities that are needed, an extensive preparation for the production process and procedures that you need to go through to acquire, human and non-human resources. Everything in
  • 12. 7 your business will have to be set clearly, organized, and planned depending on the goal you want to achieve. 6. Persistence: Differences in opinion and judgment. Your opponent can be a part of the rejection on what you intend to do for your endeavor. As an entrepreneur, you must be firm, strong-willed, and stick or follow your own belief. 7. Copes with Failure: “Learn from your mistakes”. As an entrepreneur, you must learn how to deal with the frustrations and failures instead, turn these into productive learning experiences. 8. Responds to Feedback or Open to Feedback: You must be concerned to know how well you are doing and keep track of your performance. You must obtain useful feedback and advice from others. 9. Take the Initiative: A successful entrepreneur takes the initiative. You must put yourself in a position where you personally are responsible for the failure or success of your business. 10. Willing to Listen: Take time to listen to the advice, suggestions, and recommendations of fellow entrepreneurs. It will help your business grow. 11.Set your Own Standards: This involves developing and using logical, step-by-step plans to reach the goals, or offering evaluation alternatives, monitoring progress, and switching to successful strategies for the goal you want to achieve. To be a successful entrepreneur you must take into consideration that sales and production depend on your own standards. 12. Copes with Uncertainty: Pursue your vision to be a successful entrepreneur, you should know how to handle unusual events that may happen in the business which include problems in managing the workers, problems on the delivery of goods and services, and the problems on demand and production. You must be patient in dealing with these uncertainties. 13. Committed: You should know that in your business, personal needs, attachment to your friends, families and relatives are set aside. You must separate the money for your business from the amount that you need to spend for personal obligations and lifestyles.
  • 13. 8 14. Builds on Strengths: Successful business people base their work on strengths. Use your manual skills, knowledge in creating products or services, knowledge in trade and industry, ability to make and use of a wide network of contacts to build your business. 15.Reliable and has Integrity: An entrepreneur must build a good reputation, possess the courage to do the right thing, do what you say, walk your talk, be loyal, and be fair in dealing with the subordinates and costumers. 16.Risk-Taker: Risk sometimes cannot be anticipated. When misfortunes happen, consider these as challenges and work them out and set good alternatives. Risks may result to loss of your business or even bankruptcy. FIRM UP your Understanding Activity1: Aligning one’s PECs Directions: Choose from the list below the characteristics and traits that best describe your own personal entrepreneurial characteristics. Find ways on how to align them according to the personal entrepreneurial characteristics of an entrepreneur which were discussed earlier. Write your answers in the activity sheet provided. Creative Resourceful Persistent Organized Independent Confident Risk taker Observant Competent Trustworthy Optimistic Passionate Flexible Sensitive Committed Dynamic Efficient Hardworking Decision-maker Reliable Knowledgeable Persevering Decisive Strong–minded Courteous
  • 14. 9 Example: My PECs Try to design a concept map that indicates your traits, characteristics and skills that you need to possess in order to become a successful entrepreneur. Activity 2. My PECs that need to be further improved Directions: At the center of the street are arrows where positive and negative characteristics and traits are written. Pick out the positive PECs that you are already strong at, and write them down on the blank arrows on the left side. PECs written on the arrows at the right side are the negative characteristics that need to be further improved. My PECs My simple definition Things to do to align with PECs of a successful entrepreneur 1. Creative 2. Organized 3. Competent 4. Observant
  • 15. 10 DEEPEN Your Understanding Lesson 1 Strengthening your Identified PECs Here are your guides on how to strengthen your own PECs. 1. React positively to criticisms and open to feedback. 2. Always demonstrate positive attitude to achieve a desired goal. 3. Always project strong and well-balanced behavior. 4. Always exercise the assertive style in your work environment.
  • 16. 11 5. Avoid being too passive and too aggressive. 6. Don’t let anyone worsen your business life. 7. Prioritize your business goal rather than personal goal in order to become a successful entrepreneur. 8. Acquire specific skills for creating and maintaining a conducive work environment. 9. Be responsible in everything you do in your business. 10. Always observe business ethics in putting up a business. Hello! I’m here once again reminding you whether you have achieved a certain point that you could honestly tell that you are already successful in strengthening your own PECs. Let’ s see! Activity 1: My techniques to strengthen PECs Directions: From the given chart below, write at least six techniques on how you would strengthen your own PECs. Write the PECs that you feel that you still need to focus on to strengthen these. Example: Self-confidence
  • 17. 12 TRANSFER Your Learning Preparation of an Action Plan Culminating Activity Directions: Examine yourself once again. Make a short list of PECs that you need to strengthen. From this activity, prepare of an action plan that requires further development. You may opt to follow the suggested format below. You may improve or change it as long as it suits your own plan of action. Sample Action Plan Self- confidence
  • 18. 13 Specific Purpose Statement: ( Your vision of your future) Ex. Developing self-confidence in retail business. Focus Area Current Situation Goal Measures of Success Actions Required Time Frame Reward/ Recognition My PECs I need to develop my undefined characteris -tics need for my retail business. such as: _________ _________ _________ _________ _________ - To exercise my own PECs during selling and producing products/ services -To become proficient in my chosen skill. Achieve 100% completion of development of my own PECs through selling and production of products, proper manner when dealing with people. -Selling finished products derived from culminating activities in any of chosen career. -Participate in skills competition sponsored by the NGO and GO -During culminating activities -After learning the principles, theories, process and of any chosen career -Earns expected income -Outstanding performance in selling and promoting products and services Post-Assessment
  • 19. 14 Answer the post assessment below to determine whether there is significant increase in your understanding of PECs. The feedback to this post assessment is appended on page 16. Good Luck! A. Matching Type Directions: Column A lists the characteristics of a successful entrepreneur. Draw a line from the items in Column A that connects the correct definition of terms listed in Column B. Column A Column B 1. Hardworking 2. Self-confident 3. Profit-oriented 4. Goal-oriented 5. Persistent 6. Responds or open to feedback 7. Willing to listen 8. Committed 9. Reliable and has integrity 10. Risk-taker a. Ability to set realistic targets. b. Interest in money generation. c. To succeed, one must believe in one’s self. d. Working diligently and industriously. e. Being able to listen to the advice of others. f. Obtaining useful feedback and advice from others. g. Being patient and strives to achieve the goal. h. Ability to take measured or calculated risks. i. Being honest, fair and trustworthy. j. A major priority in the entrepreneur’s life.
  • 20. 15 B. Multiple Choice. Directions: Read and study the situation that describes entrepreneurial characteristics. Then answer the question by writing the letter of your choice in your assignment notebook or in the provided answer sheet. Mrs. Gina Magno opens up her own retail business. She knows that her personal entrepreneurial characteristics are insufficient to ensure a successful operationalization of a business she has in mind. Your answers to the questions below will help in developing her PECs. 1. What PECs must she possess if there are customers who complain about the quality of her product? a. Patience b. Hardworking c. Versatile d. All of the above 2. Which of the following is NOT considered as a characteristic of an entrepreneur? a. Copes with failure b. Dependent c. Persistent d. Opportunity seeker 3. If she wants to ensure a profitable business operation, what characteristic will she maintain? a. Commitment b. Goal oriented c. Futuristic or future-oriented d. Opportunity seeker 4. Mrs. Magno follows the advice of a friend to be flexible especially if she intends to open a retail business. What PECs has been demonstrated by Mrs. Magno? a. Self- confidence b. Reliable and has integrity c. Responsive to feedback d. Persistent
  • 21. 16 5. She tells Mary, her best friend that she has a strong will and does not give up to find a solution to a business problem. What PECs has been demonstrated by Mrs. Magno? a. Hard work b. Persistence c. Self-confidence d. Risk- taking Feedback Pre-assessment/ Post- assessment A. Matching Type 1.d 6. f 2.c 7. e 3.b 8. j 4.a 9. i 5.g 10. h B. Multiple Choice 1. a 2. b 3. d 4. c 5. b
  • 22. 17 Technology and Livelihood Education Entrepreneurship Module 2: Environment and Market One of your greatest dreams in life is to become a successful entrepreneur. As a person, you are capable of developing your character and personality and how to respond to some business challenges and opportunities. You can make things happen by identifying the opportunities around you. You may ask yourself these questions: What do people need? What products and services are available in the market today? Can they be improved? How are they made or delivered? Can things be done better? cheaper? faster? cleaner? Can a product which is used for specific purpose be also used for some other purposes? You slowly find answers to these questions as you decide to do the first step in launching a business enterprise. Be cautious however, that you should develop a habit of identifying opportunities around you. Only then, you will find the activity both exciting and easy.
  • 23. 18 EXPLORE your Understanding Essential Question How does one select an entrepreneurial activity? Content Standard - The learner demonstrates understanding of environment and market that relates with the career choice. Performance Standard - The learner formulates a business idea based on the analysis of the environment and market Guide Questions: 1. How does one determine the product to be produced or services to be offered and delivered to the target market or customers in a particular community? 2. How does one select an entrepreneurial activity? 3. How can one respond effectively to a business enterprise? Hello there! Are you ready to assess yourself if you are ready to generate potential business ideas? Let’s try by answering the succeeding pre-assessment. Pre-assessment 1. The following are examples of peoples’ basic needs, except: a. Recreation b. Clothing c. Shelter d. Food
  • 24. 19 2. Which of the following should be considered first by a prospective entrepreneur in choosing the right location for his/her store? a. Types of merchandise b. Access of the target customers c. The attractiveness of the store layout d. The prevailing prices of goods in the area 3. Thong plans to put a “digi-print” studio in their locality. Which of the following will help him determine a successful plan for setting up of his business? a. Survey of consumer associations b. Checking for similar business to avoid competition c. Getting feedback on the quality of service d. Conduct a SWOT analysis 4. Ceasar studies the population in his immediate community. He is doing this to – a. identify his would be “suki”. b. predict his biggest buyer. c. select his favorite costumers. d. determine whom to sell his product or service. 5. When an entrepreneur improves and alter products to make it more appealing to target consumers, he/she is doing an -------- of the product. a. alteration b. invention c. innovation d. improvisation Lesson 1 Needs and Wants of People Everyone has his or her own needs and wants. However, people have different concepts of needs and wants. Needs in business are important things that every individual cannot do without in a society. These include: 1. Basic commodities for consumption 2. Clothing and other personal belongings, 3. Shelter, sanitation and health
  • 25. 20 4. Education and relaxation Basic needs are essential to every individual so he/she may be able to live with dignity and pride in the community of people. These needs can obviously help you generate business ideas. Wants are desires, luxury and extravagance that signify wealth and an expensive way of living. Wants or desires are considered above all the basic necessities of life. Some examples are the eagerness or the passion of every individual which are non- basic needs like; fashion accessories, shoes, clothes, travelling around the world, eating in an exclusive restaurant; watching movies, concerts, plays, having luxurious cars, wearing expensive jewelry, perfume, living in impressive homes, and others. Needs and wants of people are the basic indicators of the kind of business that you may engage into because it can serve as the measure of your success. Some other good points that you might consider in business undertakings are the kind of people, their needs, wants, lifestyle, culture and tradition, and social orientation that they belong. Lesson 2 Generating Ideas for Business Here are some ways by which you may generate possible ideas for business. 1. Examine the existing goods and services. Are you satisfied with the product? What do other people who use the product say about it? How can it be improved? There are many ways of improving a product from the way it is made to the way it is packed and sold? You can also improve the materials used in crafting the product. In addition, you introduce new ways of using the product, making it more useful and adaptable to the customers’ many needs. When you are improving the product or enhancing it, you are doing an innovation. You can also do an invention by introducing an entirely new product to replace the old one. Business ideas may also be generated by examining what goods and services are sold outside by the community. Very often, these products are sold in a form that can still be enhanced or improved. 2. Examine the present and future needs. Look and listen to what the customers, institution, and communities are missing in terms of goods and
  • 26. 21 services. Sometimes, these needs are already obvious and felt at the moment. Other needs are not that obvious because they can only be felt in the future, in the event of certain developments in the community. For example, a town will have its electrification facility in the next six months. Only by that time will the entrepreneur could think of electrically- powered or generated business such as xerox copier, computer service, digital printing, etc. 3. Examine how the needs are being satisfied. Needs for the products and services are referred to as market demand. To satisfy these needs is to supply the products and services that meet the demands of the market. The term market refers to whoever will use or buy the products or service, and these may be people or institutions such as other businesses, establishments, organizations, or government agencies. There is a very good business opportunity when there is absolutely no supply to a pressing market demand. Businesses or industries in the locality also have needs for goods and services. Their needs for raw materials, maintenance, and other services such as selling and distribution are good sources of ideas for business. 4. Examine the available resources around you. Observe what materials or skills are available in abundance in your area. A business can be started out of available raw materials by selling them in raw form and by processing and manufacturing them into finished products. For example, in a copra-producing town, there will be many coconut husks and shells available as “waste” products. These can be collected and made into coco rags/doormat and charcoal bricks and sold profitably outside the community. A group of people in your neighborhood may have some special skills that can be harnessed for business. For example, women in the Mountain Province possess loom weaving skills that have been passed on from one generation to the next generation. Some communities there set up weaving businesses to produce blankets, as well as decorative items and various souvenir items for sale to tourists and lowland communities. Business ideas can come from your own skills. The work and experience you may have in agricultural arts, industrial arts, home economics, and ICT classes will provide you with business opportunities to acquire the needed skills which will earn for you extra income, should you decide to engage in income-generating
  • 27. 22 activities. With your skills, you may also tinker around with various things in your spare time. Many products were invented this way. 5. Read magazines, news articles, and other publications on new products and techniques or advances in technology. You can pick up new business ideas from Newsweek, Reader’s Digest, Business Magazines, Go Negosyo, KAB materials, Small- industry Journal. The Internet serves as a library where you may browse and surf on possible businesses. It will also guide you on how to put the right product in the right place, at the right price, at the right time. Listing of possible businesses to set up in an area may also be available from banks or local non-government organizations. Lesson 3 Selecting the Right Idea Once you have embarked on identifying the business opportunities, you will eventually see that there are many possibilities that are available for you. It is very unlikely that you will have enough resources to pursue all of them at once. Which one will you choose? You have to select the most promising one from among hundreds and one ideas. It will be good to do this in stages. In the first stage, you screen your ideas to narrow them down to about five choices. In the next stage, trim down the five choices to two options. In the final stage, choose between the two and decide which business idea worth pursuing. In screening your ideas, examine each one in terms of the following factors: 1. How much capital is needed to put up the business? 2. How big is the demand for the product? Do many people need this product and will continue to need it for a long time? 3. How is the demand met? Who are processing the products to meet the need (competition or demand)? How much of the need is now being met (supply)? 4. Do you have the background and experience needed to run this particular business? 5. Will the business be legal, not going against any existing or foreseeable government regulation? 6. Is the business in line with your interest and expertise?
  • 28. 23 Your answers to these questions will be helpful in screening which ones from among your many ideas are worth examining further and worth pursuing. Lesson 4 Environmental Scanning There is a need to conduct environmental scanning to identity the needs and wants of people, the niche for your business mission, and to give attention to trends and issues. This may also serve as an evaluation of the type of the entrepreneurial activity appropriate in the community. Environmental scanning is defined as a process of gathering, analyzing, and dispensing information for tactical or strategic purposes. The environmental scanning process entails obtaining both factual and subjective information on the business environments in which a company is operating. Environment in the community can be viewed according to its technological, political, economic, and social aspects. For example, in the past, people in the community used personal computers but the transmission of development in terms of technology was interrupted because people were not satisfied with what they have today. They still look for the changes in their life and the corresponding in their environment. As a future entrepreneur, you must be well-versed in this kind of advancement and progression of your environment particularly in technology so as to secure the success of your future business. Always think of something new, something novel, authentic, reinvent the existing ones, and create your new version of goods/products, and services. For instance, your own hair straightening is herbal, while in the other salons it is made of synthetic chemicals. This kind of changes being made will effect the existing principles in business and industries that can be easily adapted to the changes in producing the products/services to meet the needs and wants of people in the community.
  • 29. 24 FIRM UP Your Understanding In generating business idea, you should first identify what type of business is suited to yoand the Threats in your environment to ensure that the products/goods and services you are planning to offer will be patronized within the easy reach by your target markets/consumers. Bear in mind these simple rules for successful SWOT analysis.  Be realistic about the strengths and weaknesses of your business when conducting SWOT analysis.  SWOT analysis should distinguish between where your business is today, and where it could be in the future.  SWOT should always be specific. Avoid any grey areas.  Always apply SWOT in relation to your competition i.e. better than or worse than your competition.  Keep your SWOT short and simple. Avoid complexity and over analysis  SWOT is subjective. DEEPEN Your Understanding People keep on searching for new things, new trends, and new issues. For these reasons, an entrepreneur hurriedly responds to these needs and wants of people. As generations come and go, another set of new trends will come or will exist. In order to adapt to the rapid changes in the business environment, the existing industries need to improve their products and services. But how can you generate business ideas with those strong competitors? There are three main sets of decisions that you need to make - what to produce, how to produce, and how to share or sell out the product to the market.
  • 30. 25 Activity 1 Mini survey Directions: Conduct a mini survey in your immediate community. Gather pertinent data on population across age brackets as suggested in the matrix b e l o w . O p p o s i t e each age group, indicate their probable needs and wants. Age Bracket Population Needs Wants Example: 5 and below 35 Toys, coloring books, pajama Wooden toys, glossy coloring books, etc. fashionable pajama 6- 10 years old 11-15 years old 16-20 years old
  • 31. 26 A ctivity 2 Screening business ideas Directions: After filling out the chart above, try to list down all the probable business opportunities which you may wish to venture in. Remember to consider the ideas and suggestions discussed in Lesson 3. Use the suggested matrix below to indicate your choice. Write your answers in your notebook. Example: Selling wooden toys Positive Factors Negative Factors Strengths Opportunities Weaknesses Threats TRANSFER Of Learning Now that, you have all the information, are you ready to test your ability to generate your own business idea? If your answer is yes, start studying the sample vicinity map of a community with a population of two 21-25 years old 26-35 years old 35-45 years old 46-55 years old 56-65 years old 66 and above
  • 32. 27 thousand people. A new housing project will be constructed adjacent to Daang Hari St, close to Old Molino St., its main road. This housing project targets the homeowners who are young couples with two kids. In this activity, you need to answer the questions that may lead to the generation of a probable business. Your answers to these questions will serve as the bases in formulating your own business ideas. 1. Who do you think are your target consumers/markets? 2. Where is the most ideal location to situate your business? 3. Which products or services would appeal to your target consumers/markets? 4. Can you say that you have seized the most feasible business opportunity?
  • 33. 28 Post-assessment 1. The following are examples of peoples’ basic needs, except: a. Recreation b. Clothing c. Shelter d. Food 2. Which of the following should be considered first by a prospective entrepreneur in choosing the right location for his/her store? a. Type of merchandise b. The access of the target customers c. The attractiveness of the store layout d. The prevailing prices of goods in the area 3. Thong plans to put a “digi-print” studio in their locality. Which of the following will help him determine his plan for a success setting up of his business? a. Survey of consumer associations b. Checking for similar business to avoid competition c. Getting feedback on the quality of service d. Conduct a SWOT analysis 4. Ceasar studies the population in his immediate community. He is doing this to – a. identify his would be “suki”. b. predict his biggest buyer. c. select his favorite costumers. d. determine whom to sell his product or service. 5. When an entrepreneur improves and alter products to make it more appealing to target consumers, he/she is doing an -------- of the product. a. alteration b. invention c. innovation d. improvisation
  • 34. 29 Feedback Pre-assessment and Post assessment 1. a 2. b 3. d 4. c 5. b
  • 35. 29 K to 12 Basic Education Curriculum Technology and Livelihood Education Content Standard Performance Standard The learner demonstrates understanding of basic concepts, underlying theories and core competencies in computer systems and networks. The learner independently provides quality and marketable service in computer hardware servicing in terms of computer systems and networks installation and diagnose and trouble shoot computer systems as prescribed in the TESDA Training Regulation. MODULE 3: INSTALL COMPUTER SYSTEMS AND NETWORKS Number of Sessions (Time Allotment): 60 Hours (2 Quarters) Republic of the Philippines DEPARTMENT OF EDUCATION
  • 36. 30 Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under the Information and Communications Technology (ICT) Course. In this module you will have a great deal of understanding of Installing Computer Systems and Networks. At the end of this module you will be able to apply the knowledge and skills on installing computer hardware, operating system, software components and networks. Those skills are essential for you to pass the National Certification II in Computer Hardware Servicing. In this module, topics will be introduced progressively lesson by lesson for easy understanding. After carefully answering the diagnostic assessment, reading all the lessons, answering all the guide questions, masterfully performing all the activities, showing evidences of learning and finally answering the summative test, then you will have a considerable knowledge and skills in installing computer systems and networks essential to be successful in computer hardware servicing as one of the career option in ICT. Reminder! Just follow the instructions given in this module. Now let us start exploring new things in this module.
  • 37. 31 In this module, there will be three (3) major topics that you will encounter: (1) plan and prepare for installation; (2) install hardware and software components and operating systems; and (3) conduct test on the installed computer system. The three major topics contain sub-topics that discuss the details on installing computer systems and networks. This module contains what to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well as what to TRANSFER. The competencies for this module are: LO 1. Plan and prepare for installation  Observe Occupational Health and Safety policies and procedures in planning for installation activity in accordance with requirements  Familiarize with computer hardware, software component and other peripherals in accordance with established procedures on correct operation and safety policies  Consult appropriate/ technical personnel to ensure that work is coordinated with others who are involved in the activity  Obtain materials necessary to complete the work in accordance with established procedures  Check the materials received against job requirements LO 2. Install equipment/devices (hardware, software components and peripherals) and operating systems  Follow OHS procedures in installing devices, systems, networking devices, and peripherals  Comply with the requirements in installing devices,/systems, networking devices, and peripherals  Install computer systems, networking devices and peripherals in accordance with job requirements  Perform installation of devices and variety of operating systems in accordance with customer/client’s requirements  Obtain approval from appropriate personnel before implementing contingency procedures  Respond to unplanned events or conditions in accordance to established procedures  Check the quality of the work undertaken in accordance with the established procedures
  • 38. 32 LO 3. Conduct test on the installed computer system  Follow OHS policies and procedures in conducting tests  Check circuits and systems being isolated using specified testing procedures  Test devices, systems and/or installation to determine its conformity with the requirements  Undertake final inspections on the installed devices, systems to ensure conformity with the requirements  Accomplish technical reports on the tests conducted  Follow procedures in forwarding documentation to appropriate personnel and/or authority on the test conducted In order to master the above listed competencies, you must be knowledgeable of the topics under what to KNOW, perform activities required under what to PROCESS, accomplish additional meaningful tasks under what to REFLECT and UNDERSTAND and finally show some evidences of your learning by transferring what you have learned in a different context under what to TRANSFER. You will be challenged to dig deeper into your prior knowledge and previous experiences about computer hardware servicing. SKILLS TEST Direction: Listed below are some of the most important skills that you must gain in order to render quality service when you enter the real world of Computer Hardware Servicing. Read the skills carefully. Write “YES” if you are familiar with the skill and “NO” if not. Feel free to answer each skill. Write your answers in your notebook. Skills in Computer Hardware Servicing YES NO I can open a computer case. I can connect the mouse. I can connect the keyboard. I can connect the monitor. I can apply occupational health and safety precautions while working. I can remove the system fan. I can detach the power supply from the system unit. I know how to remove the RAM from the motherboard. I can remove the hard drive from the system unit. I can install the power supply. I know how to install the motherboard. I can install the internal drives in a system unit. I know how to attach RAM in the memory socket. I can install CD / DVD drives.
  • 39. 33 I know how to install an operating system I know how to configure a hardware components and its related software I know the procedures in testing the installed computer components The following topics will enable you to be familiar with planning and preparing for installation, install equipment and devices, and conduct test on the installed computer system. All you need to do is to read carefully all the topics and apply the skills you’ve gained through the distinct activities provided in this module. LESSON 1: PLAN AND PREPARE FOR INSTALLATION This lesson is intended to develop your skills in planning and preparing for installation of computer devices and operating system. At the end of this lesson you are expected to:  Observe OHS policies and procedures in planning for installation activity in accordance with requirements  Familiarize with computer peripheral/ devices/systems in accordance with established procedures correct operation and safety  Consult appropriate/ technical personnel to ensure that work is coordinated with others who are involved in the activity  Obtain materials necessary to complete the work in accordance with established procedures  Check the materials received against job requirements OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES Occupational Health and Safety (OHS) Policy – An Information and communication technology (ICT) student should know how to behave when working in the computer laboratory, as well as implement a safe way of accomplishing every task. Safety practices should be learned early and always adheres in working with any electrical and electronic device, including personal computers and its peripherals. This is for your protection as well as to the people working with you,
  • 40. 34 and for the devices that you are using. The basis for this process begins with Occupational Health and Safety Policies. Occupational safety and health (OSH) is a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks. Health and safety procedure is the responsibility of all persons in the computer and technology industries. You must identify the hazards where you are working and decide how dangerous they are. Eliminate the hazard or modify the risk that it presents. Occupational Health and Safety standards Each student has a responsibility to their colleagues and their organization to report and act upon any potential workplace hazard. Students need to be aware of the type of hazards that are possibly present in their work environment. Procedure 1. Identify the hazard 2. Clear the area close to the hazard 3. Partition the hazard off or clearly identify the area to protect other people from harm 4. If the hazard is easily and safely cleared, then do so If not… 5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance 6. Following clearing of the hazard fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards. All hazards must be reported using Accidental Report form. This enables us to track the kinds of hazards we have in our workplace, and take action where necessary to make it safer for all student and clients. Accident reports Forms are used to give specific details with regards to the accidents happened in the laboratory during experiments. Accident reports contain the following details:  Name of the person injured  Date and time of the accident  Type of injury  First aid given  Action taken to prevent further accidents
  • 41. 35 Accident report sample form Form No: Accident Report Form Date: Rm. No: Name: Yr/Sec: Type of Injury Cause of Injury Remedy Hazardous substances If the workplace hazard appears to be dangerous to staff and clients and professional assistance is required: A. Call the supervisor or manager and advise them of the problem and the urgency of the matter. B. Depending on the risk it may be called as an evacuation. C. Follow the evacuation procedure. D. The supervisor or manager will call in the fire brigade or specialized personnel who will deal with the spill. Fire exits All fire exits should be kept clear of from obstacles. All students have a responsibility to make sure that chairs, empty boxes or any other type of obstacle are not placed in or near fire exit doorways. All corridors also need to have equipment stored on one side only to ensure that in the event of an emergency there is a clear exit. Fire Safety Procedure Each work area has a designated fire warden, who in the event of a fire will take charge. They are recognized by the wearing of a red hard hat.
  • 42. 36 If you find the fire  Assess the danger prior to doing anything.  If it is safe to move assist anyone in the vicinity of the fire away from danger.  If it is possible close the door to the fire area.  Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.  Break the glass section of the fire alert call point.  Call to the switch; ensure you know where the fire is, any other details that may be of assistance to the fire brigade. Details could be size of the fire, cause or type of fire, any people hurt or trapped, has anyone tried to put it out.  If safe to do so, attack the fire with the correct extinguisher or fire hose. If the designated fire officer is not present, someone quickly needs to take responsibility and: 1. Locate the source of the fire. 2. Locate any people. 3. Remove all people from the building. 4. Once outside do a head count? 5. Notify the authorities. Personal Safety While Working with PC’s Computer equipment can be dangerous, and you or others can be injured or even killed if you don’t follow proper safety guidelines when working along with PC’s. The following are some precautionary measures to take before working with any computer equipment:  Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked or seriously injured in an electrical accident.  Do not work on components that are plugged into their power source.  Do not remove expansion cards from a computer when it is turned on.  Remove jewelries when working inside any computer related equipment.  Be sure not to mix electronic components and water. Applying OH&S Policies 1. Group yourselves into six members. 2. Conduct a simulation on: “Applying OHS Policies and Procedures”.
  • 43. 37 3. The performance will be rated according to the following: Performance Criteria: 5 - Have shown five OHS policies in different areas 4 - Have shown four OHS policies in different areas 3 - Have shown three OH&S policies in different areas 2 - Have shown two OH&S policies in different areas 1 - Have not shown any OH&S policies UNDERSTANDING COMPUTER A computer is one of the most brilliant inventions of mankind. Thanks to the computer technology, we were able to achieve storage and processing of huge amounts of data; we could rest our brains by employing computer memory capacities for storing information. Due to computers, we have been able to speed up daily work, carry out critical transactions and achieve accuracy and precision in work. Computers of the earlier years were of the size of a large room and were required to consume huge amounts of electric power. However, with the advancing technology, computers have shrunk to the size of a small watch. Depending on the processing power and size of computers, they have been classified under various types. Let us look at the classification of computers. Different Types of Computers Based on the operational principle of computers, they are categorized as analog, digital and hybrid computers. Analog Computers: These are almost extinct today. These are different from a digital computer because an analog computer can perform several mathematical operations simultaneously. It uses continuous variables for mathematical operations and utilizes mechanical or electrical energy.
  • 44. 38 Figure1. Different Types of Computer Digital Computers: They use digital circuits and are designed to operate on two states, namely bits 0 and 1. They are analogous to states ON and OFF. Data on these computers is represented as a series of 0s and 1s. Digital computers are suitable for complex computation and have higher processing speeds. They are programmable. Digital computers are either general purpose computers or special purpose ones. Special purpose computers, as their name suggests, are designed for specific types of data processing while general purpose computers are meant for general use. Hybrid Computers: These computers are a combination of both digital and analog computers. In this type of computers, the digital segments perform process control by conversion of analog signals to digital ones. Classification of Computers The following are the classification of the different types of computers based on their sizes and functionalities: Mainframe Computers: Large organizations use mainframes for highly critical applications such as bulk data processing and ERP. Most of the mainframe computers have the capacities to host multiple operating systems and operate as a number of virtual machines and can substitute for several small servers. Minicomputers: In terms of size and processing capacity, minicomputers lie in between mainframes and microcomputers. Minicomputers are also called mid-range
  • 45. 39 systems or workstations. The term began to be popularly used in the 1960s to refer to relatively smaller third generation computers. Servers: They are computers designed to provide services to client machines in a computer network. They have larger storage capacities and powerful processors. Running on them are programs that serve client requests and allocate resources like memory and time to client machines. Usually they are very large in size, as they have large processors and many hard drives. They are designed to be fail-safe and resistant to crash. Supercomputers: The highly calculation-intensive tasks can be effectively performed by means of supercomputers. Quantum physics, mechanics, weather forecasting, molecular theory are best studied by means of supercomputers. Their ability of parallel processing and their well-designed memory hierarchy give the supercomputers, large transaction processing powers. Figure2. Classification of Computer
  • 46. 40 Microcomputers: A computer with a microprocessor and its central processing unit it is known as a microcomputer. They do not occupy space as much as mainframes do. When supplemented with a keyboard and a mouse, microcomputers can be called personal computers. A monitor, a keyboard and other similar input output devices, computer memory in the form of RAM and a power supply unit come packaged in a microcomputer. These computers can fit on desks or tables and prove to be the best choice for single-user tasks. Personal computers come in different forms such as desktops, laptops and personal digital assistants (refer to Figure 3). Let us look at each of these types of computers. Desktops: A desktop is intended to be used on a single location. The spare parts of a desktop computer are readily available at relatively lower costs. Power consumption is not as critical as that in laptops. Desktops are widely popular for daily use in the workplace and households. Laptops: Similar in operation to desktops, laptop computers are miniaturized and optimized for mobile use. Laptops run on a single battery or an external adapter that charges the computer batteries. Figure3. Types of Personal Computer
  • 47. 41 Netbooks: They fall in the category of laptops, but are inexpensive and relatively smaller in size. They had a smaller feature set and lesser capacities in comparison to regular laptops, at the time they came into the market. Personal Digital Assistants (PDAs): It is a handheld computer and popularly known as a palmtop. It has a touch screen and a memory card for storage of data. PDAs can also be used as portable audio players, web browsers and smart phones. Most of them can access the Internet by means of Bluetooth or Wi-Fi communication. Tablet Computers: Tablets are mobile computers that are very handy to use. They use the touch screen technology. Tablets come with an onscreen keyboard or use a stylus or a digital pen. Apple's iPod redefined the class of tablet computers. Wearable Computers: A record-setting step in the evolution of computers was the creation of wearable computers. These computers can be worn on the body and are often used in the study of behavior modeling and human health. Military and health professionals have incorporated wearable computers into their daily routine, as a part of such studies. When the users' hands and sensory organs are engaged in other activities, wearable computers are of great help in tracking human actions. Wearable computers do not have to be turned on and off and remain in operation without user intervention. Direction: Identify the type of computer being described in the following sentences and write your answer on a separate sheet of paper. 1. These are mobile computers that are very handy to use. 2. They are computers designed to provide services to client machines in a computer network. 3. They are also called mid-range systems or workstations. 4. A computer with a microprocessor and its central processing unit. 5. They fall in the category of laptops, but are inexpensive and relatively smaller in size. 6. A type of computer which is intended be used on a single location. 7. They use digital circuits and are designed to operate on two states, namely bits 0 and 1. 8. Computers that have the capacities to host multiple operating systems and operate as a number of virtual machines and can substitute for several small servers. 9. It is a handheld computer and popularly known as a palmtop. 10.These computers can be worn on the body and are often used in the study of behavior modeling and human health.
  • 48. 42 COMPUTER SYSTEM, DEVICES AND PERIPHERALS As an aspiring computer technician, it is very important to know the system that runs your computer and different devices attached to it. Each device plays an important role, without each other computer system will not work properly. What is an Operating System? The operating system is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different program and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system. Operating systems can be classified as follows: o Multi-user: Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users. Linux Unix Windows 2000 o Multiprocessing : Supports running a program on more than one CPU. Linux Unix Windows 2000 o Multitasking : Allows more than one program to run concurrently. Unix Windows 2000 and Windows multi point o Multithreading : Allows different parts of a single program to run concurrently.
  • 49. 43 Linux Unix Windows 2000 and Windows 7 o Real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time. Operating systems provide a software platform on which other application programs can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux. What are the devices of a computer? The physical, touchable, electronic and mechanical parts of a computer are called the hardware which is composed of different devices attached to the computer. The following list represents a basic set of devices found in most Personal Computers. 1. System Unit- The main part of a microcomputer, sometimes called the chassis. It includes the following parts: Motherboard, Microprocessor, Memory Chips, Buses, Ports, Expansion Slots and Cards. Figure4. Tower Type System Unit
  • 50. 44 2. Motherboard / Mainboard / System Board- The main circuit board of a computer. It contains all the circuits and components that run the computer. Figure5. Modern Motherboard 3. CPU (Central Processing Unit) - The processor is the main “brain” or “heart” of a computer system. It performs all of the instructions and calculations that are needed and manages the flow of information through a computer. Figure6. Examples of CPU (Intel Core 2 Duo and AMD Athlon) 4. Primary storage- (internal storage, main memory or memory) is the computer's working storage space that holds data, instructions for processing and processed data (information) waiting to be sent to secondary storage. Physically, primary storage is a collection of RAM chips.
  • 51. 45 Two (2) Types of Memory a. ROM – (Read Only Memory) ROM is non-volatile, meaning it holds data even when the power is ON or OFF. b. RAM – (Random Access Memory) RAM is volatile, meaning it holds data only when the power is on. When the power is off, RAM's contents are lost. Figure 7.Examples of RAM 5. Expansion Bus - A bus is a data pathway between several hardware components inside or outside a computer. It does not only connect the parts of the CPU to each other, but also links the CPU with other important hardware. Figure 8.Expansion Bus 6. Adapters- Printed-circuit boards (also called interface cards) that enable the computer to use a peripheral device for which it does not have the necessary connections or circuit boards. They are often used to permit upgrading to a new different hardware. Figure 9. Adapter (Network Adapter)
  • 52. 46 7. Power Supply Unit (PSU) - Installed in the back corner of the PC case, next to the motherboard. It converts 120vac (standard house power) into DC voltages that are used by other components in the PC. Figure10. Power supply 8. Hard Disk Drive (HDD) - Also known as hard drive, is a magnetic storage device that is installed inside the computer. The hard drive is used as permanent storage for data. In a Windows computer, the hard drive is usually configured as the C: drive and contains the operating system and applications. Figure 11.Hard Disc 9. Optical Drive- An optical drive is a storage device that uses lasers to read data on the optical media. There are three types of optical drives: Compact Disc (CD), Digital Versatile Disc (DVD) and Blu-ray Disc (BD). Figure12. CD ROM 10. Digital Versatile Disc (DVD) - Designed to optically access data stored on a DVD. A laser moves back and forth near the disk surface and accesses data at a very fast rate. Figure 13.DVD ROM What are the input and output devices of a computer? The devices attached to a personal computer can be classified into two- the input and output devices. Input Device is composed of a device that accepts data and instructions from the user or from another computer system. While, output
  • 53. 47 device is any piece of computer hardware that displays results after the computer has processed the input data that has been entered. Two (2) Types of Input Devices 1. Keyboard Entry – Data is inputted to the computer through a keyboard. Keyboard - The first input device developed for the PC. Data is transferred to the PC over a short cable with a circular 6-pin Mini-din connector that plugs into the back of the motherboard. Figure14. Keyboard 2. Direct Entry – A form of input that does not require data to be keyed by someone sitting at a keyboard. Direct-entry devices create machine-readable data on paper, or magnetic media, or feed it directly into the computer’s CPU. Three Categories of Direct Entry Devices 1. Pointing Devices - An input device used to move the pointer (cursor) on screen.  Mouse - The most common 'pointing device' used in PCs. Every mouse has two buttons and most have one or two scroll wheels. Figure15. Mouse  Touch screen- A display screen that is sensitive to the touch of a finger or stylus. Used in myriad applications, including ATM machines, retail point- of-sale terminals, car navigation and industrial controls. The touch screen became wildly popular for smart phones and tablets. Figure16. Touch Screen Devices
  • 54. 48  Light Pen - A light-sensitive stylus wired to a video terminal used to draw pictures or select menu options. The user brings the pen to the desired point on screen and presses the pen button to make contact. F i Figure17. Light Pen  Digitizer Tablet - A graphics drawing tablet used for sketching new images or tracing old ones. Also called a "graphics tablet," the user contacts the surface of the device with a wired or wireless pen or puck. Often mistakenly called a mouse, the puck is officially the "tablet cursor." Figure18. Digitizer Tablet 2. Scanning Devices- A device that can read text or illustrations printed on paper and translates the information into a form the computer can use. Figure19. Image scanner Figure20. Bar Code Reader
  • 55. 49 3. Voice- Input Devices - Audio input devices also known as speech or voice recognition systems that allow a user to send audio signals to a computer for processing, recording, or carrying out commands. Audio input devices such as microphones allow users to speak to the computer in order to record a voice message or navigate software. Figure 21. Microphones Output Devices 1. Computer Display Monitor- It displays information in visual form, using text and graphics. The portion of the monitor that displays the information is called the screen or video display terminal. Types of Monitor a. CRT Monitors - Cathode Ray Tubes (CRT) were the only type of displays for use with desktop PCs. They are relatively big (14" to 16" deep) and heavy (over 15 lbs). Figure22. Types of Monitor b. LCD Monitors – Liquid Crystal Display (LCD) technology has been used in laptops for some time. It has recently been made commercially available as monitors for desktop PCs.
  • 56. 50 c. LED Monitors (Light Emitting Diode) - A display and lighting technology used in almost every electrical and electronic product on the market, from a tiny on/off light to digital readouts, flashlights, traffic lights and perimeter lighting. 2. LCD Projectors- utilize two sheets of polarizing material with a liquid crystal solution between them. An electric current passed through the liquid causes the crystals to align so that light cannot pass through them. Each crystal, therefore, is like a shutter, either allowing light to pass through or blocking the light. FFigure23. LCD Projector 3. Smart Board - A type of display screen that has a touch sensitive transparent panel covering the screen, which is similar to a touch screen. Figure24. Smart Board 4. Printer - A device that prints text or illustrations on paper. Types of printer a) Ink-Jet or Bubble-Jet Printer - spays ink at a sheet of paper. Ink-jet printers produce high-quality text and graphics. b) Laser Printer - Uses the same technology as copy machines. Laser printers produce very high quality text and graphics. c) LCD and LED Printer- Similar to a laser printer, but uses liquid crystals or light- emitting diodes rather than a laser to produce an image on the drum. d) Line Printer - Contains a chain of characters or pins that print an entire line at one time. Line printers are very fast, but produce low-quality print.
  • 57. 51 Figure 28.Types of Printer (e) Thermal Printer- An inexpensive printer that works by pushing heated pins against heat-sensitive paper. Thermal printers are widely used in calculators and fax machines. 5. Speakers - Used to play sound. They may be built into the system unit or connected with cables. Speakers allow you to listen to music and hear sound effects from your computer. Figure 29.Speaker What is a Storage Device? Aside from the devices attached on a PC, there are also the so called storage devices that perform a special task in computing system. Storage device is any apparatus for recording computer data in a permanent or semi-permanent form.
  • 58. 52 Figure 30.Storage Devices Types of storage devices Floppy diskette- is a random access, removable data storage medium that can be used with personal computers. The term usually refers to the magnetic medium housed in a rigid plastic cartridge measuring 3.5 inches square and about 2millimeters thick. Also called a "3.5-inch diskette," it can store up to 1.44 megabytes (MB) of data. Compact disc (CD) – also called optical disc is a nonmagnetic, polished metal disk used to store digital information. The disc is read by the CD- ROM. Digital Versatile Disc (DVD)- an optical disc technology with a 4.7 gigabyte storage capacity on a single-sided, one-layered disk, which is enough for a 133-minute movie. Jump drive and USB flash drive- is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain. A USB drive can be used in place of a floppy disk, Zip drive disk, or CD. Hard drive- is the main, and usually largest, data storage device in a computer. The operating system, software titles and most other files are stored in the hard disk drive.
  • 59. 53 LS-120- is a drive which supports a special floppy diskette which can store up to 120MB of information as well as being backwards compatible and still supporting the standard 1.44MB floppy diskettes. Zip drive-is a small, portable disk drive used primarily for backing up and archiving personal computer files. Direction: In the puzzle below, look for the 10 hidden computer devices and determine whether it belongs to INPUT, OUTPUT or STORAGE DEVICE. REVEAL THE PARTS OF A COMPUTER SYSTEM C G M M Q F Y L W K C P A H K H G C N H P O R K I R X N A A O A U A K B M P H U Z A M Z W G W P X W A F V R Q V X U M Y Q U I P R Y P T E X V I R D B W A O R B I R T B A R S R U Y L G R D V J B O C U A O N R D C S G S I L N H I Q S M I L X C U H L Q U T Z G D C J F S E E J K O U N H X S P U P D A K O Z X K M T Y U Z S G H L P F H G P I Z T A F D O U U F T R A S L W W T R A O S Q F A R E H B G M O R Y B E A E M J I X K P I I X E C F H T E S A C M E T S Y S D D E V W T I D V I K W M I Q K K I S I O R R E I L D F F N L E I O M E H Y A S K S A I I D G Z K O M Q U N D H M R W O Q U H O V K T M J M W P T H E R M K Z W J U B J B E A P Q Z K Z Z M L H M O U S E C K Y C Y V Y S D Y B Y V X E W P L Q Q Y O V N H E Z H D R N F H T U B U G L S N P F J W N K N J M J G N Y H V J D U G F L U X O M K D A 1. ________________________ ______________________ 2. ________________________ ______________________ 3. ________________________ ______________________ 4. ________________________ ______________________ 5. ________________________ ______________________ 6. ________________________ ______________________ 7. ________________________ ______________________ 8. ________________________ ______________________ 9. ________________________ ______________________ 10.________________________ ______________________
  • 60. 54 Matching Type. Match column A with Column B and write your answer on a separate sheet of paper. What is a Network? To deepen your understanding with regard to the different components / devices of a computer, utilize the Internet and the website www.professormesser.com, view the video regarding parts of the computer. Use the URLs below: 1. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of- motherboard-types/ A. 1. It serves as the brain of computer. 2. Printed-circuit boards (also called interface cards) that enable the computer to use a peripheral device 3. Also called read/write memory 4. a small, portable disk drive used primarily for backing up files 5. The main circuit board of a computer 6. Also called diskette 7. Acts as a pointing device 8. Device that makes sounds, clips and any audio materials be heard. 9. Component that reads and record data in CDs and DVDs. 10.it is a visual device that displays the information B. a. Adapter b. CD- ROM c. CPU d. Floppy disk e. Microphone f. Monitor g. Motherboard h. Mouse i. Optical Drive j. RAM k. ROM l. Speaker m. Zip Drive
  • 61. 55 2. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of- cpu-socket-types/ 3. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of- cpu-socket-types/ 4. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of- display-device-types/ 5. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of- pc-input-devices/
  • 62. 56  After watching the videos, answer the following questions: 1. What are the different types of motherboard shown in the video? 2. What are the different sizes of a motherboard? 3. What are the different types of CPU? 4. Describe the different types of memory cited in the video. 5. What do you think is the most efficient monitor used in our computers nowadays? 6. Give at least 5 input devices featured in the video presentation. Role Playing The class will be divided into 5 groups (depending on the class size), each group will have a minimum of 5 members and maximum of 10. Each member should have a special role pertaining to the devices of a computer and their functions. Each group will be tasked to showcase their talents in front of the class. Each presentation will be rated using the following criteria: PERFORMANCE SCORE CARD CRITERIA PERCENTAGE SCORE Accuracy (Accurate role and function of a device was accurately shown) 30% Presentation (Organization or sequence of the play, appropriate gestures was used) 30% Clarity (Clearly delivered each topic) 30% Team work (cooperation of each member) 10% Performance Rating
  • 63. 57 NETWORK A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. There are three basic types of networks which includes the following:  Local Area Network (LAN)  Wide Area Network (WAN) Local Area Network A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On most LANs, cables are used to connect the network interface cards in each computer. Wide Area Network Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network. Networking Devices Consist of, but are not limited to non-local printers, workstations, servers, webcams, data loggers, instruments, dial-in devices, and, in general anything that requires an Ethernet connection. These devices are supported on a best-effort basis limited by the staffing and equipment level available.
  • 64. 58 Hub is a small, simple, inexpensive device that joins multiple computers together. Many network hubs available today support the Ethernet standard. Other types including USB hubs also exist, but Ethernet is the type traditionally used in home networking. Ethernet switch is a device that gathers the signals from devices that are connected to it, and then regenerates a new copy of each signal. Bridge is a device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments. Routers are small physical devices that join multiple networks together. Network gateway is an internetworking system capable of joining together two networks that use different base protocols. A network gateway can be implemented completely in software, completely in hardware, or as a combination of both. Modem is a contraction of the terms modulator and demodulator. Modems perform a simple function: They translate digital signals from a computer into analog signals that can travel across conventional phone lines. The modem modulates the signal at the sending end and demodulates at the receiving end.
  • 65. 59 Network interface is a device that connects a client computer, server, printer or other component to your network. Most often, a network interface consists of a small electronic circuit board that is inserted into a slot inside a computer or printer. Alternatively, some computers, printers, or other services include network interfaces as part of their main circuit boards (motherboards). Network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. Network firewalls guard an internal computer network (home, school, business intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. Direction: Identify what is being described in the following sentences and write your answer on a separate sheet of paper. 1. It protects a computer network from unauthorized access. 2. Type of network that connect larger geographic areas, such as Florida, the United States, or the world. 3. This is an internetworking system capable of joining together two networks that use different base protocols. 4. It is consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electronic communications. 5. They translate digital signals from a computer into analog signals that can travel across conventional phone lines. 6. It is a device that connects a client computer, server, printer or other component to your network. 7. A device filters data traffic at a network boundary. 8. It is a device that gathers the signals from devices that are connected to it, and then regenerates a new copy of each signal. 9. It is a small, simple, inexpensive device that joins multiple computers together. 10.Type of network that is confined to a relatively small area.
  • 66. 60 Now, that you are done with the introduction of network as well as the networking devices, to enlighten your understanding and knowledge have some more readings about it thru books and other resources. You should consider the following topics for research: 1. Different types of Network Topology 2. Common networking tools After the research, you can also deepen your understanding by watching a video presentation using the URL below: o http://www.professormesser.com/free-a-plus-training/220-801/network- devices/ o http://www.professormesser.com/free-a-plus-training/220-801/network- topologies-3/ After the video presentation here are your tasks: 1. List down all the network devices and their advantages cited in the video. 2. List down the different network topologies and their differences.
  • 67. 61 MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES The following tools and equipment are classified according to their functions and uses. Equipment and Accessories Tools Materials LAN Card UPS Server 24 port-hub Modem Fax machine PC Video camera USBExternalCD writer USB scanner USB printers USB Flash Drive Screwdriver(standard) Screwdriver(Philips) Long nose pliers Mechanical pliers Allen wrench Multitester Crimping tools Soldering iron (30 watts) Wire stripper LAN Tester Anti-static wrist wrap Device drivers/installers Software applications Network OS Software RJ 45 UTP Cat 5 cable Motherboard’s manual and installer Sound device driver installer  LAN Card – is a network interface card. This is a computer circuit board or card that is installed in a computer so that it can be connected to a network.  Server – is a part of a network. It is a special computer that users on the network can access to carry out a particular job.  Port hub /Port – is a connector on the back of a computer or other device. A port is either a serial port or a parallel port.  Modem - (Modulator-Demodulator) The modem is a device that allows a given computer to share data or otherwise a device which let computers exchange information
  • 68. 62  Scanner- it is an input device that read text or illustration printed on paper, translates the information into a form that a computer can use  Flat Screw Driver – is used to drive or fasten negative slotted screws  USB – Universal Serial Bus, a hardware interface for low-speed peripherals such as the keyboard, mouse, joystick, scanner, printer and telephony devices.  Printer - is a piece of hardware that produces a paper copy (also known as ‘hardcopy’) of the information generated by the computer.  RAM – Random Access Memory, is a primary memory. This memory is used inside the computer to hold programs and data while it is running.  BIOS – Basic Input / Output System, chip that controls the most basic functions of the computer and performs a self-test every time you turn it on.  Flash drive– RAM that can retain data without electrical power. It is widely used for BIOS chips and for digital camera and digital music storage  Video Camera - camera using videotape: a camera that records onto videotape  Long nose Pliers – is used for holding, bending and stretching the lead of electronics component or connecting wire.  Soldering Iron – is used to join two or more metal conductors with the support of soldering lead melted around it.  Desoldering Tool – is used to unsolder unwanted parts or component in the circuit with the support of soldering pencil
  • 69. 63  Philips Screw Driver- is used to drive or fasten positive slotted screws  LAN Tester- for RJ11,12,45 & BNC w/ Remote Unit This ergonomic tester is designed to test most network cable wiring. You can either conduct an auto or manual test.  UTP – Unshielded Twisted Pair, is a popular type of cable used in computer networking that consists of two shielded wires twisted around each Using Testing Tools and Equipment A. Direction: Identify the following tools and materials, give their uses. 1. 2. 3. 4.
  • 70. 64 B. Identification. Direction: Identify the appropriate term described in each sentence. Use a separate sheet for your answers. ________1. It is a connector at the black of a computer or other device. ________2. A computer circuit board installed in a computer so that it can be connected to a network. ________3.A device that allows a given computer to share a data. ________4. An input device that read text or illustration printed on paper, translated the information into a form that a computer that can use. ________5.The least expensive and most popular network media. For you to deepen your knowledge and skills and understanding in planning and preparing for installation, you need to determine the location of the devices / systems to be used, obtain materials necessary to complete the work in accordance with established procedures and check the materials received against job requirements . Your task is to have a research, find as well and watch video presentations relating and showing the following: 1. Consult appropriate technical personnel to ensure that work is coordinated with others who are involved in the activity; 2. Proper location / storage of the devices / systems and materials; 3. Correct way of obtaining the necessary materials to complete the work; 4. Fill up job order forms, request form and report sheets; and 5. Appropriate procedures in in checking the materials received. After doing the above tasks, make sure that you have a detailed documentation of it. Write your reflections on your notebooks or other sheet of paper. After reflecting on the task given to you, it’s your chance now to transfer what you have learned from the activity by having a presentation in front of the class. You will be grouped with 5 members during the presentation. Make use of your creativity in presenting each topic to awaken the interest of your classmates.
  • 71. 65 LESSON2. INSTALL EQUIPMENT / DEVICES and SYSTEMS This lesson is designed to give you the proper procedures used in installing devices and operating system of a personal computer, alongside with it is the basic computer configuration set up. At the end of this lesson you should be able to: a) Apply OHS procedures in installing devices, systems, networking devices, and peripherals; b) Comply with the requirements in installing devices,/systems, networking devices, and peripherals; c) Install computer systems, networking devices and peripherals in accordance with job requirements; d) Perform variations in installing devices and systems in accordance with customer/client’s requirements; e) Obtain approval from appropriate personnel before implementing contingency procedures; f) Respond to unplanned events or conditions in accordance to established procedures; and g) Check the quality of the work undertaken in accordance with the established procedures. SAFETY PRECAUTIONS Personal Protective Equipment - It refers to protective clothing, helmets, goggles, or other gear designed to protect the wearer's body or clothing from injury by electrical hazards, heat, chemicals, and infection, for job-related occupational safety and health purposes. PPE can also be used to protect the working environment from pesticide application, pollution or infection from the worker (for example in a microchipfactory). It is important that students and teachers during their laboratory period should be required to use personal protective equipment. Some of these are:
  • 72. 66  Goggles A large spectacles, with shields around the rims, for protecting the eyes from dust, excessive light, wind, etc.  Rubber Sole A special type of shoes used to prevent electrical shock and for waterproofing and insulating purposes.  Apron A garment worn over the front of the body as a protection for one’s cloth.  Face Mask A covering for the face to prevent the inhaling or absorbing dust and other chemicals  Gloves The covering material with a separate sheath for each finger used for hand protection. Anti-Static and Safety Precautions The little shock you experience while you are walking across a carpeted floor or when you touched a door knob, table, counter or even another person is a result of static electricity. Static electricity is the discharge of electricity between two objects with different electrical potential. Humans can't feel a static shock until it is several thousand volts strong, but it takes less than 30 volts to fry a sensitive computer component, such as a stick of RAM or a processor. That's why computer technicians and home computer builders have to guard their computers against the deadly ravages of static electricity, as well as take steps to avoid injury.
  • 73. 67 Safety and Anti-Static Rules  Always use an anti-static wrist strap when working on a computer (except when working on monitors)  Always disconnect a computer from the AC power and from any powered peripherals while you are working on it.  Always grasp a metal part of the computer chassis with your bare hand before you touch anything inside. Do this even if you are wearing an anti-static wristband.  Always handle electronic components by a non-conducting (non-metallic) edge. Don't touch the pins or other connectors.  Never plug an ATX power supply into AC power unless it is connected either to a computer's motherboard or to a dummy test load.  Always use a UL-approved surge protector or an Uninterruptible Power Supply that incorporates surge and spike protection.  Never eat, drink, or smoke while working on a computer. True or False Direction: Write TRUE if the statement is correct and FALSE otherwise. 1. Always disconnect a computer from the AC power and from any powered peripherals while you are working on it. 2. Always grasp a metal part of the computer chassis with your bare hand before you touch anything inside. Do this even if you are wearing an anti-static wristband. 3. Always handle electronic components by a non-conducting (non-metallic) edge. Don't touch the pins or other connectors. 4. Always use a UL-approved surge protector or an Uninterruptible Power Supply that incorporates surge and spike protection. 5. Never use an anti-static wrist strap when working on a computer (except when working on monitors) 6. Everyone is allowed to eat, drink, or smoke while working on a computer. 7. Never plug an ATX power supply into AC power unless it is connected either to a computer's motherboard or to a dummy test load. 8. Static electricity is the discharge of electricity between two objects with different electrical potential. 9. Apron is a garment worn over the front of the body as a protection for one’s cloth. 10. PPE can also be used to protect the working environment from pesticide application, pollution or infection from the worker.
  • 74. 68 Directions: The class will be divided into five (5) groups. Each group has its own respective leader. The group will perform a task regarding familiarizing the personal protective equipment. After the activity they will be graded using the given Performance Score Card below: PERFORMANCE SCORE CARD Performance Criteria Percentage Grade 1. The student clearly identified personal protective equipment. 20% 2. The student utilized actual tools/device in performing the actual procedures. 15% 3. The student applied safety precautions during the task. 25% 4. The task gave students more critical thinking on the personal protective equipment. 30% 5. The student cooperatively performed the task. 10% Performance Rating
  • 75. 69 SYSTEM’S SPECIFICATION Whenever you purchase software or hardware for your computer, you should first make sure your computer supports the system requirements. These are the necessary specifications your computer must have in order to use the software or hardware. For example, a computer game may require your computer to have Windows XP or later, a 2.0 GHz processor, 512 MB of RAM, a 64 MB graphics card, and 500 MB or hard drive space. If your computer does not meet all of these requirements, the game will not run very well or might not run at all. It is just as important to check system requirements for hardware devices. For example, if you buy a printer, it may require either Windows XP or Mac OS X 10.3 or later. It may also require a USB port and 80 MB of available hard drive space. If your computer does not have any USB ports, you will not be able to physically connect the printer. If your machine does not have Windows XP or Mac OS X 10.3 or later, the printer drivers may be incompatible with your operating system. This means your computer will be unable to recognize the printer. Most hardware and software products have the system requirements printed on the side or bottom of the product packaging. When you are shopping for computer software or hardware, it is a good idea to first find out exactly what your system's specifications are and write them down on a piece of paper. The important information to record includes: 1. Operating System (i.e. Windows XP, SP 2 or Mac OS X 10.3.8) 2. Processor Speed (i.e. Pentium 4, 3.2 GHz or Power PC G5, 2.0 GHz) 3. Memory, a.k.a. RAM (i.e. 512 MB) 4. Graphics Card (i.e. ATI Radeon 9800 w/ 256 MB video memory) 5. Hard Disk Space (i.e. 80 GB available) 6. I/O Ports (i.e. USB, Firewire, Serial, Parallel, SCSI, VGA, DVI ports) By recording these specifications from your computer, you will be able to make sure your computer supports the products you are buying. In terms of installation, systems’ specification is a big consideration in order for a computer to run and work properly for the most efficient way it could be. In broad terms, the performance of a computer depends on four factors: the speed and architecture of its processor or "central processing unit" (CPU), how much random access memory (RAM) it has, its graphics system, and its internal hard drive speed and capacity. Also of importance to most users will be the specification of its Internet connection. Most computer users and in particular those working with a lot of photographs, music files or videos should also think about the most suitable storage devices they will need in order to keep and back-up all of their valuable data.
  • 76. 70 Processor speed and architecture The speed of a computer's processor chip (technically known as its "clock speed") in measured in gigahertz (GHz), with the fastest modern processors currently running at up to 4.7GHz. However, for most computing tasks, including web browsing, sending e-mails, word processing and spreadsheet work any processor running at 1GHz or more remains perfectly sufficient. For applications such as video editing, 3D graphics work and (for the majority of "power users") playing computer games, higher processor speeds is highly required. CPU performance is now determined by far more than raw speed alone. Intel made this very clear when it introduced its system of processor numbers. These provide an indication of a processor's "architecture", "cache" and "front side bus (FSB) speed" in addition to its clock speed. The architecture of a processor is the most important factor to determine its performance, and refers to its basic design and complexity. Some processors are simply more sophisticated than others, with Intel (for example) producing "basic" processors called Celerons and Pentiums, as well as more powerful processors under its "Core" processor family. The later include the Core 2, Core i3, Core i5 and Core i7, with the last of these being the most powerful. In addition to clock speed and architecture, a processor's cache and front side bus (FSB) speed also determine a computer's overall power. Cache is a form of very fast memory integrated into the processor chip, and used to store up instructions (work for the processor) so that it has to slow down as little as possible between tasks. Cache is measured in megabytes (MB), with (for example) low-end Celeron processors having as little as 0.25MB of cache (256KB), and high-end Itaniums having up to 24MB. The simple message is, the more cache the better- though high levels of cache still come at a very significant price. Front side bus (FSB) speed is a measure of how fast a microprocessor communicates with the computer's main circuit board (or "motherboard") into which it is physically connected. Again, the higher the measure the better for overall performance, with FSB speeds currently ranging from 533MHz (still perfectly sufficient for the vast majority of applications) up to 1600 MHz. RAM To a large extent, the more RAM a computer has the faster and more effectively it will operate. Computers with little RAM have to keep moving data to and from their hard disks in order to keep running. This tends to make them not just slow in general, but more annoyingly intermittently sluggish.
  • 77. 71 RAM is measured in megabytes (MB) and gigabytes (GB), as detailed on the storage page. Just how much RAM a computer needs depends on the software it is required to run effectively. A computer running Windows XP will usually function quite happily with 1GB of RAM, whereas twice this amount (ie 2GB) is the realistic minimum for computers running Windows 7. Graphics system A computer's graphics system determines how well it can work with visual output. Graphics systems can either be integrated into a computer's motherboard, or plugged into the motherboard as a separate "video card". Graphics systems integrated into the motherboard (also known as "onboard graphics") are now quite powerful, and sufficient for handling the requirements of most software applications aside from games playing, 3D modeling, and some forms of video editing. Any form of modern computer graphics system can now display high- resolution color images on a standard-sized display screen (ie any monitor up to about 19" in size). The more sophisticated graphics cards now determines how well a computer can handle the playback of high definition video, as well as the speed and quality at which 3D scenes can be rendered. Another key feature of separate graphics cards is that most of them now allow more than one display screen to be connected to a computer. Others also permit the recording of video. As a basic rule, unless a computer is going to be used to handle 3D graphics or to undertake a significant volume of video editing or recording, today there is little point in opting for anything other than onboard graphics (not least because separate graphics cards consume quite a lot of electricity and create quite a lot of heat and noise). Adding a new graphics card to a computer with onboard graphics is also a very easy upgrade if required in the future. Hard Drive Speed and Capacity Today 40GB is an absolute minimum hard drive size for a new computer running Windows 7, with a far larger capacity being recommended in any situation where more than office software is going to be installed. Where a computer will frequently be used to edit video, a second internal hard disk dedicated only to video storage is highly recommended for stable operation. Indeed, for professional video editing using a program like Premiere Pro CS5, Adobe now recommend that a PC has at least three internal hard disks (one for the operating system and programs, one for video project files, and one for video media). Two key factors determine the speed of traditional, spinning hard disks. The first is the rotational velocity of the physical disk itself. This can currently be 4200, 5400, 7200, 10000 or 15000 rpm (revolutions per minute). The faster the disk spins,
  • 78. 72 the quicker data can be read from or written to it, hence the faster the disk the better (although faster disks consumer more power, make more noise, and generate more heat). Most desktop hard disks run at either 5400 or 7200 rpm, whilst most laptop hard disks run at 4200 or 5400. The second key factor that determines performance of a traditional, internal hard disk is the interface used to connect it to the computer's motherboard. Three types of interface exist: Serial Advance Technology Attachment (SATA), which is the most modern and now pretty much the norm on new PCs; Integrated Device Electronics (IDE) (also known as UDMA), which is a slower and older form of interface, and finally SCSI, which happens to be the oldest but in it most modern variant is still the fastest disk interface standard. Now, in order for you to better understand the topics under system’s specification, dig deep into your mind and answer the following essential questions: 1. In your point of view, describe system specification? 2. How does it affect the performance of the computer? 3. What is the relevance of understanding system specification in computer hardware servicing? 4. Why do you think that system specification is one of the most important considerations during installation?
  • 79. 73 INSTALLATION OF HARDWARE COMPONENTS AND OTHER PERIPHERALS One of the basic skills that you must acquire in computer hardware servicing is to independently assemble and disassemble a personal computer or simply setting up a PC. After familiarizing with all the tools, devices, peripherals and safety precautions I believe that you are now ready to gain another experience in CHS by going through this lesson. Personal Computer Disassembly Before starting computer disassembly, make sure you have the tools you need and they're all close by and handy and be sure to have a container to keep the screws in so you have them when you want to put things back together. Step1. Unplugging - The first thing you do is to unplug every cable that is plugged in to your computer. That includes the cables such as Power, USB, Mouse, Keyboard, Internet, Ethernet, Modem, AMFM Antenna, Cable TV, etc. Just unplug all the cables for safety purposes. Now that your computer is fully unplugged, move your PC to a clean work space. Step2.Opening the Outer Shell/Case- First, unscrew the four screws at the back of the computer. On most computer cases, there will be large knobs that you can unscrew by hand or by screw driver on the back-right side of the computer. The left side has small screws because on that side you can't access much on the inside. Figure 32. Screw at the back of computer chasis Once the screws are removed, you can remove the side panels. On most computers, they just slide off. Start with the left side panel (the side that once had the knobs), slide it towards the back of the computer. Now you can remove the left panel. Just like the other side, slide it towards the back of the computer.
  • 80. 74 Side Panel Figure 33. Removing the side panel NOTICE: If you are working on a carpet, about every five minutes touch something that is grounded (Sink faucet / pipe, wire coming from the ground part of a wall outlet). This is done so you do not shock your motherboard or other parts. Step3. Removing the System Fan - First, unplug the fan from the motherboard. You can find the plug by following the wire from the fan. It should be labeled "SYS_FAN1". Next, you will have to unscrew the fan from the outside. You should now be able to lift the fan out of the PC. Figure 34. Removing the system fan Step4. Removing the CPU Fan- The CPU fan is located right on top of the CPU heat sink, which is a large piece of metal with fins on the top. The CPU fan plugs into the motherboard in an awkward place, that is hard to access. But just follow the wires and you should easily find it. It is labeled "CPU FAN1". To remove the fan from the heat sink, remove the four screws securing it in place. System Fan
  • 81. 75 Figure 35. Removing the CPU fan Step5. Power Supply - The first thing to do is unplug every wire coming from the power supply. You must disconnect the motherboard (very large connector/plug), CD/DVD drive(s) power, internal hard drive power and portable hard drive slot power. Once everything is unplugged, unscrew the four screws holding the power supply in place, on the back of the computer. Next, push the power supply from the outside, and then lift it out. Figure36. Unscrew the power supply Step6. CD/ DVD Drive(s)-First, unplug the ribbon from the back of the drive. Once that is completed, pull on the tab securing the drive in place, then push it out from the inside. Figure 37. Location of CD / DVD Drive CPU Fan CD / DVD Drive
  • 82. 76 Step7. Hard Drive - First, unplug the connector at the back of the slot, and unplug the other end from the motherboard. Also unplug the SATA cable from the motherboard and the hard drive. The portable hard drive slot is secured the same way the CD/DVD drive is, with a tab. Pull on the tab, then slide the slot out. Figure 38. Unplugging the Hard Drive connector To remove the hard drive from the side of the slot, unscrew the four screws securing it in place. You must be very careful not to drop the hard drive, since it is very delicate! Figure 39. Removing the hard drive from the side of the slot Step8. Memory (RAM) - To remove the RAM, push down on both tabs holding the RAM in place, which are located at both ends of the RAM. Figure 40. Removing the Memory
  • 83. 77 Step9. Motherboard - The motherboard has seven screws holding it to the frame, which are indicated by large white circles around them. Remove them and then lift the motherboard out of the frame. Figure 41. Removing the Motherboard Personal Computer Assembly Now that you have the skills in disassembling a personal computer, Ibelieve that you are ready to take another step of this module which is assembling a personal computer. All you need to do is to follow the step by step procedures provided in this module. Step 1. Prepare your workplace 1. Take Inventory: Before you start, take an inventory of your parts. Do not begin assembling your computer if you don't have everything you need. Begin the step-by-step process once you are ready with everything you need. Figure 42. Take inventory of the Different Computer Parts 2. Make Space, Make Time:
  • 84. 78 Building a PC takes up space - about a dining room table worth. So make sure you have plenty of working room and a few hours to proceed with minimal interruption. Work on a flat, stable table top surface, or bare floor, where you have room to layout all of the items. 3. Prepare Grounding Protection: Use an inexpensive antistatic wrist strap. Make sure you are wearing your antistatic wrist strap correctly (it does you no good at all if you do not wear it!), and you are ready to proceed. Look at Figure 43 for details. Figure 43. Wearing the Anti- static Wrist Strap Correctly 4. Have the Drivers Ready: Assuming you have another internet connected PC, download the latest drivers from the vendors' websites for each component you will be installing. Sometimes drivers are updated between the time the component was manufactured and the time you are installing it. It is always best to have the latest. Copy them to a CD for easy access. Step 2. Prepare the Motherboard 1. Great care should be taken when installing the motherboard. First, take the board out of its packaging and put it on top of the antistatic bag it came in (see Figure 45). Remember, you always want to safeguard your components from potentially hazardous static electricity (wear your strap). Figure 44. Motherboard in an Antistatic Bag 2. Before you secure the motherboard onto the PC case/chassis, inspect it carefully for any visible defects.
  • 85. 79 3. Next, review the motherboard manual, to make sure you are familiar with the motherboard layout and understand which socket is which. Manuals are extremely helpful, usually easy to read, and include illustrations. Below you can find instructions on how to install the processor, the heat sink and the memory modules on the motherboard. You should not place the motherboard in the computer case until you are told to do so. Step 3. Install the CPU 1. Use the unlocking mechanism to open the CPU socket which is usually a lever. 2. Carefully line up the pins and place the chip in its socket; it will fit only when oriented the proper way. An arrow or a missing pin on one corner of the chip will show you how to line things up. 3. Align Triangular CPU and socket key marks as shown in Figure 46. 4. Lower the lever to lock the CPU into place. Figure 45. Install CPU Step 4. Install the CPU Heat Sink 1. Follow the manufacturer's directions to install the heat sink and the fan that will cool the processor. If you bought an OEM CPU and a separate heat sink, you may need to spread a thin layer of the thermal grease that came with the heat sink over the chip to ensure proper transfer of heat (some heat sinks come with this grease already applied). Figure 46. Install CPU Heat Sink
  • 86. 80 3. Attach the clip that holds the heat sink in place keeping in mind that it may require a fair amount of force. Again, follow the instructions that came with the heat sink. They will show you how to fit it correctly. If you are in doubt, you can visit the manufacturer's website for more information. 4. Plug the CPU fan's power connector into the proper connector on the motherboard. Step 5. Install Memory (RAM Modules) In order to install the memory modules, insert them into the proper sockets (Figure 48) and push down firmly but evenly until the clips on both sides of the socket pop into place. If your motherboard supports dual- channel memory, consult the user manual to determine which pairs of RAM sockets you should use. The motherboard and the CPU are the brain and nerve center of your PC, so selecting these components is the most important decision you'll make. Figure 47. Install RAM Memory Step 6. Place the motherboard into the case 1. Some PC cases have a removable motherboard tray. If yours does, remove the screws holding it in place and pull it out of the case (Figure 49). Figure 48. Remove Motherboard Tray 2. Note the pattern of the holes in your motherboard (Figure 50), and screw brass standoffs into the motherboard tray or into the PC case in the correct locations (ALWAYS check the manual and follow their instructions to the letter).
  • 87. 81 Figure 49. Screw Brass Standoffs Into the Motherboard 3. Check the layout of the sockets on the motherboard, and confirm that the ports on your motherboard's back panel match the holes on the case's Input/Output (I/O) shield that is installed in your case. If necessary, remove the old I/O shield by tapping it firmly a few times with the butt-end of a screwdriver, and then replace it with the shield that came with the new motherboard. 4. Carefully position the motherboard on top of the brass standoffs (Figure 51), line up all the holes, and use the screws that accompanied the case to fasten down the motherboard. If you are using a removable tray in your system, slide the tray and motherboard back into the case and then secure the tray. Figure 50. Case’s I /O Shield Figure 51. Mount the Motherboard
  • 88. 82 Step 7. Connect the Power Supply Making the proper connections is crucial to successfully assembling your PC system. Fortunately, manufacturers provide color-coded power cables and unique connector shapes to make the job easy. 1. First, plug the large ATX power connector (Figure 53) from your power supply into the matching port on your motherboard. Look Figure X for details. 2. Locate the smaller, square processor power connector (Figure 54) (you cannot miss it - it is the one sprouting the yellow and black wires) and attach it to the motherboard. Note: your connector is usually located near the processor. As always, refer to your motherboard's manual for the exact locations. 3. Use your motherboard user manual and find the description about front-panel connectors. Figure 53. Large ATX Connector Figure 52. Connect the ATX Power in the Motherboard Figure 53. Square Processor Power Connector
  • 89. 83 NOTE: You are going to be doing work that requires attention to detail and can be quite frustrating if you do not go into it with the right attitude. 4. Attach each of the tiny leads from the power and reset switches (Figure 56), the hard-disk activity lights, the PC speaker, and any front-panel USB and FireWire ports to the corresponding pin on your motherboard. The needle-nose pliers are useful for manipulating small pieces. Figure 54. Connect the different Leads Step 8. Install Graphics / Video Cards 1. Begin by removing the backplane cover from the AGP or PCI Express X16 slot (the metal piece where the monitor connector will emerge) (Figure 55). Figure 55. Remove the backplane cover 2. Install the graphics board in that slot, and then secure the card with a screw (Figure 56).
  • 90. 84 Figure 56. Install the Graphics Board Step 9. Install Internal Drives Now it is time to install your drives. This is an easy process, but it requires attention to detail. 1. Make any necessary changes to jumpers on the drives before mounting them in the case. A two-drive system (one or two SATA (Serial ATA- is a standard hardware interface for connecting hard drives and CD/DVD drives to a computer) hard drives, plus one parallel ATA (Advanced Technology Attachment) optical drive, for example) is easy to set up; the SATA drives are jumper less, and the optical drive can be set as master on its own parallel ATA channel. Many cases have removable drive rails or cages to house drives. 2. Use the included screws to attach your drives to the rails or cage, and slide them into the case. For externally accessible drives such as a DVD recorder, you can save time by installing one drive rail and sliding the drive in for a test fitting to make sure that its front is flush with the case (Figure 57). 3. When the drives are installed, connect power and data cables to each one. Parallel ATA drives use wide, flat data cables that can be installed only in the correct way. Floppy drives use a similar but smaller cable; SATA drives use a thin, 1cm-wide data cable. SATA drives use a new type of power connector that many power supplies don't come with. Fortunately, many motherboards ship with adapters for converting a standard four-pin power connector to a SATA power connector (Figure 57).
  • 91. 85 Figure 57. Attach your devices Figure 58. Connect Power Connector Step 10. Install the Add- in Cards 1. For each add-in card, you must choose a free PCI slot. 1. Remove its backplane cover to allow access from the rear of the case. 3. Carefully position the card above the slot, and press down firmly to seat the card (Figure 59). 4. Secure the card with a screw.
  • 92. 86 Keep in mind: 1. When attaching cables, never force a connection. 2. Plug in the power cable after you have connected all other cables. Figure 59. Add- in Cards Many motherboards have additional sound connectors or ports housed on small add-in boards. Some of these plug into slots on the motherboard; others screw into the back of the case in place of slot covers. Usually the additional ports are not essential to your PC's operation. For example, if you install a sound card, you do not need connectors to the motherboard's built-in sound chip. Check your motherboard manual to determine what each of these boards does. Connecting Peripherals of a Personal Computer When attaching hardware and peripherals of the computer, ensure that they are connected to the correct locations or ports. For example, some mouse and keyboard cables use the same type of PS/2 connector. So, you must know first the different ports that can be found in the back panel of the computer. Steps in Connecting Peripherals of a PC Step 1.Attach the monitor cable to the video port. Step 2.Secure the cable by tightening the screws on the connector. Step 3.Plug the keyboard cable into the PS/2 keyboard port. Step 4.Plug the mouse cable into the PS/2 mouse port. Step 5.Plug the USB cable into a USB port. Step 6.Plug the network cable into the network port. Step 7.Plug the power cable into the power supply.
  • 93. 87 Figure 60. Steps in Connecting Peripherals of a PC After connecting all the cables into their proper places, the picture in the next page should be the appearance of the back panel of your PC. Figure 61. Appearance of the PC’s Back Panel
  • 94. 88 Rearrange the Procedures Direction: Rearrange the following procedures in their proper order. Use numbers to indicate their order of precedence. The first number is done for you. A. Personal Computer Disassembly __7_1. Detaching the Hard Drive ____2. Detaching the power supply ____3. Opening the outer shell / case ____4. Pull Out the Motherboard ____5. Removing the CD / DVD Drives ____6. Removing the CPU fan ____7. Removing the system fan ____8. Unplugging all the cables and wires B. Personal Computer Assembly __7_1. Connect the Power Supply ____2. Install Graphics / Video Cards ____3. Install Internal Drives ____4. Install Memory (RAM Modules) ____5. Install the Add- in Cards ____6. Install the CPU ____7. Install the CPU Heat Sink ____8. Place the motherboard into the case ____9. Prepare the Motherboard ____10. Prepare your workplace
  • 95. 89 Performance Test Direction: Follow and perform the given procedures on Activity A, B and C. Safety precautions must be observed when working. You will be rated in accordance with the rubrics provided after the activity: A. PC Disassembly B. Personal Computer Assembly Unplug all the cables and wires Open the outer shell / case Remove the system fan Remove the CPU Fan Remove the power supply Remove CD/ DVD Drives Remove Memory Module Remove the Motherboard Prepare your workplace Prepare the Motherboard Install the CPU Install the CPU Heat Sink Install Memory (RAM Modules) Place the motherboard into the case Connect the Power Supply Install Graphics / Video Cards Install Internal Drives Install the Add- in Cards
  • 96. 90 C. Connecting PC Peripherals Rubrics for your performance Test Criteria Percentage Grade Accuracy 50 % Adherence to the procedures 20% Workmanship(applied safety precautions) 20% Speed 10% Performance Rating 1 •Attach the monitor cable to the video port. 2 •Secure the cable by tightening the screws on the connector 3 •Plug the keyboard cable into the PS/2 keyboard port 4 •Plug the mouse cable into the PS/2 mouse port. 5 •Plug the USB cable into a USB port. 6 •Plug the network cable into the network port. 7 •Plug the power cable into the power supply.
  • 97. 91 INSTALLING OPERATINFG SYSTEM Before the installation process undertake, a technician must be aware of the minimum requirements of a computer hardware that is compatible with the operating system to be installed. Following the systems’ requirements means an efficient computer system. The list below shows the windows XP minimum requirements for installation:  Pentium 233 Mhz or compatible processor or faster; 300MHZ or faster recommended  64MB of RAM minimum; 128MB or more recommended  4.3GB hard hard disk space or more  CD-ROM or DVD-ROM  Super VGA (800X600) or higher-resolution monitor  Keyboard and mouse Windows XP Installation 1. Insert the Windows XP CD-ROM and reboot the computer  If you see a message about press any key to boot the CD, do so now. Otherwise, you will see a message about Setup inspecting your system. Figure 62. Boot from CD
  • 98. 92 2. MS-DOS portion of Setup begins  In the first stage of setup; you will see a series of blue and gray MS-DOS- based screens.  In the first step, you will be asked to press F6 if you need to install any third- party or RAID drivers. Figure 63. Windows Set-up 3. Welcome to Setup  Finally, Setup begins. In this step, you can set up XP, launch the Recovery Console (another, more complicated system recovery tool), or quit.  Press ENTER to continue Setup, and it will examine your hard drives and removable disks. Figure 64. Welcome to Set-up
  • 99. 93 4. Read the license agreement  Next, you'll have to agree to Microsoft's complex licensing agreement. Among the highlights: You don't actually own Windows XP and you can only install it on one PC.  Hit F8 to continue. Figure 65. License and Agreement 5. Choose an installation partition  This crucial step lets you choose where to install XP.  On a clean install, you will typically install to the C: drive, but you might have other ideas, especially if you plan to dual-boot with 9x.  Setup will show you all of your available disks (in this case, just one) and let you create and delete partitions as needed. So, for example, if you have one disk, but would like to create two partitions, one for XP and one for your data, you can do that here. Figure 66. Choose an Installation Partition
  • 100. 94 6. Select the file system  If you created a new partition, or wish to change the file system of an existing partition, you can do so in the next step. NTFS (New Technology File System) file system is more secured than FAT (File Allocation System).  Regardless of which file system you choose, be sure to select one of the "quick" format options (the top two choices), if you do need to format, since these will work much more quickly than a full format. Figure 67. Select the File System 7. Optionally format the partition  If you did choose to change or format the file system, this will occur next. First, you'll be asked to verify the format. If you're installing XP on a system with more than one partition, especially one that still holds your data on one of the partitions, be sure you're formatting the correct partition.  Hit F to continue, and a yellow progress bar will indicate the status of the format. When this is complete, Setup will again examine your disks, and create a list of files to copy. Figure 68. Optionally Format the Partition
  • 101. 95 8. Setup folder copy phase and reboot  Setup will now copy system files to the system/boot partition(s) you just created. This will allow the PC to boot from the C: drive and continue Setup in GUI mode.  When the file copy is complete, Setup will initialize and save your XP configuration.  It will then reboot your PC.When the system reboots, you will probably see the "Press any key to boot from CD" message again. If this happens, do not press a key: Setup will now boot from your C: drive. In the event that you cannot prevent the CD-based Setup from reloading, eject the CD and reboot. Setup will ask for the CD when needed. Figure 69. Setup Folder Copy Phase 9. GUI Setup begins  Once the system reboots, you will be presented with the GUI Setup phase, which is much more attractive than the DOS-mode phase. As you progress through GUI Setup, you can read promotional information on the right side of the screen about XP.  Next, your hardware devices are detected. This could take several minutes. Figure 70. GUI Setup
  • 102. 96 10. Regional and language Options  In the first interactive portion of GUI Setup, you can choose to customize the regional and language settings that will be used by XP, as well as the text input language you'd like. Users in the United States will not normally need to change anything here.  Click Next to continue. Figure 71. Regional and Language Options 11. Personalize your software  Now, enter your name and your company. The name you enter is not the same as your user name, incidentally, so you should enter your real name here (i.e. Rosalie Lujero or whatever).  Click Next to continue. Figure 72. Software Personalization
  • 103. 97 12. Enter your product key  Now you must enter the 25-character product key that is located on the orange sticker found on the back of the CD holder that came with Windows XP. You cannot install XP without a valid product key. Later on, you will be asked to activate and optionally register your copy of Windows XP. A product key can be used to install XP on only one PC.  Click Next to continue. Figure 73. Enter Product Key 13. Enter a computer name and administrator password  In the next phase of Setup, you can create a name for your computer (which is used to identify it on a network) and, optionally in Pro Edition only, a password for the system Administrator, the person who controls the PC (this will generally be you, of course). Figure 74. Enter Computer Name and Administrator Password
  • 104. 98 14. Supply your date and time settings  Next, you can supply the date and time, which are auto-set based on information in your BIOS, and the time zone, which is irritatingly set to PST, which is where Microsoft is. Change these as appropriate.  Click Next to continue. Figure 75. Enter Date and Time Settings 15. Network setup  If you have a networking card or modem, Setup now install the networking components, which include the client for Microsoft networks, File and Print Sharing, the Quality of Service (QoS) Packet Scheduler, and the TCP/IP networking protocol by default. Figure 76. Network Set-Up
  • 105. 99 16a. Choose networking settings  In this phase, you can choose to keep the default settings (recommended) or enter custom settings.  Click Next to continue. Figure 77. Choose Networking Settings Windows XP Professional only: 16b. Enter workgroup or domain information  In Windows XP Professional only, you will be able to select a workgroup or domain name next. Home Edition doesn't work with Windows domains, however, and Setup will automatically supply the workgroup name MSHOME, which you can change later. The default workgroup name in XP Pro is, imaginatively, WORKGROUP.  Click Next to continue. Figure 78. Enter Workgroup or Domain Information Note that XP doesn't include the legacy NetBEUI protocol out of the box. If you want to use this protocol, you will need to install it later from the XP CD-ROM.
  • 106. 100 17. Set-up completion  From this point on, Setup will continue to completion without any further need for interaction. Setup will now copy files, complete installation, install your Start Menu items, register system components, save settings, remove any temporary files needed by Setup, and then reboot.  Again, you will probably see the "Press any key to boot from CD" message on reboot. If this happens, do not press a key, and your new XP install will boot up. You can remove the XP Setup CD now. Figure 79. Set- Up Completion 18. First boot  You’ll be greeted by the XP splash screen on first boot (this actually appears briefly when you rebooted into GUI Setup as well).The splash screens for XP Pro and Home are subtly different. Figure 80. First Boot
  • 107. 101 19. Change display settings  Users with CRT monitors and some LCDs (such as laptops and flat panel displays) will see a Display Settings dialog appear, which asks whether you'd like XP to automatically set the resolution. This will generally change the resolution from 800 x 600 to 1024 x 768 on a CRT monitor, or to the native resolution of an LCD display.  Click OK and let XP change the resolution. Then, accept the settings if the screen display changes and can be read. If you can't see the display, it will time out after 30 seconds and return to the sub-optimal 800 x 600 resolution.  Click OK to accept the screen resolution change. Figure 81. Change Display Settings 20. Welcome to Microsoft Windows  Now, you are presented with XP's "Out of Box Experience," or OOBE, which presents a silly wizard to guide you through the final set up of your PC.  Click Next to continue. Figure 82. Welcome to Microsoft Windows
  • 108. 102 21. Network setup  In the opening OOBE phase, you are asked to set up your network/Internet connection, which is required for activation and registration. If you selected the default networking configuration during Setup and know it will work (because you're connected directly to a cable modem, perhaps, or are on a local area network), then select Yes (the default). Otherwise, you can select No and then Skip.  We'll assume that your network is up and running and select Yes.  Click Next to continue. Figure 83. Network Set- up 22. Optionally activate and register Windows  If you selected Yes in the previous step, you are asked if you'd like to activate Windows XP. This will tie your copy of XP to the current PC semi- permanently. Activation requires a connection to the Internet, but you can perform this step later if you want (and don't worry, XP will annoyingly remind you of this fact every time you boot the machine until you do so). Figure 84. Windows Activation
  • 109. 103 23. Set up users  Now, you can set up the user names of the people who will be using the PC. You will want at least one user (for you), since you shouldn't be logging on as Administrator. Curiously, each user you do create here has administrative privileges, however, and no password. You should set up your users correctly with passwords as soon as possible.  This phase lets you create up to five users. You can create more later, or manage users, using the User Accounts tool in Control Panel.  Click Finish when done creating users. At this point, OOBE ends and you're reading to go.  Click Finish again. Figure 85. Set-up Users 24. Logon to Windows XP for the first time  Click your name, that account will logon and you'll be presented with the XP desktop. After you create passwords, however, you'll be asked to enter a password before you can logon. Figure 86. Set-up Users
  • 110. 104 Multiple Choice: Read each question carefully and choose the letter of the best answer. Write your answer on a separate sheet of paper. 1. Which of the following is not a Windows XP minimum requirement? a. 128MB RAM or higher b. CD- ROM or DVD ROM c. Lower resolution monitor d. 4.3 GB hard disk space or more 2. If you see a message to press any key to boot the CD and you fail to do so, what do you think will happen? a. The computer will restart b. Set up inspecting your system will appear c. It will be prompted to BIOS setup d. It will return to boot menu 3. What key should you press if you need to install any third- party or RAID drivers? a. F2 b. F6 c. F2 d. F12 4. After reading the license agreement, what function key will press in order to start the installation? a. F6 b. F8 c. F9 d. F12 5. Where do we typically install the operating system?1 a. Drive C b. DVD c. External Drive d. Floppy Drive 6. What file system is usually used during installation?2 a. FAT b. FAT32 c. NTFS d. NTFS32 7. Suppose that you will install Windows XP on a system with more than one3 partition, what important process should be done?4 a. Change the file system5 b. Delete the data and files on the different partition6 c. Examine the partition7 d. Format the correct partition8 8. When the folder copy phase is complete your system will reboot, what are you9 going to do if see the message “Press any key to boot from CD”?10 a. Press any key b. Do not press a key c. Reboot the system d. Eject the CD 9. What is the next phase after the set up folder copy phase and reboot?11 a. GUI set up b. Software c. Username setup d. Software personalization 10.What phase will immediately follow after the first boot phase?12 a. Welcome to Windows b. Network Setup c. Change display setting d. Set up users 13 14 15
  • 111. 105 16 For you to have a profound knowledge on the overview of what windows XP17 is, utilize the internet and watch the following video presentations:18 1. Overview of Windows XP19  http://www.professormesser.com/free-a-plus-training/220-802/an-20 overview-of-windows-xp/21 22 2. Planning for installation23  http://www.professormesser.com/free-a-plus-training/220-24 802/planning-a-windows-installation-2/25 26 3. Windows XP installation27 http://www.professormesser.com/free-a-plus-training/220-28 802/installing-windows-xp-3/29 30 After watching the videos, have a documentation containing the overview of31 Windows Xp and salient procedures in Planning for installation and Windows XP32 installation. Use a short white bond paper and be creative for the documentation.33 34 35 36 37 38 39
  • 112. 106 40 41 Windows XP Installation42 Equipment:43 Computer unit with CD or DVD drive44 AVR / UPS45 Materials:46 Windows XP Installer47 Procedure:48 1. Work in triads or quartet (depending on the no. of computer available)49 2. Install the Operating System (OS), Windows XP.50 3. Take turns in doing the above task.51 52 You will be assessed using the criteria in the score card below.53 PERFORMANCE SCORE CARD54 Evaluation: CRITERIA Percentage Score 1. Operating System is installed with no errors. 40% 2. Proper disk partitioning and partition is performed. 40% 3. Proper use of equipment and materials is observed. 10% 4. Observance of Safety Precautions. 10% Performance Criteria 55 56 57 58 59 60 61 62 63
  • 113. 107 64 65 66 Windows 7 Installation67 68 As a technician you must be able to know the variations or options in installing69 an operating system that is compatible with the hardware requirement of a personal70 computer. Another operating system available in the market now is the Windows 771 version. Now, take a tour through the procedures in installing a Windows 7 operating72 system. I believe, the procedures will be very easy for you.73 74 1. Turn your computer on then press Del or F2 (depend on your computer’s75 mainboard) to enter the system BIOS.76 2. Go to Boot menu and choose Boot from CD/DVD.77 78 79 80 Figure 87. Boot Menu81 82 83 3. Press F10 to save the configuration and exit BIOS then reset your computer.84 85 86 Figure 88. Save configuration settings87
  • 114. 108 4. Insert Windows 7 DVD into your DVD drive then start up your computer,88 Windows 7 will be loading files.89 90 91 92 93 94 95 96 97 98 99 Figure 89. Windows 7 loading files and Start up100 101 102 5. Select your language, time & currency format, keyboard or input method and103 click Next.104 105 106 Figure 90. Language, Time and Currency Set- up107 6. Click Install now.108 109 Figure 91. Install Now110
  • 115. 109 7. Check I accept the license terms and click Next.111 112 113 114 Figure 92. License Terms Agreement115 116 8. Click Upgrade if you already have a previous Windows version117 or Custom (advanced) if you don’t have a previous Windows version or want118 to install a fresh copy of Windows 7.119 120 121 Figure 93. Windows 7 Options for Installation122 123 124 125
  • 116. 110 9. (Skip this step if you chose Upgrade and have only one partition) Select126 the drive where you want to install Windows 7 and click Next. If you want to127 make any partitions, click Drive options (advanced), make the partitions and128 then click Next.129 130 131 Figure 94. Drive Options132 133 10.It will now start installing Windows 7. The first step, (i.e. Copying Windows134 files) was already done when you booted the Windows 7 DVD so it will135 complete instantly.136 137 138 Figure 95. Windows 7 Starts Installation139 140
  • 117. 111 11.After completing the first step, it will expand (decompress) the files that it has141 been copied.142 143 Figure 96. Expanding Windows Files144 145 12.The third and fourth step will also complete instantly like the first step.146 147 148 Figure 97. Installing Features and Updates149 150 151 152
  • 118. 112 13.After that it will automatically restart after 15 seconds and continue the setup.153 You can also click Restart now to restart without any delays.154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 Figure 98. Restart to Continue Installation174 175 14.After restarting for the first time, it will continue the setup. This is the last step176 so it will take the most time than the previous steps.177 178 179 Figure 99.Completing Installation180
  • 119. 113 15. It will now automatically restart again and continue the setup. You can181 click Restart now to restart without any delays.182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 Figure 100.First Start Up201 202 16.Type your desired user name in the text-box and click Next. It will203 automatically fill up the computer name.204 205 206 Figure 101.Software Personalization207 208
  • 120. 114 17.If you want to set a password, type it in the text-boxes and click Next.209 210 211 Figure 102.Password Set- up212 213 18.Type your product key in the text-box and click Next. You can also skip this214 step and simply click Next if you want to type the product key later. Windows215 will run only for 30 days if you do that.216 217 218 Figure 103.Type Windows Product Key219 220 221
  • 121. 115 19.Select your desired option for Windows Updates222 223 224 Figure 104. Windows Update225 226 227 20.Select your time and click Next.228 229 230 Figure 105. Time and Date Settings231 232
  • 122. 116 21.If you are connected to any network, it will ask you to set the network’s233 location.234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 Figure 106. Windows 7 Set- up Complete249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 Figure 107. Preparing Desktop275
  • 123. 117 276 Hands- on Activity:277 You are tasked to reformat / install an operating system particularly Windows278 7, however, during the process of installation a problem occurred the machine /279 computer did not boot from CD. What do you think might be the reason for this280 unplanned incident? Your task now is to demonstrate the correct procedures to solve281 and respond to this unplanned event in accordance to the established procedures.282 You will work in quartet or triads (depending on the number of computers) to283 solve this problem. Your output will be rated according to the following criteria:284 SKILLS SCORE CARD285 CRITERIA PERCENTAGE SCORE Accuracy (Adherence to the correct procedure) 50 % Workmanship (Adherence to OHS policy, neatness and organization of materials used) 30 % Speed 20 % PERFORMANCE RATING 100% 286 287 Before implementing any contingency procedures in any unplanned events288 you must have a deeper understanding in obtaining approval from appropriate289 personnel. Your task now is to do the following:290 1. Watch video presentation on the said topic and have a proper documentation291 of the procedures in obtaining approval from the appropriate personnel.292 2. Interview a person in the field to acquire the knowledge (procedures) and293 skills on the said competency.294 295 296 297
  • 124. 118 298 299 Windows 7 Installation300 Equipment:301 Computer unit with CD or DVD drive302 AVR / UPS303 Materials:304 Windows 7 Installer305 Procedure:306 1. Work in triads or quartet (depending on the no. of computer available)307 2. Install the Operating System (OS), Windows 7.308 3. Take turns in doing the above task.309 310 You will be assessed using the criteria in the score card below.311 PERFORMANCE SCORE CARD312 CRITERIA Percentage Score 1. Operating System is installed with no errors. 40% 2. Proper disk partitioning and partition is performed. 40% 3. Proper use of equipment and materials is observed. 10% 4. Observance of Safety Precautions. 10% PERFORMANCE RATING 313 314 315 316 317 318 319 320
  • 125. 119 321 322 323 324 BASIC COMPUTER CONFIGURATION SETUP325 326 Configuration is the way a system is set up, or the assortment of327 components that make up the system. Configuration can refer to328 either hardware or software, or the combination of both.329 330 Basic Input / Output System (BIOS)331 The Basic Input Output System, usually referred to as BIOS, is software332 stored on a small memory chip on the motherboard.333 BIOS instruct the computer on how to perform a number of basic functions334 such as booting and keyboard control. BIOS is also used to identify and configure335 the hardware in a computer such as the hard drive, optical drive, CPU, memory, etc.336 337 338 Figure 108. BIOS Set- up339 340 The BIOS is accessed and configured through the BIOS Setup Utility. The341 BIOS Setup Utility is, for all reasonable purposes, the BIOS itself. All available342 options in BIOS are configurable via the BIOS Setup Utility. The BIOS Setup Utility is343 accessed in various ways depending on your computer or motherboard make and344 model.345
  • 126. 120 BIOS access and configuration on PC systems is independent of346 any operating systembecause the BIOS is part of the motherboard hardware. It347 doesn't matter if a computer is running Windows 7, Windows Vista, Windows XP,348 Linux, Unix, or no operating system at all - BIOS functions outside of the operating349 system environment and is no way dependent upon it.350 BIOS contain a number of hardware configuration options that can be351 changed through the setup utility. Saving these changes and restarting the computer352 applies the changes to the BIOS and alters the way BIOS instructs the hardware to353 function. The following list shows the things you can do in most BIOS systems:354 355  Change the Boot Order  Load BIOS Setup Defaults  Remove a BIOS Password  Create a BIOS Password  Change the Date and Time  Change Floppy Drive Settings  Change Hard Drive Settings  Change CD/DVD/BD Drive Settings  View Amount of Memory Installed  Change the Boot Up NumLock Status  Enable or Disable the Computer Logo  Enable or Disable the Quick Power On Self Test (POST)  Enable or Disable the CPU Internal Cache  Enable or Disable the Caching of BIOS  Change CPU Settings  Change Memory Settings  Change System Voltages Device Drivers356 Now that you successfully installed the operating system, you’ll need to357 configure the devices such as Video Cards, Network Interface Cards, Sound Cards,358 etc by installing the device drivers of each. In many cases, if Windows recognizes359 the device, drivers will be installed automatically. In some cases, generic drivers are360 installed so that the devices will work properly.361 Drivers are small software programs that help the operating system use or362 “drive” the device. Whenever a device doesn’t work properly, ask if the proper driver363 has been installed.364 The procedures listed below describe how to obtain and install drivers for365 hardware devices on a Microsoft Windows 2000-based computer.366 Step 1: Determine the Hardware Manufacturer367 If you do not know the manufacturer of the device for which you want to install the368 driver, follow these steps to determine the manufacturer:369 370 371 372 373
  • 127. 121 1. On the desktop, right-click My Computer, and then click Manage.374 375 376 377 Figure 109. Manage My Computer378 379 2. Under System Tools, click Device Manager.380 The devices that are installed on the computer are listed in the right pane.381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 Figure 110. Device Manager403 404 Device Manager
  • 128. 122 3. In the right pane, expand the category of the device that you want to configure.405 For example, expand Display adapters.406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 Figure 111. Expanded Device Category427 428 429 4. Right-click the device for which you want to install the driver, and then430 click Properties.431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 Figure 112. Device Properties452 453 Expanded Device Category NOTE: The device may be listed under other devices. NOTE: The device may appear as Unknown device or as a generic device.
  • 129. 123 5. Click the General tab. Make a note of the manufacturer and model of the454 device.455 456 457 458 Figure 113. General Tab459 460 6. Click Cancel, and then quit Computer Management.461 462 463 464 465 Step 2: Obtain the Driver466 To obtain the latest driver, use the following list of possible sources for the467 driver, in the order in which they are presented.468  Original Computer Manufacturer469 If the device was installed by your computer manufacturer, contact the470 manufacturer of your computer to find out how to obtain, download, and install the471 latest drivers for the device.472  Device Manufacturer473 Contact the manufacturer of the device to inquire about how to obtain,474 download, and install the latest drivers for the device.475 NOTE: If the device is not displayed in Device Manager, or the device is listed as an "Unknown device," contact the computer or device manufacturer to obtain more information about the device.
  • 130. 124  Chipset Manufacturer476 Contact the chipset manufacturer of the device to find out how to obtain,477 download, and install the latest drivers for the device. It is best to first contact the478 manufacturer of the device for the drivers before you contact the chipset479 manufacturer.480 481 For example, if your display adapter uses a NVIDIA chipset, first contact the482 manufacturer of the display adapter. If you cannot contact the display adapter483 manufacturer or if the manufacturer does not have a driver, contact NVIDIA.484 485 Some examples of chipset manufacturers (and their Web sites) include:486  NVIDIA (display adapters)487  PCTEL, Inc. (modems)488  Installation CD or Floppy Disks489 If you have the original driver CD or floppy disks that were included with the490 computer or device, and if no other source for the drivers is available, use the491 original driver that is included with the computer or device.492 493 NOTE: Whenever possible, try to first contact the Original Equipment Manufacturer494 (OEM), device manufacturer, or chipset manufacturer to obtain the latest version of495 the driver.496 Step 3: Install the Driver497  The driver files that you download from the OEM, device manufacturer, or498 chipset manufacturer differ depending on how the driver is packaged by the499 manufacturer.500  If the file is an executable program, run the program to extract the files. If the501 file is in .zip format, you can use a third-party utility such as WinZip to extract502 the files. For more information about how to extract the driver files, see the503 instructions that are provided by the manufacturer of the driver.504  The driver may use a setup program. The driver package may contain raw505 driver files, or it may contain only raw driver files. Some examples include .inf506 files, and .sys files. To install the driver, use one of the following methods507 as appropriate to your situation.508 509 510  Driver with a Setup or Installation Program511 If the driver uses a setup or installation program, run the program to install the512 driver. For more information about how to do this, see the documentation or contact513 the driver manufacturer.514 515
  • 131. 125  Device Is Displayed in Device Manager516 1. On the desktop, right-click My Computer, and then click Manage.517 2. Under System Tools, click Device Manager.518 The devices that are installed on the computer are listed in the right pane.519 3. Expand the category of the device that you want to configure. For example,520 expand Modems.521 NOTE: The device may be listed under Other devices.522 4. Right-click the device for which you want to install the driver, and then523 click Properties.524 NOTE: The device may be displayed as Unknown device, or as a generic525 device.526 5. Click the Driver tab, and then click Update Driver.527 The Upgrade Device Driver wizard starts.528 6. Click Next.529 7. Do one of the following:530 o Click Search for a suitable driver for my device (recommended), and531 then click Next.532 -or-533 o Click Display a list of the known devices for this device so that I can534 choose a specific driver, and then clickNext. Click Have Disk,535 click Browse, locate the .inf files that you downloaded in Step 2: Obtain536 the Driver, click an .inf file, and then click Open.537 538 8. Follow the wizard instructions to install the driver.539 9. Restart the computer.540 541  Device Is Not Displayed in Device Manager542 543 Use the Add New Hardware wizard in Control Panel to install drivers for non-544 Plug and Play devices. You may have to use this method to install certain modems,545 serial ports, or printer ports.546 1. Click Start, point to Settings, and then click Control Panel.547 2. Double-click Add/Remove Hardware.548 3. Click Next.549 4. Click Add/Troubleshoot a device, and then click Next.550 5. Do one of the following:551 o Click Yes, search for new hardware, and then click Next.552 -or-553 o Click No, I want to select the hardware from a list, and then click Next.554 6. Follow the wizard instructions to install the driver.555 7. Restart the computer.556 557 558 559
  • 132. 126 560 561 Installing Device Drivers562 Material: Installation CD563 Direction: Given an installation CD, perform installation of a device driver.564 Check the quality of your work undertaken in accordance with the established565 procedures thru the Performance Score Card below.566 567 PERFORMANCE SCORE CARD568 Performance Criteria Criteria Grade 1. The system is correctly started. 20% 2. The Installation CD is properly inserted. 20% 3. Handling and safekeeping of installation CD is observed. 20% 4. The instructions how to install device drivers are accurately followed. 20% 5. The device drivers are successfully installed 20% PERFORMANCE RATIING 569 570 571 572 573 574 575 576 577 578 579
  • 133. 127 580 581 Lesson3. CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM582 583 In the previous lesson, you were introduced with all the necessary knowledge584 and skills on installation of computer devices and operating system. Now, after585 executing the correct procedures I am sure that installation is a very easy task for586 you. Those skills will be very essential for the next lesson.587 In the next phase of your learning it will focus in conducting test on the588 installed computer components. After reading all the required topics and performing589 the essential skills you must be able to:590  Follow OHS policies and procedures in conducting tests;591  Check circuits and systems being isolated using specified testing procedures;592  Test devices, systems and/or installation to determine its conformity with the593 requirements;594  Undertake final inspections on the installed devices, systems to ensure595 conformity with the requirements;596  Accomplish technical reports on the tests conducted; and597  Follow procedures in forwarding documentation to appropriate personnel and/or598 authority on the test conducted.599 600 601 602 603 604 605 TESTING INSTALLED EQUIPMENT / DEVICES (COMPONENTS)606 607 As computer technician you will need a good understanding of the health and608 safety regulations from early on in your career, so that you understand the good609 practices demanded by law. In particular, you need to:610  report any accidents611  take reasonable care of your own health and safety when moving612 heavy components613  not cause any electrical hazards614  make sure that workstations meet safety requirements.615 You need to adhere to health and safety regulations as they will help to protect you616 and others and will avoid any unnecessary legal action for reckless and unsafe617 working practices. If you identify any health and safety problems, you should tell your618 line manager or the health and safety representative immediately.619 620
  • 134. 128 The most basic test is to switch the system on to check it starts without errors.621 ICT professionals are also likely to use tools and utilities to check that all is well with622 the system after an installation.623 The Use of Diagnostic Tools in testing installed hardware components and624 other peripherals625 Diagnostic tools are used to test and diagnose equipment. Diagnostic tools626 include the following:627  Digital multimeter is a device that can take many types of measurements. It628 tests the integrity of circuits and the quality of electricity in computer629 components. A digital multimeter displays the information on an LCD or LED.630 631  A loopback adapter, also called a loopback plug, tests the basic functionality632 of computer ports. The adapter is specific to the port that you want to test.633 634  The toner probe, is a two-part tool. The toner part is connected to a cable at635 one end using specific adapters, such as an RJ-45, coaxial, or metal clips.636 The toner generates a tone that travels the length of the cable. The probe part637 traces the cable. When the probe is in near proximity to the cable to which the638 toner is attached, the tone can be heard through a speaker in the probe.639 640 Figure 114. Diagnostic Tools641 Software Tools642 Like hardware tools, there are a variety of software tools that can be used to643 help technicians pinpoint and troubleshoot problems. Many of these tools are free644 and several come with the Windows operating system.645 Disk Management Tools646 Software tools help diagnose computer and network problems and determine which647 computer device is not functioning correctly. A technician must be able to use a648 range of software tools to diagnose problems, maintain hardware, and protect the649 data stored on a computer.650
  • 135. 129 You must be able to identify which software to use in different situations. Disk651 management tools help detect and correct disk errors, prepare a disk for data652 storage, and remove unwanted files.653 The following are some disk management tools:654  FDISK: A command-line tool that creates and deletes partitions on a hard655 drive. The FDISK tool is not available in Windows XP, Vista, or 7. It has been656 replaced with the Disk Management tool.657  Disk Management Tool: Initializes disks, creates partitions, and formats658 partitions.659  Format: Prepares a hard drive to store information.660  ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard661 drive by scanning the file system. These tools might also check the disk662 surface for physical errors.663  Defrag: Optimizes space on a hard drive to allow faster access to programs664 and data.665  Disk Cleanup: Clears space on a hard drive by searching for files that can be666 safely deleted.667  System File Checker (SFC): A command-line tool that scans the operating668 system critical files and replaces files that are corrupted.669 Use the Windows 7 boot disk for troubleshooting and repairing corrupted files.670 The Windows 7 boot disk repairs Windows system files, restores damaged or lost671 files, and reinstalls the operating system.672 Test procedures673 674 A test procedure is a set of steps to guide you through what needs to be done675 to thoroughly test the installation. It is designed to help you work more effectively and676 to make sure you test everything that needs testing.677 678 Test procedures are created in-house and could include these steps:679 1. Gathering test information. The first step is to run the tests required by the680 procedure and find out what happens. You should record all the results of your tests681 in a log so that you know which pass and which fail, thereby requiring further action.682 2. Validating the test information. The next step is to check the data you gathered683 from the tests to make sure it is correct. This is usually done by running the tests684 again.685 3. Responding to test information. This step is important because you need to be686 able to recognize when a test shows problems or is successful. For example, if ping687 is used to test a network connection then ‘Request timed out’ shows the test was not688 successful.689
  • 136. 130 4. Checking specification. The final step is an important end to testing. You need690 to check the specification for the installation to make sure that it has been met. For691 example, if a user requested an upgrade to make their display run at 1920 x 1200,692 then the ICT professionalshould check that the graphics card and screen can do this.693 694 External Visual Inspection695 The external visual inspection consists of a quick inspection of the exterior of696 the computer, the monitor, the keyboard, any peripherals, and cables. While697 performing the visual inspection, make any necessary corrections. To perform the698 external visual inspection, perform the following steps:699 1. Turn off the computer, the monitor, and all peripherals.700 2. Verify that all power cables are properly connected to the computer, the701 monitor and peripherals, and their power sources.702 3. Verify that the keyboard and mouse interface cables are firmly attached to the703 proper connectors on the back of the computer.704  For a PS/2-compatible mouse, the keyboard and mouse interface cable705 connectors are identical except for their labels.706  For a serial mouse, the mouse interface cable must be firmly attached707 to one of the serial port connectors, and its captive screws must be708 secure enough to ensure a firm connection.709 4. Verify that network cables (if present) are properly attached.710 5. Verify that any devices attached to the serial and parallel port connectors are711 properly connected.712  Each of the serial and parallel port interface cables must be firmly713 attached to an appropriate connector on the back of the computer as714 well as to the interface connector on the device. The captive screws715 that secure these connectors at each end of the interface cable must716 be secure enough to ensure a firm connection.717 6. Verify that the video interface cable is firmly attached to the video connector718 on the back panel or to a video expansion card, and also to the connector on719 the back of the monitor. For proper connection of the video monitor, see the720 documentation for the monitor.721 7. Inspect all external monitor controls for any obvious damage or improper722 settings. For proper settings of the video monitor controls, see the723 documentation for the monitor.724 8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys725 are sticking, it may be necessary to replace the keyboard.726 9. Inspect the exterior of the computer, including all controls and indicators, and727 all user-accessible data storage devices for any signs of physical damage.728 729 Does the inspection reveal any problems?730 731 Yes. Proceed to the appropriate procedure in "Removing and Replacing732 Parts."733
  • 137. 131 734 No. Proceed to "Observing the Boot Routine."735 736 Observing the Boot Routine737 After you have performed an external visual inspection as described in the738 previous section, you should boot the system and, while the boot routine is running,739 observe the system for any indications of problems.740 741 742 To observe problem indications during the boot routine, perform the following steps:743 1. If the system is off, turn on all peripherals and the computer.744 2. Check the power supply fan.745 Does the fan run normally?746 o Yes. Proceed to step 3.747 o No. Troubleshoot the system power supply.748 749 3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the750 upper-right corner of the keyboard. After all three indicators flash momentarily,751 and following a long pause (approximately 30 seconds), the Num Lock752 indicator should light up and remain on (unless the Num Lock option is set753 to Off in the System Setup program).754 755 Do these indicators flash on and off within approximately 10 seconds after the756 boot routine starts?757 o Yes. Proceed to step 4.758 o No. Troubleshoot the system power supply. If the troubleshooting759 procedure indicates that the system power supply is operational,760 troubleshoot the memory.761 4. During the boot routine, observe the system for any of the following762 indications:763 o Beep codes — A beep code is a series of beeps that indicates an error764 condition.765 o System error messages — these messages can indicate problems or766 provide status information.767 o Diskette-drive and hard-disk drive access indicators — These768 indicators light up in response to data being transferred to or from the769 drives. If either of these indicators fails to light up during the boot770 NOTE: Most of the steps in this procedure require observation of system functions and indications, some of which can occur simultaneously. It may be necessary to reboot the system several times to complete all of these steps.
  • 138. 132 NOTICE: Before you proceed with the internal visual inspection described in this section, ensure that the user has saved all open files and exited all open application programs if possible. CAUTION: Before beginning to work inside the computer, disconnect the power supply from the power source and the power supply cables from the power supply. CAUTION: The heat sink assembly can get extremely hot during system operations. Be sure that it has had sufficient time to cool before touching it. CAUTION: When handling the heat sink assembly, take care to avoid sharp edges on the heat sink. routine, troubleshoot the diskette drive or hard-disk drive subsystem,771 as appropriate.772 5. Observe the monitor screen for the Diagnostics menu.773 Internal Visual Inspection774 A simple visual inspection of a computer’s interior hardware can often lead to775 the source of a problem, such as a loose expansion card, cable connector, or776 mounting screw. To perform the internal visual inspection, perform the following777 steps:778 1. Turn off the system, including any attached peripherals, and disconnect all the779 AC power cables from electrical outlets.780 781 2.Remove the computer’s right side cover.782 3.Verify that the chips, expansion cards, and SEC cartridge and heat sink783 assembly or assemblies are fully seated in their sockets or connectors.784 4. To ensure that the chips are fully seated in their sockets, press firmly on the785 top of each chip.786 5. Verify that all jumpers are set correctly.787 6. Check all cable connectors inside the computer to verify that they are firmly788 attached to their appropriate connectors.789 7. Reinstall the computer cover.790 8. Reconnect the computer and any attached peripherals to their power sources,791 and turn them on.792 793
  • 139. 133 794 Suppose that you are in the workshop carrying out hardware installations, the795 owner are very impressed with you. There has been a lot of telephone time spent796 recently explaining to customers how to test installed components of their computer797 systems. The shop has decided to create their own video that will be uploaded to the798 website and YouTube. You have been asked to create this video.799 800 1. Create a video to demonstrate how to install the hardware components.801 Make sure you include everything you need to do to work safely.802 2. Show how to configure any device installed in the computer.803 3. Create another video on the following:804 a. Undertake final inspection on the assembled computer system for805 functionality. This will be to test that the newly installed hardware806 components work without problems;807 b. Accomplish technical reports on the tests conducted; and808 c. Follow procedures in forwarding documentation to appropriate809 personnel or authority810 811 812 813 814 815 816 817 818 819 820 821 822 823 824
  • 140. 134 825 826 Test I. Identification827 Direction: Identify the terms being described in the following sentences.828 1. These are mobile computers that are very handy to use.829 2. They are computers designed to provide services to client machines in a830 computer network.831 3. They are also called mid-range systems or workstations.832 4. A computer with a microprocessor and its central processing unit it.833 5. They fall in the category of laptops, but are inexpensive and relatively smaller in834 size.835 6. A type of computer which is intended be used on a single location.836 7. They use digital circuits and are designed to operate on two states, namely bits837 0 and 1.838 8. Computers that have the capacities to host multiple operating systems and839 operate as a number of virtual machines and can substitute for several small840 servers.841 9. It is a handheld computer and popularly known as a palmtop.842 10.These computers can be worn on the body and are often used in the study of843 behavior modeling and human health.844 11. It is considered as the most important program that runs on a computer.845 12.It is composed of a device that accepts data and instructions from the user or846 from another computer system.847 13.Any piece of computer hardware that displays results after the computer has848 processed the input data that has been entered.849 14.Any apparatus for recording computer data in a permanent or semi-permanent850 form.851 15.It protects a computer network from unauthorized access.852 16.Type of network that connect larger geographic areas, such as Florida, the853 United States, or the world.854 17.This is an internetworking system capable of joining together two networks that855 use different base protocols.856 18.It is consists of two or more computers that are linked in order to share857 resources (such as printers and CD-ROMs), exchange files, or allow electronic858 communications.859 19.It is a small, simple, inexpensive device that joins multiple computers together.860 20.A device filters data traffic at a network boundary.861 862 863 Test II. True or false864 Direction: Write TRUE if the statement is correct and FALSE otherwise.865 1. Always use an anti-static wrist strap when working on a computer (except866 when working on monitors)867
  • 141. 135 2. Always disconnect a computer from the AC power and from any powered868 peripherals while you are working on it.869 3. Always grasp a metal part of the computer chassis with your bare hand before870 you touch anything inside. Do this even if you are wearing an anti-static871 wristband.872 4. Always handle electronic components by a non-conducting (non-metallic)873 edge. Don't touch the pins or other connectors.874 5. Always use a UL-approved surge protector or an Uninterruptible Power875 Supply that incorporates surge and spike protection876 6. Never eat, drink, or smoke while working on a computer.877 7. Whenever you purchase software or hardware for your computer, you should878 first make sure your computer supports the system requirements.879 8. The speed of a computer's processor chip (technically known as its "clock880 speed") in measured in gigahertz (GHz).881 9. A computer's graphics system determines how well it can work with visual882 output.883 10.Today 40GB is an absolute minimum hard drive size for a new computer884 running Windows 7.885 11.When attaching cables, never force a connection.886 12.BIOS instruct the computer on how to perform a number of basic functions887 such as booting and keyboard control.888 13.The external visual inspection consists of a quick inspection of the interior of889 the computer.890 14.Disk management tools help detect and correct disk errors.891 15.The most basic test is to switch the system on to check it starts without errors.892 893 Test III. Multiple Choices894 Direction: Read each questions carefully and write the letter of the best answer.895 1. These are small software programs that help the operating system use the896 device.897 a. Application898 b. Driver899 2. Which of the following is software shared on a small memory chip on the900 motherboard?901 a. Installer b. Application c. Driver d. BIOS 3. It is the way to set up a system or the assortment of components that make up902 the system.903 a. Configuration b. Set up c. Driver d. Installation 4. Which of the following is not a Windows XP minimum requirement? a. 128MB RAM or higher b. CD- ROM or DVD ROM c. Lower resolution monitor d. 4.3 GB hard disk space or more
  • 142. 136 5. If you see a message to press any key to boot the CD and you fail to do so, what do you think will happen? a. The computer will restart b. Set up inspecting your system will appear c. It will be prompted to BIOS setup d. It will return to boot menu 6. What key should you press if you need to install any third- party or RAID drivers? a. F2 b. F6 c. F9 d. F12 7. Where do we typically install the operating system? a. Drive C b. DVD c. External Drive d. Floppy Drive 8. Suppose that you will install Windows XP on a system with more than one partition, what important process should be done? a. Change the file system b. Delete the data and files on the different partition c. Examine the partition d. Format the correct partition 9. What file system is usually used during installation? a. FAT b. FAT32 c. NTFS d. NTFS32 10.Which of the following is a connector on the back of a computer or other device? a. Modem b. Port hub c. Router d. Network Gateway
  • 143. 137 Test IV. Matching Type Direction: Match column A with Column B and write your answer on a separate sheet of paper. A. 1) It serves as the brain of computer. 2) Printed-circuit boards (also called interface cards) that enable the computer to use a peripheral device 3) Also called read/write memory 4) Small portable disk drive usually used for backing up files 5) Main board of a computer 6) Also called diskette 7) Acts as a pointing device 8) Device that makes sounds, clips and any audio materials be heard. 9) Component that reads and record data in CDs and DVDs. 10)It is a visual device that displays the information 11)Plug- and play portable storage device 12)Prints text and illustrations in paper 13)Converts AC into DC 14)Allows more than one program to run concurrently 15)Handheld computer B. a) Adapter b) CD- ROM c) CPU d) Flash Drive e) Floppy disk f) Microphone g) Monitor h) Motherboard i) Mouse j) Multitasking k) Optical Discs l) PDA m) Power supply n) Printer o) RAM p) Register q) ROM r) Speaker s) Tablet t) Zip Drive
  • 144. 138 SKILLS TEST Direction: Listed below are some of the most important skills that you must gain in order to render quality service when you enter the real world of Computer Hardware Servicing. Read the skills carefully. Write “YES” if you are familiar with the skill and “NO” if not. Feel free to answer each skill. Write your answers in your notebook. Skills in Computer Hardware Servicing YES NO I can open a computer case. I can connect the mouse. I can connect the keyboard. I can connect the monitor. I can apply occupational health and safety precautions while working. I can remove the system fan. I can detach the power supply from the system unit. I know how to remove the RAM from the motherboard. I can remove the hard drive from the system unit. I can install the power supply. I know how to install the motherboard. I can install the internal drives in a system unit. I know how to attach RAM in the memory socket. I can install CD / DVD drives. I know how to install an operating system I know how to configure a hardware components I know the procedures in inspecting operating systems and software components
  • 145. 139 adapters - These are printed-circuit boards that enables the computer to use a peripheral device for which it does not have the necessary connections or circuit boards. Analog Computers- It uses continuous variables for mathematical operations and utilizes mechanical or electrical energy. Bridge is a device filters data traffic at a network boundary Digital Computers- They use digital circuits and are designed to operate on two states, namely bits 0 and 1 Digital multimeter is a device that can take many types of measurements. It tests the integrity Drivers- are small software programs that help the operating system use or “drive” the device Ethernet switch is a device that gathers the signals from devices that are connected to it hard disk drive- Is a magnetic storage device that is installed inside the computer. hardware- These are the tangible component of a computer system. hazard- Is a situation in the workplace that has the potential to harm the health and safety of people or to damage plant and equipment. Hub- is a small, simple, inexpensive device that joins multiple computers together Hybrid Computers- a combination of both digital and analog computers Loopback adapter- is also called a loopback plug, tests the basic functionality of computer ports Mainframe Computers- these are computers have the capacities to host multiple operating systems and operate as a number of virtual machines and can substitute for several small servers Microcomputers- A computer with a microprocessor and its central processing unit it is known as a microcomputer Minicomputers- are also called mid-range systems or workstations
  • 146. 140 motherboard- The main circuit board of a computer containing all the essential parts of a PC. Network firewall - protects a computer network from unauthorized access Personal Digital Assistants (PDAs)- is a handheld computer and popularly known as a palmtop smart board - Type of display screen that has a touch sensitive transparent panel covering the screen. static electricity - An accumulation of electric charge on an insulated body. Servers- They are computers designed to provide services to client machines in a computer network
  • 147. 141 ATA- Advance Technology Attachment BIOS- Basic Input Output System CD- Compact Disc CHS- Computer Hardware Servicing CRT- Cathode Ray Tube ESD- Electro Static Discharge DVD- Digital Versatile Disc FAT- File Allocation Table GB- Giga Byte HDD- Hard Disk Drive LAN- Local Area Networking LCD- Liquid Crystal Display LED- Light Emitting Diode MB- Mega Byte NTFS- New Technology File System OHS- Occupational Health and Safety OS- Operating System PDA- Personal Digital Assistant PPE- Personal Protective Equipment RAM- Random Access Memory
  • 148. 142 ROM- Read Only Memory SATA- Serial Advance Technology Attachment USB- Universal Serial Bus WAN- Wide Area Network VGA- Video Graphic Array
  • 149. 143 Books and Articles and Printed Materials: 1. Barry Press, Marcia Press, PC Upgrade and Repair Bible, a. Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint b. Boulevard, Indianapolis, IN 46256 2. Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475 a. Crosspoint Boulevard, Indianapolis, IN 46256 3. Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop a. Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, b. IN 46256 4. K to 12 Basic Education Curriculum- Technology and Livelihood Education a. Learning Module –Computer Hardware Serviciing- RONALDO V. RAMILO and b. DEOVER M. PASCO 5. Technology and Livelihood Education- Information and Communications Technology Learners Manual – Grade 7 & 8 - Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero Electronic Resources: 1. http://www.buzzle.com/articles/computer-memory-types.html Computer Memory Types 2. http://www.athropolis.com/popup/c-comp2.htm Measurements for Memory & Storage 3. http://www.ustudy.in/ce/hard/u1 Fundamentals of PC repair 4. http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20- %20With%20Oral%20Questioning_0.pdf Occupational Health and Safety Precautions 5. http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp Puzzles for Activities
  • 150. 144 6. http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_ v40_Chapter2.pdf Occupational Safety Precautions 7. http://www.youtube.com/watch?v=6N7bqBsFL0w- Computer Hardware Basics 8. http://www.wikihow.com/Install-Computer-Hardware- How to install Computer Hardware 9. http://www.directron.com/howtoupsys.html- How to install Computer components 10.http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20 10/ProperToolSelection.pdf Tool Selection 11.http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html 12.http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics 13.www.professormesser.com- PC Hardware, Networking ,Operating Systems and Troubleshooting
  • 151. 144 K to 12 Basic Education Curriculum Technology and Livelihood Education Content Standard Performance Standard The learner demonstrates understanding of the underlying concepts and principles on diagnosing and troubleshooting of computer systems. The learner independently diagnoses and troubleshoots computer systems as prescribed in the TESDA Training Regulation. MODULE 4: DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEMS (DT) Number of Sessions (Time Allotment): 60 hrs Republic of the Philippines DEPARTMENT OF EDUCATION
  • 152. 145 Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under the Information and Communications Technology (ICT) Course. In this module you will have a great deal of diagnosing and troubleshooting computer system. At the end of this module you will be able to plan and prepare for diagnosis of computer system errors, configure, inspect and test computer system networks and errors. Those skills are essential for you to reach the door of National Certification II in Computer Hardware Servicing. In this module, topics will be introduced progressively lesson by lesson for easy understanding. After carefully answering the diagnostic assessment, reading all the lessons, answering all the guide questions, masterfully performing all the activities, showing evidences of learning and finally answering the summative test, then you will have a considerable knowledge and skills in diagnosing and troubleshooting computer system essential to be successful in computer hardware servicing as one of the career option in ICT. Reminder! Just follow the instructions given in this module. Now let us start exploring new things in this module.
  • 153. 146 In this module, there will be four (4) major topics that you will encounter: (1) be plan and prepare diagnosis of computer system errors; (2) diagnose and configure computer systems and networks ; (3) inspect and test the configured computer systems and networks ; and (4) test systems and networks. The four major topics contains sub-topics which all leads to diagnose and troubleshoot computer systems. This module contains what to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well as what to TRANSFER. The competencies for this module are: LO 1. Plan and prepare for diagnosis of computer systems errors  Follow OHS procedures in planning and preparing diagnosis of computer systems errors  Determine the computer systems errors using manual and software diagnosis LO 2. Diagnose and configure computer systems and networks  Follow OHS procedures in planning and preparing diagnosis of computer systems and network errors  Identify the diagnosed computer systems and network errors based on the job requirements  Configure computer systems and networks LO 3. Inspect and test the configured computer systems and networks  Follow OHS procedures in inspecting and testing configured computer systems and networks  Inspect configured computer systems and networks  Replace defective components  Reinstall defective computer systems  Identify networks errors  Repair networks errors based on standard procedures  Test the configured computer systems and networks LO 4. Test Systems and Networks  Follow OHS procedures in testing systems and networks  Test computer systems and networks in accordance with the job requirements  Accomplish technical reports on the tests conducted In order to master the above listed competencies, you must be knowledgeable of the topics under what to KNOW, perform activities required under what to PROCESS, accomplish additional meaningful tasks under what to REFLECT and UNDERSTAND and finally show some evidences of your learning by transferring what you have learned in a different context under what to TRANSFER.
  • 154. 147 You will be challenged to dig deeper into your prior knowledge and previous experiences about computer hardware servicing. Instruction:  Read each of the statements in the left-hand column of the chart.  Place a check on the column that indicates your answers. Knowledge able Have a little Knowledge No Knowledg e at All Plan and prepare work to ensure occupational health and safety (OHS) policies and procedures are followed Obtain materials, tools, equipment and testing devices needed to on form with job requirements Interpret work instructions according to job requirements Obtain computer components/devices/systems and determines its location prior to installation Install equipment/devices/systems in accordance with job requirements Check/Test devices/systems and/or installations to determine the conformity to job requirements. Check computer systems and networks for configuration in accordance with specifications and requirements Diagnose fault or problem in the computer systems and networks in line with standard operating procedures (SOP) Configure the identified systems and networks based on specifications and job requirements Inspect and test configured computer systems and networks in conformity with manufacturer's instructions/manual Correct/Adjust components or parts of computer systems and networks in accordance with job requirements Test computer systems and networks to ensure safe operation Perform scheduled/periodic maintenance in accordance with manufacturer's requirements Make needed repairs/replacements in accordance with established procedures, when necessary Document tasks undertaken in accordance with SOP Clean and clear worksite of all surplus/excess materials in accordance with company SOP
  • 155. 148 LESSON 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEMS ERRORS SAFETY PRECAUTIONS Personal Protective Equipment Proper preparation is the key to a successful work. Before you begin, make sure that you have the tools you will need, and secure a clear well-lit workplace. Gather all the components you’ll be using and unpack them at the same time. Always keep in mind that personal protection is one of the traits of a good computer technician. Types of personal protective devices 1. Anti-static devices 2. Power surge protectors 3. Personal equipment Anti-static devices Devices designed to protect the computer from static electricity. Anti – static wrist strap Anti- static mat
  • 156. 149 Power surge protectors Devices designed to protect the computer from sudden power surges from intermittent power sources. Examples: 1. AVR (Automatic Voltage Regulators) 2. UPS (Uninterrupted Power Supply) Personal Equipment Small paint brush Anti- static bag Anti-static spray
  • 157. 150 Screw drivers Pliers and tweezers Compressed air Handheld vacuum Directions: Perform the activity below.  Choose a partner  Do a simulation exercise o One will act out the role of a computer teacher. o The other will be the student Situation: Computer teacher will show/demonstrate to the students the Personal Protective Devices, what they are and how they are used. The Student keeps on asking about the Personal Protective Devices/Equipment and how they can be maintained in good condition of PC.
  • 158. 151 Answer the following questions in your own answer/test notebook 1. For somebody who always works (do troubleshooting) with computers, what personal protective devices do you usually use? How often do you use them? 2. Computers should be protected from static electricity to prevent component malfunction. What anti-static devices can you utilize to avoid such malfunction? TYPES OF COMPUTER SYSTEM ERROR There are several errors in a computer from the point you open it up to the point you reach the stand by window (reaching standby windows means boot process has no error). Here's a list of computer error. 1. No Video Output - When you open your PC, nothing shows up in your monitor and the LED indicator of your monitor is flashing in yellow color. 2. No Video Output - Same as number one but now the LED indicator of your monitor is in steady orange color. 3. Doesn't Boot - When you open your PC it will show the processor brand and/or the motherboard brand but doesn't continue. Usually this error will result to system restart over and over again. 4. Never Ending Loading of Operating system - The computer opens up then boots but when the operating system loads it doesn't continue and it will take a lifetime if you're going to wait for it to load. 5 Lots of pop up windows showing on standby mode - This also happens even if you try disconnecting your computer set from the internet. This is what we called aftershock virus which will continue to run even if internet is disconnected. 6. Lots of hardware installation windows appear - This happens even if you try installing the hardware. When you restart your set it will happen again. 7. Safe mode doesn't work - When you try going to safe mode all you will see is a list of files in Command prompt style.
  • 159. 152 8. Keyboard and mouse system restart - This will happen only in standby mode, when you move your mouse or type something, your system will automatically restart and the worst part is it will delete a file at random. 9. Sound on/off error - Upon loading the operating system, you will hear a loading sound and then the sound stops, when you try running an audio file, no sound will be heard. 10. Application causes system to restart - Just like the mouse problem, when you open a program that will take the whole screen like for example a game and/or a program applications, when you close it, it will cause your system to restart. Aside from the common computer errors, computers also can have different Operating System (OS) errors. OS errors can be classified into various categories, such as: 1. System errors – These are moderately dangerous types of errors among those that can pop up on your PC. System errors are caused by malfunctioning hardware components, corrupted operating system modules, etc. 2. Runtime errors – Runtime errors are caused by corrupted or malfunctioning system files or software executables. Most runtime errors cause the application that caused it to shut down. However, more serious runtime errors may cause the system to become unstable or unresponsive, leaving you with no choice but to reach for the Reset button. 3. Stop errors – Stop errors are caused by corrupted hardware, especially malfunctioning RAM modules and bad sectors on hard disks. Stop errors can be difficult to resolve at times. 4. Device Manager Errors – These are usually caused by corrupted driver files or malfunctioning hardware components. In case of the former cause, the problem is usually solved simply by reinstalling or updating the drivers. However, the latter cause can often be solved only by replacing hardware components. 5. POST code errors – POST code errors are caused by malfunctioning hardware components, and are characterized by short beep sounds from the tiny internal speaker of your motherboard. POST code errors occur when you press the power button to turn on your PC.. 6. Application errors – These can be caused at any point of time. As the name suggests, these are caused by applications while those are running. These are usually caused by glitches in the program code itself. These are usually resolved by updating the program to its latest version. 7. Browser Status Codes – These are caused by problems faced by browsers when trying to access a website. These can be caused by misplaced web pages in the server of the website itself, or due to connection problems. For
  • 160. 153 instance, a 404 error would indicate that the browser is trying to access a webpage that does not exist in the specified location. DIAGNOSING COMPUTER SYSTEMS PC Diagnosing Probably the most frustrating problem computer users run into are startup problems, where your computer won’t boot. Equally annoying are error messages you constantly run into during your computer’s startup process. In this module you will be given a few tips on how you can avoid some of the most common problems that happen right after your computer is turned on. Here you will learn the basic troubleshooting.  Trial and error: When you find a faulty component in your computer, check it with the other computers so that you can make sure whether the fault is in the component or not.  Check cables: In case of any device failure, check all the cables of your computer such as data cables, power cable, internal circuitry cables and make sure that all these are plugged in and working fine.  Hardware settings: Check the hardware settings in the CMOS and in the device manager of the system and make all the device drivers up to date and all the cards are plugged in properly.  Notice changes: When you notice a software or hardware error in your computer, determine what was changed before the problem occurred.  Event viewer: In the event viewer, you will find the error or warning messages associated with any faulty hardware or software.  Make notes: Troubleshooting is a big learning option and we can learn a lot when we face any kind of troubleshooting in our computer. Make notes including the error messages and their solutions, so that you have a record on how a certain problem occurred and how did you solve it. Common PC Problems and solutions You are working away at your computer when suddenly, up comes an error message – or worse, your computer comes to a screeching halt. Here are the common computer problems and solutions that can help you.
  • 161. 154 Steps 1. Check the POST. POST stands for Power On Self-Test. This is generally the first or second thing that appears on a computer after turning on the power. This appears before the operating system begins to load. The POST will display any problems found with hardware that makes the computer unable to boot, POST may also display problems with hardware that allow the computer to boot, but not operate at its full capacity during operation. 2. Notice the load time of the OS (operating system). A longer than usual load time may indicate errors in the hard drive. 3. Notice any graphics problems once the OS has loaded. Reduced graphics may indicate driver failures or hardware failures with graphic cards. 4. Perform an auditory test. An auditory test is an unorthodox, but still effective way of judging how a computer is working. With the computer on and running, play any decent length audio file (usually above 30 sec). If the audio is choppy or slow, it usually means that the processor is working at an elevated level, or there is not enough RAM to run all programs loading. Changing the startup sound is a great way to apply this test. Another issue associated with choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the hard drive reads and writes data from a drive. Switching to Direct Memory Access (DMA) allows for faster reads and writes, and can sometimes repair choppy audio. 5. Check any newly installed hardware. Many operating systems, especially Windows, can conflict with new drivers. The driver may be badly written, or it may conflict with another process. Windows will usually notify you about devices that are causing a problem, or have a problem. To check this use the Device Manager, this can be accessed by entering the Control Panel, clicking the System icon, clicking the Hardware tab, and clicking on Device Manager. Use this to check and arrange the properties of hardware. 6. Check any newly installed software. Software may require more resources than the system can provide. Chances are that if a problem begins after software starts, the software is causing it. If the problem appears directly upon startup, it may be caused by software that starts automatically on boot. 7. Check RAM and CPU consumption. A common problem is a choppy or sluggish system. If a system is choppy it is good practice to see if a program is consuming more resources than the computer can provide. An easy way to check this is to use the Task Manager, right click on the taskbar select Task Manager, and click the Processes tab. The CPU column contains a number that indicates the
  • 162. 155 Network HUB Network cable Network card percentage of CPU the process is consuming. The Memory Usage column indicates how much memory a process is consuming. 8. Listen to the computer, if the hard drive is scratching or making loud noises, shut off the computer and have a professional diagnose the hard drive. Listen to the CPU fan, this comes on a high speed when the CPU is working hard, and can tell you when the computer is working beyond its capacity. 9. Run a virus and malware scan. Performance problems can be caused by malware on the computer. Running a virus scan can unearth any problems. Use a commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus) 10. Check for the problem in safe mode. To enter safe mode, tap F8 repeatedly during POST (this works on most systems). If the problem persists in safe mode, it is a fair bet that the operating system itself is to blame. Common Trouble shooting for Computer Units 1. Double check the power connections. 2. Voltage Regulator and power supply could cause power failure in the computer unit. 3. Check the power cords and cable connectors in your computer unit. 4. Unseated card. Loose cards could cause malfunction. 5. Check the boot sequence configuration in the advance BIOS (Basic Input /Output Unit) setup. Diagnosing Network Connection Things to look for if a PC is connected to the internet or network:  First check the cable connecting to the network card into the network hub.  Check the back of the computer to see if the network card light is on  Check the network cable ( use cable tester)  Check the network HUB (use multi-tester)
  • 163. 156 Identify the following: 1. Moderately dangerous types of errors among those that can pop up on your PC. 2. Caused by malfunctioning hardware components, and are characterized by short beep sounds from the tiny internal speaker of your motherboard. 3. Caused at any point of time. As the name suggests, these are caused by applications while those are running. 4. Usually caused by corrupted driver files or malfunctioning hardware components. 5. Caused by corrupted or malfunctioning system files or software executables. 6. Caused by corrupted hardware, especially malfunctioning RAM modules and bad sectors on hard disks. 7. Caused by problems faced by browsers when trying to access a website. Task: Develop a Sample Diagnostic Plan List down all possible components to be checked based on the symptoms. Symptoms: Dead Computer Monitor Good Defective Remedy AC outlet AVR AVR fuse Monitor Power Cable Monitor Switch Power Supply
  • 164. 157 Diagnosing a Computer Power Supply Create a diagnostic plan for troubleshooting a power supply with the use of the following tools, materials and equipment. You will be assessed using the following criteria CRITERIA Passed Failed 1. Sequence of steps in diagnosing is followed. 2. Safety precaution is observed. 3. Appropriate tools are used in diagnosing. 4. Diagnostic plan for troubleshooting is created. PERFORMANCE RATING
  • 165. 158 LESSON 2. DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND NETWORKS SAFETY PRECAUTIONS Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that aim to protect the health, safety and welfare of all people at the workplace. Every worker has a right to healthy and safe work and to a work environment that enables them to live a socially and economically productive life. Safety practices should be learned early and always adhered when working with any electrical device including personal computers and peripherals. Personal safety while working with PC’s The following statements are some safety precautions to take before working with any computer devices:  Before doing anything, listen to your teacher’s instruction to prevent accidents or any unwanted events that may occur on your workplace.  Do not work on computer when you are wet because you might get electrocuted.  Do not remove internal devices of the computer when it is turned on.  Avoid playing or running while inside the room.  Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, etc.  Ask for assistance from your teacher when it comes on dealing with computer devices.  Applying safety measure when handling tools and equipment are necessary to avoid certain damages. The student is further expected to maintain good health, to be neat in personal appearance and to practice safe working procedures at all time with appropriate equipment.
  • 166. 159 Basic Concepts of Electricity This lesson will introduce us to the fundamental knowledge of electricity. It will enable student to be equip with the basic knowledge in electricity. Basic Electrical Terms  Electricity is define as the flow of electron or electric current. It is an invisible form of energy that can be transform into other form of energy like heat light and mechanical.  Electron is the negatively charge component of an atom. It has the ability to flow.  Proton is the positively charge component of an atom. It had the ability to attract electron.  Matter is anything that occupy space and has mass. It can be a solid, liquid or gas in state.  Atom Basic component of matter. It composes of a nucleus which is the central part, the protons and electrons.  Current Same as electricity or flow of electron. The amount of current flowing in a circuit can be measured in ampere (I).  Voltage the amount of pulling force that makes the electron flow. Also known as potential difference or EMF(electromotive force). The amount of voltage can be measured in volt (V).  Resistance define as the opposition to the flow of current. The amount of resistance can be measure in ohms (Ω).
  • 167. 160 Conductors and Insulators  Conductors are materials that easily allow the flow of current, or it has a low resistance to current flow. Examples; aluminum, gold, silver, copper, iron  Insulators are materials that do not easily allow the flow of current, or it has a high resistance to current flow. Examples; rubber, plastic, paper Types of Current 1. Direct Current In direct current (DC), the flow of electric charge is only in one direction. This is the type of electricity is produced by batteries, static, and lightning. A voltage is created, and maybe stored, until it is consumed. When the current flows directly, in one direction. In the circuit, the current flows at a specific, constant voltage (this is oversimplified somewhat but good enough for our needs.) When you use a flashlight, pocket radio, portable CD player or virtually any other type of portable or battery- powered device, you are using direct current. Most DC circuits are relatively low in voltage; for example, your car's battery is approximately 12V, and that's about as high a DC voltage as most people ever use. Figure 1. Direct Current An ideal 12 V DC current. The voltage is considered positive because its potential is measured relative to ground or the zero-potential default state of the earth. Direct currents flow in one direction only, and are constant in time. Their appearance is that of a straight line which does not vary. They are produced from power sources such as batteries, power supplies and DC generators. Photovoltaic devices such as solar cells also generate DC power. 2. AC Alternating Current
  • 168. 161 In alternating current (AC, also ac) the movement of electric charge periodically reverses direction. This type of electricity is produced or generated by AC generators commonly from a hydro electric plant. It is the commercial power that we use in homes and offices. Delivered through a power transmission lines. AC current can be reduced through the use of power transformer to suite for its application. It can also be converted to DC for a specific purpose. In the Philippines AC is rated as 220V AC at 60 Hz. Alternating currents change direction, flowing first one way and then the other. They are sinusoidal waves, so that they change in time. They are produced from sources such as power supplies and AC generators. In North America, AC is 120 volts and 60 hertz or cycles per second. This means it changes direction 60 times per second. In Europe, it is generally 50 hertz with 220 to 240 volts. Figure2. Alternating Current Why does standard electricity come only in the form of alternating current? There are a number of reasons, but one of the most important is that a characteristic of AC is that it is relatively easy to change voltages from one level to another using a transformer, while transformers do not work for DC. This capability allows the companies that generate and distribute electricity to do it in a more efficient manner, by transmitting it at high voltage for long lengths, which reduces energy loss due to the resistance in the transmission wires. Another reason is that it may be easier to mechanically generate alternating current electricity than direct current. PC’s use only direct current, which means that the alternating current provided by your utility must be converted to direct current before use. This is the primary function of your power supply.
  • 169. 162 Figure 3. Simplified block diagram of a PC power supply Electric Circuit Electric circuit - is the pathways for electricity to flow. Components of Circuit  Load - commonly represented by a bulb or any electrical component that consumes electricity.  Supply - Commonly represented by a cell or a battery  Switch - an electrical device that opens or closed a circuit. Figure4. A simple circuit Types of Circuit 1. Open Circuit - a type of circuit that has an open path for current to flow. It means that current cannot flow in open circuit. AC POWER PC’s PSU DC POWER MOTHERBOARD DRIVES COOLING FANS Load Switch Supply
  • 170. 163 Figure5. An open circuit The switch is said to be “OPEN” the current can’t flow into the circuit and the bulb is “OFF” 2. Closed Circuit - a type of circuit that has a closed path for current to flow. It means that current can flow in a closed circuit. Figure 6. A closed circuit The switch is said to be “CLOSED” the current can’t flow into the circuit and the bulb is “ON” Load Switch Supply - + Load Switch Supply - +
  • 171. 164 I. Identification: Direction: Identify the following statement. _________1. Define as the flow of electron or electric current. It is an invisible form of energy that can be transform into other form of energy like heat light and mechanical. _________2. The negatively charge component of an atom. It has the ability to flow. _________3. Define as the opposition to the flow of current. The amount of resistance can be measure in ohms (Ω). _________4. The positively charge component of an atom. It has the ability to attract electron. _________5. Anything that occupy space and has mass. It can be a solid, liquid or gas in state. _________6. Basic component of matter. It composes of a nucleus which is the central part, the protons and electrons. _________7. Same as electricity or flow of electron. The amount of current flowing in a circuit can be measured in ampere (I). _________8. The amount of pulling force that makes the electron flow. Also known as potential difference or EMF (electromotive force). The amount of voltage can be measured in volt (V). _________9. Materials that easily allow the flow of current, or it has a low resistance to current flow. _________10. Materials that do not easily allow the flow of current, or it has a high resistance to current flow. _________11. A computer power supply converts AC to ___________________. _________12. Define as the pathways for electricity to flow.
  • 172. 165 _________13. A component of a circuit that is commonly represented by a bulb or any electrical component that consumes electricity. _________14. A component of a circuit that is commonly represented by a cell or a battery. _________15. An electrical device that opens or closed a circuit. _________16. A type of circuit that has a closed path for current to flow. It means that current can flow in this circuit. _________17. A type of circuit that has an open path for current to flow. It means that current cannot flow in this circuit. _________18. A circuit connection has only one path of current flow. In this circuit connection the current remain constant. _________19. A circuit connection that has 2 or more path of current. In this circuit the voltage remains constant. _________20. An invisible form of energy. Techniques for diagnosing computer systems Computer Diagnosis Sometimes when the problem with a system is not totally apparent and the problem may be intermittent, using a basic common diagnostic procedure may help determine what is wrong. This procedure has a number of steps that, if followed each time, can be of help. Rules in Diagnosing Computer System 1. Know the facts  Educate oneself on all aspects and operation of computer parts.  Continuous learning on computer technology. 2. Use your common sense 3. Focus on Field Replaceable Units
  • 173. 166  Identify the different types of FRU that can be used for replacement or sub assembly. 4. Proper assembly and disassembly 5. Factors Causing Computer Failures and Defects People ware  Untrained personnel would probably damage programs in PC. Firmware  Programs or software burnt in chips may be corrupted. Software  Corrupted operating systems would cause the system to fail. Hardware  Defective hardware components would lead to computer malfunction.  Hardware conflicts and viruses can hinder your computers performance. ESD (Electro Static Discharge) Electro static discharge can easily damage sensitive components in your computer. Electricity Incoming supply from AC outlet must be regulated; power surges can damage computer units. Problem Isolation Problem isolation is a detective work in which you need to determine what is out of the ordinary by making detailed observation of what is not working normally and record any information as you proceed. The information you will be able to gather will help diagnose your computer. You need to observe wisely. Look for any abnormalities in the unit, any change in smell or foreign smell, listen to all the sounds, and error codes. Component Isolation This section will aid in determining components in your system which are failing. First, most systems have 3 major components; monitor, system unit, and printers. Some have multiple external devices. To troubleshoot, you need to isolate major components which are failing to operate. Diagnostics Procedure for ATX Power Supply Failure 1. Determine whether or not the power comes on.
  • 174. 167 2. Check the switch operation with a Digital Volt Meter on the continuity or resistance setting. 3. Check the pins if the corresponding voltage are properly regulated to the motherboard. 4. Replace the power supply unit if defective. ATX Version 1.2 - 20 wire motherboard connector Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8 Pin 9 Pin 10 3.3V 3.3V Gnd 5V Gnd 5V Gnd P_OK 5VSB 12V Oran Oran Blk Red Blk Red Blk Gray Purp Yell Oran Blue Blk Green Blk Blk Blk White Red Red 3.3V -12V Gnd P_ON Gnd Gnd Gnd -5V 5V 5V Pin 11 Pin 12 Pin 13 Pin 14 Pin 15 Pin 16 Pin 17 Pin 18 Pin 19 Pin 20
  • 175. 168 Flowchart for ATX Power Supply Repair Warning! You must unplug your ATX power supply from the wall before working inside the case. ATX Diagnostic chart
  • 176. 169 Things to Consider There are many devices, parts, cords, and connections on a computer, which means that there are many possible problems that could arise. In addition, your computer uses a variety of software, which can also cause problems. However, no matter what the problem is, you can use the following tips to help you find a solution:  Always check the cables: Many computer problems are related to an issue in the cables and connections. The easiest first step you can take to troubleshoot most problems is to check all related cables and connections.  Isolate the problem: If possible, try to isolate the problem. For example, if you can't get the cursor to move on the screen, try to determine if the issue is with the mouse. If you have an extra mouse, you can alternate devices to see if the one plugged in is the issue, or use the arrow keys on the keyboard to help determine if the mouse is the source of the problem. When trying to isolate the problem, only make one change at a time. Figure 7. An error message  Take notes about error messages: If your computer gives you error messages, be sure to write down as much information as possible. If the basic troubleshooting steps don't work, you may need the information.  Remember the steps you've taken, or write them down: Once you start troubleshooting, you will want to remember what you have done, so you don't repeat yourself. If you can't remember it, then write it down. If you end up asking someone for help, it will be much easier if they know exactly which steps you've taken. Simple Solutions to Common Problems Most of the time, problems can be fixed by using simple troubleshooting techniques, such as closing and re-opening the program. It's important to try these simple solutions before resorting to more extreme measures. If the problem still isn't fixed, you can then try other troubleshooting techniques, such as reinstalling the software.
  • 177. 170 Program Runs Slowly or Isn't Working Right  If a program is running slowly or otherwise isn't working right, the first thing you should try is closing the program and re-opening it.  You can also shut down your computer, wait a few seconds, and boot it up again. Some minor problems will work themselves out when you do this.  Check with the company for any known problems or updates to the software. Figure 8. Checking for updates Program is Completely Unresponsive  If a program has become completely unresponsive, you can press (and hold) Control+Alt+Delete on your keyboard to open the Task Manager. You can then select the program that isn't working and click End Task. If you are using a Mac, you can press Option+Command+Esc to open a similar dialog box. Figure 8. The Task Manager
  • 178. 171 Problems Starting or Shutting Down the Computer Power Button Will Not Start Computer Figure 9. Resetting a surge protector  If your computer does not start, begin by checking the power cord to confirm that it is plugged securely into the back of the computer case and the power outlet.  If it is plugged into an outlet, make sure it is a working outlet. Often, this will require you to plug a lamp or other electrical device into the outlet to make sure it is receiving power.  If the computer is plugged into a surge protector, verify that it is turned on. You may have to reset the surge protector by turning it off and then back on. You can also plug a lamp or other device into the surge protector to verify that it is on.  If you are using a laptop, the battery may not be charged. Plug the AC adapter into the wall and then try to turn on the laptop. If it still doesn't start up, you may need to wait a few minutes and then try again. "Non-System Disk or Disk Error" Message If you get this message when you boot up your computer, it usually means there is a CD, DVD, USB flash drive, or floppy disk in your computer, which is interfering with your computer's booting process. Remove the disk from the drive and restart the computer. Figure 10. The Non-System Disk or Disk Error Message
  • 179. 172 Windows Shutting Down Message Will Not Disappear Sometimes Windows will freeze during the shutdown process. If this happens, the Windows is Shutting Down message screen will stay active on your screen. To finish shutting down the computer, press and hold the power button for about 10 seconds, or until the computer turns off. Figure 11. The Windows shutdown screen Computer Begins Randomly Rebooting or Crashing  Check for overheating. Make sure the vents in the case are not blocked. Confirm that there is good air flow around the computer.  Update your antivirus software and scan for viruses. Figure 12. Virus Scanning
  • 180. 173 Problems with the Monitor and Speakers No Picture on the Monitor  Confirm the computer is turned on.  Check the brightness control, located on your monitor or your keyboard, and make sure it is not set too low.  Check the connections for the monitor and surge protector, and make sure the surge protector is turned on. Figure 13. Cable plugged into monitor Monitor Goes Blank Periodically  You may have the screensaver enabled. If the screen saver is enabled, just move your mouse back and forth and your original screen will appear. You can change the screensaver settings by going to your Control Panel (or your System Preferences if you're using a Mac). Figure 14. Opening the Control Panel
  • 181. 174 No Sound Figure 15. Adjusting the sound volume on a Mac  Check the volume control on your computer. In Windows, the sound icon will usually be on the taskbar, and you can also access the sound options in the Control Panel. On Macs, the sound options are found at the top of the screen or in System Preferences.  Most media programs (such as iTunes or Windows Media Player) have a volume control, which will need to be turned up.  Make sure the speakers are turned on, if using external speakers.  Make sure external speakers are connected to the correct audio port or a USB port. If your computer has color-coded ports, the audio output will usually be green.  Connect headphones to the correct audio port and determine if sound is audible from the headphones. Searching the web for a solution If you still haven't found a solution to your problem, you may need to ask someone else for help. Try searching the web for the problem that you're having, as other people may have had similar problems. Also, if you have a friend or family member who knows a lot about computers, they may be able to help you. Keep in mind that most computer problems have simple solutions, although it may take some time to find them. For very difficult problems, a more drastic solution may be required, such as reformatting your hard drive, reinstalling programs, or reinstalling your operating system. If you're not a computer expert, it's possible that you could make the situation worse, so it's best to consult a professional if you think a drastic solution is needed.
  • 182. 175 Task. Examining the Motherboard in Detail 1. Look at the back of your computer. Without opening the case, list the ports that you believe come directly from the motherboard. 2. Remove the cover of the case. List the different expansion cards in the expansion slots. Was your guess correct about which ports come from the motherboard? 3. To expose the motherboard so you can identify its parts, remove all the expansion cards. 4. Draw a diagram of the motherboard and label these parts: Processor (Include the prominent label on the processor housing.) a) RAM (each DIMM slot) b) CMOS battery c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe x16, and AGP.) Each port coming directly from the motherboard Power supply connections, SATA or IDE drive connectors and floppy drive connector 5. Draw a rectangle on the diagram to represent each bank of jumpers on the board. 6. What is the brand and model of the motherboard? 7. Locate the manufacturer’s Web site. If you can find the motherboard manual on the site, download it. 8. You can complete the following activity only if you have the documentation for the motherboard:  What do you do if a program on a PC is completely unresponsive? What about a program on a Mac?  What should you do if you've tried everything and the problem still isn't fixed? Diagnosing Power Supply Failure
  • 183. 176 Directions: Divide the class into five (5) groups. Choose a leader for each group. The group will prepares a chart and perform the tasks required by the Diagnostics Procedure of ATX Power Supply Failure. After the activity they will be graded through the given Performance Score Card below: PERFORMANCE SCORE CARD Performance Criteria Passed Failed 1. The students clearly identified the problem and applied the possible solution correctly. 2. The students utilized actual tools/device in performing the actual usage of each tools and OHS was observed. 3. The students applied safety precautions during the Activity. 4. The activity gave students more critical thinking on the personal protective equipment. 5. The students cooperatively performed the activity.
  • 184. 177 Tools for Testing Computer System Tools and equipment play vital roles in troubleshooting. They help the user determine the errors found in their computer hardware and network. Tools used to test hardware problems: 1. Screw drivers - are used for installing and removing screws in the computer unit. Figure 16. Screw Drivers 2. Pliers and tweezers - are used for picking small parts in the computer unit. Figure17. Pliers and Tweezers 3. Soldering iron- is primarily used for connecting terminals in the power supply and circuit board with the use of a soldering lead.
  • 185. 178 Figure18. Soldering iron 4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic discharge in the work area. Figure19. Anti- static wrist strap, mat and spray 5. Lens cleaner – a device used for cleaning optical media, such as DVD-ROMS and CD-writers. Figure20. Lens Cleaner 6. Thermal paste-is a paste used for heat dissipation of the processor. Figure21. Thermal Paste
  • 186. 179 Network Troubleshooting Tools 1. LAN Tester – is a device used for testing the network connection. Figure22. LAN Tester 2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP cable. Figure23. Crimping Tool Direction: Answer the following question. Write your answers on your notebook. . Enumerate the six tools used for troubleshooting. 1. 2. 3. 4. 5. 6. 2. Enumerate the two network troubleshooting tools. a. b.
  • 187. 180 Troubleshooting computer system network Causes of Network Trouble If a computer is unable to connect to a network or see other computers on a network, it may be necessary to troubleshoot the network. A network may not work because of any of the reasons below. 1. Network card not properly connected. 2. Bad network card drivers or software settings. 3. Firewall preventing computers from seeing each other. 4. Connection related issues. 5. Bad network hardware. Solution Because of the large variety of network configurations, operating systems, setup, etc... Not all of the below information may apply to your network or operating system. If your computer is connected to a company or large network, or you are not the administrator of the network, it is recommended that if you are unable to resolve your issues after following the below recommendations that you contact the network administrator or company representative. Verify connections / LEDs Verify that the network cable is properly connected to the back of the computer. In addition, when checking the connection of the network cable, ensure that the LEDs on the network are properly illuminated. For example, a network card with a solid green LED or light usually indicates that the card is either connected or receiving a signal. If, however, the card does not have any lights or has orange or red lights, it is possible that either the card is bad, the card is not connected properly, or that the card is not receiving a signal from the network. If you are on a small or local network and have the capability of checking a hub or switch, verify that the cables are properly connected and that the hub or switch has power.
  • 188. 181 Adapter resources Ensure that if this is a new network card being installed into the computer that the card's resources are properly set and not conflicting with any hardware in the computer. Adapter functionality Verify that the network card is capable of detecting or seeing itself by using the ping command. Windows / MS-DOS users ping the computer from a MS-DOS prompt. Unix / Linux variant users ping the computer from the shell. To ping the card or the local host, type either ping 127.0.0.1 or ping local host This should show a listing of replies from the network card. If you receive an error or if the transmission failed, it is likely that either the network card is not physically installed into the computer correctly, or that the card is bad. Protocol Verify that the correct protocols are installed on the computer. Most networks today will utilize TCP/IP, but may also utilize or require IPX/SPX and NetBEUI. When the TCP/IP protocol is installed, unless a DNS server or other computer assigns the IPX address, the user must specify an IP address as well as a Subnet Mask. To do this, follow the instructions below. 1. Click Start / Settings / Control Panel 2. Double-click the Network icon 3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not click on the PPP or Dial-Up adapter, click on the network card adapter. 4. In the TCP/IP properties click the IP address tab 5. Select the option to specify an IP address 6. Enter the IP address and Subnet Mask address, an example of such an address could be: IP Address: 102.55.92.1 Subnet Mask: 255.255.255.192 7. When specifying these values, the computers on the network must all have the same Subnet Mask and have a different IP Address. For example, when using the above values on one computer you would want to use an IP address of 102.55.92.2 on another computer and then specify the same Subnet Mask. Firewall If your computer network utilizes a firewall, ensure that all ports required are open. If possible, close the firewall software program or disconnect the computer from the firewall to ensure it is not causing the problem.
  • 189. 182 Additional time In some cases it may take a computer some additional time to detect or see the network. If after booting the computer you are unable to see the network, give the computer 2-3 minutes to detect the network. Windows users may also want to try pressing the F5 (refresh) key when in Network Neighborhood to refresh the network connections and possibly detect the network Additional troubleshooting If after following or verifying the above recommendations you are still unable to connect or see the network, attempt one or more of the below recommendations. If you have installed or are using TCP/IP as your protocol you can ping another computer's IP address to verify if the computer is able to send and receive data. To do this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant users must open or be at a shell. Once at the prompt assuming, that the address of the computer you wish to ping is 102.55.92.2, you would type: ping 102.55.92.2 If you receive a response back from this address (and it is a different computer), this demonstrates that the computer is communicating over the network. If you are still unable to connect or see the network, it is possible that other issues may be present. Another method of determining network issues is to use the tracert command if you are a MS-DOS or Windows user or the trace route command if you are a Linux / Unix variant user. To use this command you must be at the command prompt or shell. Or trace route 102.55.92.2 This should begin listing the hops between the computer and network devices. When the connection fails, determine what device is causing the issue by reviewing the trace route listing. Networking with DHCP Task: Setting up a local area network with a Dynamic Host Control Protocol (DHCP) server is easy! The DHCP server provides all the information your computer needs to get up and running on the network. Once connected, you will check network connectivity with the router and at least one other peer on the network.
  • 190. 183 Procedure Getting connected 1. Before connecting your PC to the network, be sure the Windows XP operating system is running on your computer. You will use Windows XP sp2 throughout this activity. 2. Next, open a terminal window on your computer by clicking on Applications- >Accessories->Terminal. 3. In the terminal window, type ipconfig and press Enter. a. How many network devices are listed in the output? Record their names in your worksheet. b. Is there an IPv4 address listed for any of the network devices? If so, record your IP address (es) in your worksheet. 4. Connect your computer to a network switch using a patch cable. Did you get a light on the switch? Record the port number you connected to in your worksheet. 5. Draw a diagram of the entire local area network in the space below, including the router, any switches or hubs, and all connected PCs. 6. Run ifconfig again. Do you see an IP address? If so, record it in your worksheet. 7. In the terminal window, type dhclient eth1 and press Enter. Describe what happens. Checking your connection 1. Check connectivity with the router with the ping command. Type ping -c4 10.0.1.1 and press Enter. Record the times listed in the last column of the output. What was the average round trip time (rtt) from your computer to the router and back? 2. Ask another group for their IP address. Check connectivity with that group's computer with ping. Run ping as shown above, substituting the new IP address for the one listed in the previous item. Record the times listed in the last column below. What was the average round trip time (rtt)? 3. When you have completed the activity, shut down your computer and return to your seat.
  • 191. 184 Title: Networking with Static IPs Purpose: While setting up a network with a Dynamic Host Control Protocol (DHCP) server is very convenient, it is sometimes preferable to use static IP addresses. In this activity, you will join the network using an IP address and netmask provided by your instructor. Once connected, you will check network connectivity with at least one other peer on the network. Procedure Getting connected 1. Before connecting your PC to the network, be sure the windows Operating system is running on your computer. 2. When the boot process is completed, connect your computer to the network switch using a patch cable. Did you get a light? What port number did you connect to on the switch? 3. Draw a diagram of the entire network in the space below. 4. To configure your network settings, click System->Administration->Network. 5. In the Network settings window, make sure the Connections tab is selected. 6. Click on Wired connection, and then click the Properties button. 7. In the Interface properties window, change the Configuration setting to Static IP address. 8. Enter the IP address provided by your instructor in the IP address field. 9. Enter 10.0.1.0 in the Gateway address field. 10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to close the Interface properties window. 11. Click OK to close the Network settings window. Checking your connection 1. Open a terminal window on your computer, if one is not already open, by clicking Applications->Accessories->Terminal. 2. Type ipconfig and press Enter. Are your network setting correct? If not, repeat the steps 4–11 in the previous section
  • 192. 185 3. Ask another group for their IP address. Check connectivity with that group's computer with ping. For example, ping -c4 10.0.1.200. Record the times listed in the last column below. What was the average round trip time? 4. Ask a second group for their IP address. Check connectivity to that group's computer with ping. Record the times listed in the last column below. What was the average round trip time? CRITERIA Evaluation: Passed Failed 1. Sequence of steps in diagnosing is followed. 2. Safety precaution are observed. 3. Appropriate tools are used in diagnosing. 4. Diagnostic plan for troubleshooting is created. Remarks
  • 193. 186 Computer System and Network Configurations Computer Networks Networks are collections of computers, software, and hardware that are all connected to help their users work together. A network connects computers by means of cabling systems, specialized software, and devices that manage data traffic. A network enables users to share files and resources, such as printers, as well as send messages electronically (e-mail) to each other. The most common networks are Local Area Networks or LANs for short. A LAN connects computers within a single geographical location, such as one office building, office suite, or home. By contrast, Wide Area Networks (WANs) span different cities or even countries, using phone lines or satellite links. Network System Configuration All networks go through roughly the same steps in terms of design, rollout, configuration, and management. Designing Your Network Plan on the design phase to take anywhere from one to three working days, depending on how much help you have ad how big your network is. Here are the key tasks:  Settle on a peer-to-peer network or a client/server network.  Pick you network system software.  Pick a network language.  Figure out what hardware you need.  Decide on what degree of information security you need.  Choose software and hardware solutions to handle day-to-day management chores. Rolling Out Your Network Rolling out your network requires the following steps:  Run and test network cables.
  • 194. 187  Install the server or servers if you’re setting up a client/server network. (If you are setting up a peer-to-peer network, you typically don’t have to worry about any dedicated servers.)  Set up the workstation hardware.  Plug in and cable the Network Interface Cards (NICs – these connect the network to the LAN).  Install the hub or hubs (if you are using twisted-pair cable).  Install printers.  Load up the server software (the NOS, or Network Operating System) if your network is a client/server type.  Install the workstation software.  Install modem hardware for remote dial-up (if you want the users to be able to dial into the network).  Install the programs you want to run (application software). Configuring Your Network Network configuration means customizing the network for your own use.  Creating network accounts for your users (names, passwords, and groups).  Creating areas on shared disk drives for users to share data files.  Creating areas on shared disk drives for users to share programs (unless everyone runs programs from their own computer).  Setting up print queues (the software that lets users share networked printers).  Installing network support on user workstations, so they can "talk" to your network. Managing Your Network The work you do right after your LAN is up and running and configured can save you huge amounts of time in the coming months.  Mapping your network for easier management and troubleshooting.  Setting up appropriate security measures to protect against accidental and intentional harm.  Tuning up your LAN so that you get the best possible speed from it.  Creating company standards for adding hardware and software, so you don’t have nagging compatibility problems later.  Putting backup systems in place so that you have copies of data and programs if your hardware fails.  Installing some monitoring and diagnostic software so that you can check on your network’s health and get an early warning of impleading problems.  Figuring out how you plan to handle troubleshooting – educating your LAN administrator, setting up a support contract with a software vendor, and so on.
  • 195. 188 Smooth Setup One key advantage of a peer-to-peer network is that it’s easy to setup. With the simplest sort of peer-to-peer network, you just use the built-in networking that comes with your operating system (Windows 98, Windows XP, Windows 7, Windows 8 and so on) and you have very little software to set up – even less if you have computers that have the operating system preinstalled, as most computers do these days. For Windows XP and Windows 7, the basic steps to setting up a peer-to-peer network are as follows: (Review for Cabling) UTP Cable A UTP cable (category 5) is one of the most popular LAN cables. This cable consists of 4 twisted pairs of metal wires (that means there are 8 wires in the cable). Adding RJ45 connectors at both ends of the UTP cable it becomes a LAN cable they usually use. Preparation You need a UTP Cable, Crimping Tool, RJ45, and Cutter Figure24. Materials for Cabling Making Cable Follow the steps below.
  • 196. 189 1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-side). 2. Arrange the metal wires in parallel (refer the each section's wire arrangement table). Don't remove the shield of each metal line. 3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement. 4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly. 5. Make the other side of the cable (we call this side B-side) in the same way. 6. After you made it, you don't need to take care of the direction of the cable. (Any cable in this page is directionless --- that means you can set either end of the cable to either device.) How to see the wire arrangement Take the UTP cable with your left hand and a RJ45 connector with your right hand. Hold the RJ45 connector in the way you can see the contact metal face of the RJ45 connector. The tables below are for the case where the UTP cable consists of green/green-white, orange/orange-white, blue/blue-white, brown/brown-white twisted pairs. 10 Base T / 100 Base T Straight 10BaseT and 100BaseT are most common mode of LAN. You can use UTP category-5 cable for both modes. (You can use UTP category-3 cable for 10BaseT, in which there are only 3 wires inside the cable.) A straight cable is used to connect a computer to a hub. You can use it to connect 2 hubs in the case one of the hubs has an uplink port (and you use normal port on the other hub).
  • 197. 190 10 Base T / 100 Base T Cross A cross cable for 10BaseT and 100BaseT is used to connect 2 computers directly (with ONLY the UTP cable). It is also used when you connect 2 hubs with a normal port on both hubs. (In other words, the cross cable is used relatively in a rare case.) Pin ID side A side B 1 orange-white green-white 2 orange green 3 green-white orange-white 4 blue blue 5 blue-white blue-white 6 green orange 7 brown-white brown-white 8 brown brown To create a peer network, you must have the following components: Pin ID side A side B 1 orange-white orange-white 2 orange orange 3 green-white green-white 4 blue blue 5 blue-white blue-white 6 green green 7 brown-white brown-white 8 brown brown
  • 198. 191 • A network interface or Local Area Network (LAN) adapter for each computer. The same manufacturer and model of network card is preferred. • Cabling that is supported by the network cards. • Windows XP or 7 drivers for the network cards. • A common network protocol. • A unique computer name for each computer. Task. Creating Peer to Peer Network To create a peer network, follow these steps for each computer connected to the network: 1. Shut down the computer and install the network card and appropriate cabling for each computer. 2. Start Windows and install the network drivers. Windows may detect your network card and install the drivers when you start the computer. If the network card drivers are not included with Windows, follow the manufacturer's instructions about how to install the network drivers. 3. Choose a client and a common protocol for each computer. To do this, follow these steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. Click Add, click Client, and then click Add. c. In the Manufacturers box, click the appropriate manufacturer, click the appropriate client in the Network Clients box, and then click OK. d. Click Add, click Protocol, and then click Add. NOTE: For information about how to configure your network adapters and physically connect your computers, consult the documentation included with your network adapters or contact the manufacturer(s) of your network adapters.
  • 199. 192 e. In the Manufacturers box, click the appropriate manufacturer, click the appropriate protocol in the Network Protocol box, and then click OK. 4. Configure a peer server. Each computer that is configured for File and Printer Sharing can act as a server. To configure a computer for File and Printer Sharing, use the following steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. Click File and Print Sharing, click one or both options to share files and printers, click OK, and then click OK again. c. Click Yes when you are prompted to restart your computer. 1. Give each computer a unique computer name. To do this, use the following steps: a. Click Start, point to Settings, click Control Panel, and then double-click Network. b. On the Identification tab, type a unique name in the Computer name box. c. Click OK, and then click Yes when you are prompted to restart your computer. : Task. Setting Windows Network Connection Equipment, Tools and Materials Required: - UTP cables - 4 Computer units - 1 hub NOTE: The computer name must be unique for each computer on the network and should be no more than 15 characters in length. In small networks, the workgroup name should be the same for each computer so that all computers are visible in the same workgroup when browsing. You should not use spaces or the following characters in computer and workgroup names
  • 200. 193 Given the following materials, set-up a network connection on four computers. Task 2. Using the Internet for Research In this project, you will learn how useful the Internet can be for a PC support technician. 1. Using your own or a lab computer pretend that the motherboard manual is not available and you need to replace a faulty processor. Identify the manufacturer and model of the mother board by looking for the manufacturer name and model number stamped on the board. Research the Web site for that manufacturer. Print the list of processors the board can support. 2 .Research the Web site for your motherboard and print the instructions for flashing BIOS. 3.Research the Abit Web site (www.abit.com.tw) and print a photograph of a motherboard that has a riser slot. Also print the photograph of the riser card that fits this slot. What is the function of the riser card? More Security for Remote Desktop Task. Analyze the situations below and answer the questions that follows. When Jacob travels on company business, he finds it’s a great help to be able to access his office computer from anywhere on the road using Remote Desktop. However, he wants to make sure his office computer as well as the entire corporate network is as safe as possible. One way you can help Jacob add more security is to CRITERIA 1 2 3 4 5  Safety Precautions are observed.  All the UTP are properly connected to the computer and hub.  Computers are properly connected and seen in the network.  Proper boot-up and shutdown of the computer is observed. Total:
  • 201. 194 change the port that Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses port 3389, but if you change this port to a secret port, hackers are less likely to find the open port. Search the Microsoft Knowledge Base articles (support.microsoft.com) for a way to change the port that Remote Desktop uses. Practice implementing this change by doing the following: 1. Set up Remote Desktop on a computer to be the host computer. Use another computer (the client computer) to create a Remote Desktop session to the host computer. Verify the session works by transferring files in both directions. 2. Next, change the port that Remote Desktop uses on the host computer to a secret port. Print a screen shot showing how you made the change. Use the client computer to create a Remote Desktop session to the host computer using the secret port. Print a screen shot showing how you made the connection using the secret port. Verify the session works by transferring files in both directions. 3. What secret port did you use?
  • 202. 195 Lesson 3. INSPECT AND TEST THE CONFIGURED COMPUTER SYSTEMS AND NETWORKS General Safety Tips and Reminders  Observe good housekeeping in the area of the machines during and after maintenance.  Place removed covers and other parts in a safe place, away from all personnel, while you are servicing the machine. Dress for the Job  Keep your tool case away from walk areas so that other people will not trip over it.  Do not wear loose clothing that can be trapped in the moving parts of a machine. Ensure that your sleeves are fastened or rolled up above your elbows. If your hair is long, use hair net or hair cap.  Insert the ends of your necktie or scarf inside clothing or fasten it with a nonconductive clip, approximately three (3) inches from the end.  Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.  After service, reinstall all safety shields, guards, labels, and ground wires. Replace any safety device that is worn out or defective.  Finally, reinstall all covers correctly before returning the unit to the customers. Electrical safety Electric current from power, telephone, and communication cables can be hazardous. To avoid personal injury or equipment damage, disconnect the attached power cords, telecommunications systems, networks and modems before you open Remember: Metal objects are good conductors
  • 203. 196 the server/workstation covers, unless instructed otherwise in the installation and configuration procedure. Precautions  Disconnect all power before:  Performing a mechanical inspection  Working near power supplies  Removing or installing main units  Before starting work on the machine, unplug the power cord.  Never assume that power has been disconnected from a circuit. First, check that it has been powered-off.  Always look carefully for possible hazards in your work  Moist floors  Non-grounded power extension cables  Power surges.  If an electrical accident occurs:  Switch off power  Send another person to get medical aid Safety Inspection Guide 1. These steps will help you identify potentially unsafe conditions on electrical products:  Check exterior covers for damage (loose, broken, or sharp edges)  Power-off computer. Disconnect the power cord.  The power cord should be the appropriate type.  Insulation on the power cord must not be frayed or worn out.  Remove the cover.  Check for any obvious alteration. Use good judgment as to the safety of any alterations.  Check for worn out, frayed or pinched cables.  Check that the power-supply cover fasteners (screws or rivets) have not been removed or tampered with. Accident Reporting Policy and Procedure There must be a process put in place to report accidents, incidents or near misses for immediate action and to help track causes. The organization needs to identify what needs to be reported, to whom it is to be reported, and how to report it, then put this process into a written procedure. For example: Any accident, incident, or "near miss," no matter how slight the injury or damage, must be reported to the department supervisor immediately for appropriate action.
  • 204. 197 The supervisor is responsible for taking appropriate follow-up action, including getting medical attention for the injured, completing an investigation report and recommending or implementing appropriate corrective actions. The primary purpose of the accident investigation is to identify the cause(s) of the accident, incident or "near miss" and take action to prevent a similar occurrence in the future. In some instances, an employee's or volunteer's failure to follow recognized safety procedures requires disciplinary action to protect co-workers. Remember: One person's actions can jeopardize the safety of others in the workplace. Accident Reporting Policy Sample Approved by Chairman: Date: 1. Purpose [complies with legislation, ensure the necessary action to prevent any recurrence and to enable the organization to maintain proper records. 2. Scope [accident, incident, near-miss; employee, volunteer, anyone on site or involved in organization-sponsored activities] 3. Definitions [of terms] 4. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) • OSHA, NIOSH?] 5. Absence resulting from an accident [who to report to, Return-to work] 6. Accident Investigation [who investigates, what to do with resulting recommendations] 7. Forms [Names, where to find them] 8. Reportable Diseases [communicable diseases listed where?] Accident Investigation Procedures The senior staff member available at the accident scene or the first member notified should complete the appropriate investigation reporting form (accident, incident, near miss). The completed form should be given to the organization's safety committee, which will forward a copy of the report to the safety coordinator for review. When an employee or volunteer is injured: 1. Get the person professional medical attention. 2. Protect others. 3. Minimize property damage. 4. Stabilize the situation.
  • 205. 198 5. Conduct an investigation. General guidelines for investigating accidents:  Go to the scene of the accident while the facts are fresh.  Inspect and record any changed physical characteristics or conditions of the accident site  Preserve any physical evidence, such as potentially defective equipment.  Take photos to help preserve the scene (i.e., puddles on the floor, overturned storage shelves and spilled contents).  Talk to the injured person, if possible.  Talk to any eyewitnesses.  Ask simple open-ended questions, one question at a time, and attempt to have events related chronologically to ensure thorough coverage.  Distinguish a person's actual knowledge from hearsay.  Ask when, where, who, how, and what was said or done.  Avoid opinions, judgments or conclusions and be as objective as possible. Avoid commenting on the information gathered except to confirm your understanding or to clarify.  Stress getting the facts.  Do not comment on liability or fault during the investigation. Listen for clues in the conversation around you.  Unsolicited comments often have merit.  Review and finalize any notes immediately upon completion of your inspection and any interview or other communication with those involved.  Fill out the appropriate accident, incident or near-miss form, giving an accurate account of the facts.  Send the form to the safety coordinator and safety committee for their review. Accident reports Forms are used to give specific details with regards to the accidents happened in the laboratory during experiments. Accident reports contain the following details:  Name of the person injured  Date and time of the accident  Type of injury  First aid given  Action taken to prevent further accidents
  • 206. 199 Task. Accomplish the sample Accident report sample form Form No: Accident Report Form Date: Rm. No: Name: Yr/Sec: Type of Injury Cause of Injury Remedy
  • 207. 200 Replacing different Components Computer Parts Replacement When replacing computer parts and peripherals, you need to consider the following factors: 1. Compatibility of the component or part 2. Consider the component specification 3. Components form factor Compatibility of the Component When replacing computer parts you should check if it is compatible with your unit. Double check on your computer manual if the component you are replacing is compatible or not with the unit because this may lead to system crash. Component Specification This focuses on the specification of the component. Check if the voltage rating, current rating, memory size and frequency matches your computer unit. Form factor The components’ manufacturer should be considered. Check if the unit you are trying to repair or upgrade is generic or branded units. Branded units have their own set of components compatible only to their units, while genetic types can be used only to generic type of units. List of Components Commonly Replaced in a Computer System Note: Please refer to the Video for Proper Replacement of the components or parts of the computer. Memory-is technically any form of electronic storage; it is used most often to identify fast, temporary forms of storage. It is commonly called RAM (Random Access Memory). Figure25. Memory
  • 208. 201 Video Cards-also referred to as a graphics accelerator, is an item of personal computer hardware whose function is to generate and output images to a display. Figure26. Video Card Network Interface Card – is also known as LAN card. A PC interface to network cabling. It is a piece of computer hardware designed to allow computers to communicate over a computer network Figure27. LAN Card Hard disk drive – is a fixed computer storage medium Figure27. LAN Card Motherboard – is also known as the mainboard. It contains circuits that perform various functions. Figure28. Motherboard Processor – is also known as CPU or the Central Processing unit Figure28. CPU
  • 209. 202 CMOS Battery-Refers to a small memory on PC motherboards that is used to store BIOS settings. Figure29. CMOS Battery CD/DVD Drive- A DVD is an optical disc storage media format, invented and developed by Philips, Sony, Toshiba and Panasonic in 1995 Figure30. CD/DVD Sound card - is an internal computer expansion card that facilitates the input and output of audio signals Figure31. Sound Card Directions: Write your answer on your notebook 1. Give the functions of each component. 1. Memory 2. Video card 3. NIC 4. Motherboard 5. HDD 2. Factors to consider when replacing a component. 1._____________________ 2._____________________ 3._____________________
  • 210. 203 Upgrading Your Computer Components To upgrade means to change some parts with faster and better performing ones. These parts may even cost less and more powerful. Commonly Upgraded Computer Parts 1. Monitors- replace old CRT monitors to new LCD or LED monitors. 2. Optical drives- old CD-ROMs drives are commonly replaced with DVD-ROM and DVD writers.
  • 211. 204 Hard Drives- small capacity hard drives are replaced with faster and high capacity hard drives. Keyboards and mouse- keyboards and mouse are commonly replaced with optical mouse and wireless keyboards. RAM (Random Access Memory)- upgrading the computer’s memory or RAM speeds up the performance of the computer
  • 212. 205 Video cards- upgrade computer’s graphics card to improve the computer performance in terms of graphics and games. Processors- replacing the processors increase the data processing speed. Modem- installing a modem enables your computer to connect to the internet.
  • 213. 206 How to Speed up the Computer 1. Defragmenter utility: Automatically analyzes the empty disk space on the hard disk and defrag all scattered files. Figure31. Defragmenter Utility 2. Shutdown Unnecessary programs: Close all unwanted programs at the Windows start up and this will automatically increase the windows loading time and speed of the computer will also be increased. 3. Increased memory: Increasing the memory in the system will result to exceptional speed of your computer. Figure32. Increasing the memory
  • 214. 207 4. Disk Cleanup: You can delete unwanted programs and files from your computer and this will be helpful in increasing the speed. Figure33. Disk Cleanup 5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you will get the space of C drive for reusability. Figure34. Emptying the recycle bin Memory Upgrade To make your computer faster, you can upgrade its memory. Here are the steps in upgrading your computer’s memory 1. Remove the memory modules from the slot. Figure34. Removing memory module from the slot
  • 215. 208 2. In Fig 35 the notches we have marked as A are used for the ejector clip on the DIMM slot. The notches we have marked as B are used to align the memory module with the DIMM slot key C as shown in Figure 36. In Figure 36 you can see the ejector clips (D), using your finger, push these into the down position as shown in Figure 36 this allows the memory to be inserted. Figure 35. Notch A Figure 36. DIMM Slot 3. Now you are ready to install the module, ensuring the notches line up with the keys gently but firmly push the memory into the slot until it is seated fully(see Fig 37 the ejector clips should rise to the vertical position as shown in Fig 38). 4. Now your memory is installed. Be sure you have not loosened any cables while working and also ensure that the memory module is fully seated and the ejector clips are in the vertical position. Figure 37. Ejector clips Figure 38. Ejector clips in vertical position Video card Upgrade Installing the video card Next, take the video card (hold it by the edges) and line it up with the slot paying careful attention to the alignment notch. When it is aligned correctly, press gently but firmly until the card is seated fully and evenly into the slot (see fig 39).
  • 216. 209 Figure39. Video card seated fully and evenly on a slot When you are happy that the card is firmly in place, insert the fixing screw (fig 40) and check to make sure you have not loosened anything during installation. Replace the case cover and reconnect the mains power. Figure40. Inserting fixing screw When you reboot your machine Windows (or other OS) should find the card automatically, it may then ask you to insert the disk/CD that came with your video card, insert the CD and follow the on-screen instructions to install the video card driver. Hard Drive Upgrade The first thing to do (after removing the case covers) is to locate the drive bay where the hard drive will go (see fig 41 below). Figure41. Locate the drive bay
  • 217. 210 The next step is to attach the IDE and power cables. In figure 42 below you can see a standard IDE Cable, note there are three (3) connections (notice the difference in distance between the connectors). Connection A plugs into the motherboard and then the slave and master connections are used for IDE devices such as hard drives, if you are only installing one drive or the new drive is to be the master then use the master connector, if the drive is to be the slave then use the slave connector. The IDE cable will be marked down one side with a red or black strip, this denotes Pin 1, match this with the Pin 1 indicator on the back of the hard drive. The power cable you will find in your case is attached to your power supply; you can see an example below in figure 43. Figure42. Standard IDE Cable Figure43. Power Cable
  • 218. 211 Basic Network Errors If your network connection is not configured properly or suffers a technical failure, you will often see some error message generated and displayed on your screen. These messages give helpful clues to the nature of the issue. Use this list of the common network-related error messages to help troubleshoot and fix networking problems. Network Problem error Messages Network problem error message 1 Read the message in the box. Box running software 14.8 and above: No network adapter. (N01) Please make sure that your network adapter is securely plugged into a USB port on the back of the box. Box running software 14.7 and below: A network adapter was not detected. (N01) Please make sure that your network adapter is securely plugged into a USB port on the back of the box. Possible solution for error message 1 Quick Steps 1. If you have a TiVo Wireless G or N Adapter: Remove the adapter from the TiVo box for 15 – 60 seconds and reconnect. Then force a connection to the TiVo service. 2. Try another USB port (when applicable). 3. If these steps have not resolved your issue, see Detailed Steps below for additional assistance.
  • 219. 212 Network problem error message 2 Read the message in the box. Box running software 14.8 and above: Problem with router. (N03) It might be temporarily out of IP addresses. Wait a few minutes, and then try connecting again. If the DHCP server is part of your home network, try increasing the number of IP addresses it can assign. Box running software 14.7 and below: The DHCP server was unable to supply an IP address.(N03) It might be temporarily out of IP addresses. Wait a few minutes, and then try connecting again. If the DHCP server is part of your home network, try increasing the number of IP addresses it can assign. Possible solution for error message 2 QuickSteps 1. Power cycle your network, then force a connection to the TiVo service. 2. Renew the DHCP lease on your router. NOTE: Please contact your router manufacturer if you are unsure how to do this. 3. If these steps have not resolved your issue, see Detailed Steps below for additional assistance. Network problem error message 3 Read the message in the box: Box running software 14.8 and above: Problem with network settings. (N05) Change your network settings to use a different (and unused) IP address. Box running software 14.7 and below: The specified IP address (<IP Address>) is already in use by another device on the network. (N05) Change your network settings to use a different (and unused) IP address.
  • 220. 213 Possible solution for error message 3 Network problem error message 4 Read the message in the box: Box running software 14.8 and above: Wireless Network Not Found. (N06) Box running software 14.7 and below: Could not connect to the wireless network (<Network Name>). (N06) Possible solution for error message 4 QuickSteps 1. Verify your TiVo box has the latest software version to support the encryption used by your router. 2. Make sure your wireless network is operational and you have sufficient signal strength where the box is located. See How to configure network settings on your TiVo box for instructions. 3. Verify you entered the correct the correct name of your network and/or the correct encryption key or password. 4. Check for possible interference sources nearby, such as microwave ovens, cordless phones, etc. 5. Power cycle your network devices, then force a connection to the TiVo service. 6. Move your wireless adapter to improve signal strength. 7. Contact your router manufacturer to determine whether you need to update your router firmware. 8. If these steps have not resolved your issue, see Detailed Steps below for additional assistance. QuickSteps 1. If the box is using a static IP address, then it will need to be changed. See How to configure network settings on your TiVo box for instructions. 2. Power cycle your network devices, then force a connection to the TiVo service. 3. Renew the DHCP lease on your router. NOTE: Please contact your router manufacturer if you are unsure how to do this.
  • 221. 214 Network problem error message 8 Read the message in the box: Box running software 14.8 and above: Adapter not set up. (N08) Select Change network settings to begin setting up your network adapter. Box running software 14.7 and below: Your network adapter has not been set up for use with the box. (N08) Select Change network settings to begin setting up your network adapter. Possible solution for error message 8 QuickSteps 1. TiVo Wireless N adapter: Verify that your adapter has been set up properly. Please see TiVo Wireless N Adapter Setup for instructions. 2. Verify you entered the correct name of your network and/or the correct encryption key or password. 3. Verify your wireless adapter is compatible with your TiVo box. 4. Try another USB port (when applicable). 5. If these steps have not resolved your issue, see Detailed Steps below for additional assistance. Common Network Errors and Solutions Network Errors Possible Solutions Network problem is not accessible Message: "....is not accessible. You may not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. The semaphore timeout period has expired." 1. Make sure no any firewall running. 2. Make sure you have created the same workgroup, and the same username for logging on a remote computer. 3. Check user's rights. 4. You may want to enable guest account on windows. 5. if you are using simple file sharing, you may try to disable it and re-share the drive manually. 6. If it is mixed OS network, enable NetBIOS over TCP/IP. 7. Make sure the Computer Browser service is started if all computers are w2k/xp. 8. Stop Computer Browser service on wwin9x, ME and NT if this is a mixed OS network. 9. Cache credential by using net use computernameshare /user:username command (it is better to have the username logon shared computer). 10. If you have tried enabling netbios over tcp/ip but doesn't work, you may try to load netbeui (loading netbeui may slow your network). 11. Make sure the server service is running.
  • 222. 215 12. Still need help, contact consultant at http://hidev.com/contactus.asp for the tech support. Network problem not available. The server is not configured for transactions" 1. Type command "net share" on the shared computer. If there is not a share named "IPC$" in the share list, use the command "net share ipc$" to create it. An extended error has occurred" or "Access Denied" Symptoms: When mapping a network drive using net use or using the net view command to view a different computer in the domain, you may receive: "An extended error has occurred" or "Access Denied" error messages. 1. This issue may occur if the workstation doesn't synchronize the time with the server. After verifying that basic network connectivity exists, you can force time synchronization on the client computer manually. To do this, run net time /domain /set command. 2. Make sure you have granted enough licenses for clients accessing. “Computer name is not accessible. No permission to access the resources" 1. Are you sure the logon user has permission to the shared folder? 2. Have you tried to logon using the same user name and password of the accessed computer? 3. The last and risky one, if you enable guest account in computer, can you access now? "Multiple connections to the server or shared resource are not allowed" Symptom: when attempting to join a domain, you may receive "Multiple connections to the server or shared resource are not allowed. Please disconnect all previous connections to the server or shared resource and try again." 1. Try using net use /d from a command to clear all your mapped connections before joining the domain. You can also disconnect the mapped drive in Windows Explorer by right-click the mapped drive and select disconnection.
  • 223. 216 "Network path not found" in a domain network 1 SYMPTOMS: When trying to join a domain by using he NetBIOS domain name, you are successful but not the FQDN and you may receive one of the following error messages: 1) The following error occurred attempting to join domain "example.com": The network location cannot be reached. For information about network troubleshooting, see Windows Help. 2) Network path not found. 1. This issue may occur if the TCP/IP NetBIOS Helper Service is not running on the client computer. To start the TCP/IP NetBIOS Helper Service, go to MMS>Services, double-click TCP/IP NetBIOS Helper Service. "Network path not found" in a domain network 2 1. You can find some computer browser errors on the DNS server. Disable one of two NICs will work. More resolutions can be found in browser Issue page. "Network path not found" in a workgroup network - error 53 1. Make sure that File and Printer Sharing is enabled on the shared computer. Make sure that shared machine has something shared. 2. Make sure that you have created the same workgroup and logon the same username Make sure that you have enabled NetBIOS over TCP/IP if this is a mixed OS network. "Not accessible. You may not have permission to use this network resource" Symptom: Your peer- to-peer network, may receive the following 1. Enable NetBIOS over TCP/IP on one or more computers in the workgroup. To do that, go to properties of Local Area Connection>properties of Internet Protocol (TCP/IP)>General> Advanced>WINS, check Ena ble NetBIOS over TCP/IP (If you have a DHCP- assigned IP address, select Use NetBIOS setting from the DHCP server ).
  • 224. 217 error when you double- click My Network Places/Computers Near Me: <Workgroup Name> is not accessible. You may not have permission to use this network resource. 2. Make sure the Computer Browser service is started. "Not enough server storage is available to process this command." error. SYMPTOMS: When accessing shares on a server from a client, you may receive "Not enough server storage is available to process this command." error. You may receive this message and Event ID: 2011 after you install Norton Antivirus for Windows. 1. The registry value IRPstackSize may be not explicitly present. To increase the value of the parameter, go to the key HKEY_LOCAL_MACHINESYSTEMCurrentContro lSetServices LanmanServerParameters. If the key is not present, choose Add Value in the Registry Editor. The Value Name should be IRPStackSize and the Data Type is REG_DWORD. 2. Remove any unnecessary entries from this value in the registry, HKEY_LOCAL_MACHINESystemCurrentControlS etServicesLanmanServerParametersNullSession Pipes. 3. Disable Norton antivirus to see if that will fix the problem. "No logon server available" Symptoms: you can ping the server by ip and name but can't map the shared drive by using net use ip or servern ame. If you try, you may receive the "No logon server available". This sounds like cache credential issue. 1. Make sure the computers in the same network, the same workgroup/domain and have created the same username. 2. Use net use servernamesharename password /user: username to cache the credential. Still need help, contact consultant at http://hide v.com/contactus.asp for the tech support. 1. Disable ICF if you don't need it. 2. Open port # (UDP and TCP) from 135 through 139 and/or 445. to do this, go to the properties of the connection>Advanced>ICF>Settings>Services. For Microsoft file sharing SMB: add (UDP and TCP)
  • 225. 218 "System error 6118 has occurred. The list of servers for this workgroup is not currently available." Symptoms: When using the net view computername comm and, you receive the following error message: System error 6118 has occurred. The list of servers for this workgroup is not currently available. ports from 135 through 139. For direct-hosted SMB traffic without network basic input/output system (NetBIOS) uses port (TCP and UDP) 445. Note: the external and internal port numbers should be identical. "The password is incorrect. Try again" 1. You need to setup every user that needs access to the shared folder on every computer they have to connect to. Then give the proper user proper permission to the shared folder. 2. Logon the same user and password. 3. As always, you can try to enable a guest account on the accessed machine. "There are no entries on the list" Symptom: when using net view remotecomputer command, you may receive "There are no entries on the list". And you may have a problem to access the remote computer. 1. If there are no file or print shares on the computer, the net view command displays a "There are no entries in the list" message. So, make sure there are file or print shares on the computer. Or to use net share command to check sharing status. 2. Make sure no firewall running because the firewall may block sharing. "Unable to access Computers near Me" or "Workgroup is not accessible" errors 1. NetBIOS over TCP/IP. To do that, go to the properties of TCP/IP>Advanced>WINS. If you are using a static Internet Protocol (IP) address, click 2. Enable NetBIOS over TCP/IP. If you have a DHCP- assigned IP address, click Use NetBIOS setting from the DHCP server. No Master Browser or too many browsers may cause this issue. Check Browser issue.
  • 226. 219 "Unable to Browse Network" Symptom: When you attempt to browse your network by opening Entire Network in My Network Places/Network Neighborhood, you may receive the following error message: Unable to Browse Network. 1. Have you loaded the NIC or is it working? 2. Have you loaded common protocol, TCP/IP? 3. Does the Computer browser work? 4. Have you enable file and printer sharing in the accessed computer? 5. Is the workstation service running?
  • 227. 220 Award BIOS / CMOS Setup This is the BIOS setup for Award BIOS v6.00PG. If you have a different version of the Award BIOS there would be a lot of similarities. If your BIOS are AMI or Phoenix then the common BIOS features would have some similarities. Whatever BIOS you have, this setup guide should give you an idea about how to setup BIOS. Please note that setting up BIOS incorrectly could cause system malfunction, therefore it is recommended that you also follow the BIOS guide provided on your motherboard manual. If you decide to make changes to certain options it is safer to make a note of what you have changed. Then restart the system to see how it performs. If the system behaves abnormally or becomes unstable you can revert back to your previous settings. Soft menu III Soft menu III is where you can setup up the CPU without setting jumpers on the motherboard. You can setup the CPU simply by selecting the speed i.e. Pentium III 750 from the list. This ensures that the CPU bus, multiplier, voltage etc, is correctly set for that particular CPU. However you can manually setup each feature if required. Once you have finished with the setup press ESC to return the previous menu. Figure44. BIOS CMOS Setup Utility
  • 228. 221 Standard CMOS Features Here you can setup the basic BIOS features such as date, time, type of floppy etc. Use the arrow keys to move around and press enter to select the required option. You can specify what IDE devices you have such as Hard drive, CD-ROM, ZIP drive etc. The easiest way to setup the IDE devices is by leaving it set to auto. This allows the BIOS to detect the devices automatically so you don't have to do it manually. At the bottom, it also displays the total memory in your system. Figure45. Standard CMOS Feature Advanced BIOS Features As you can see from figure 3, there are numerous advance settings which you can select if required. For most cases leaving the default setting should be adequate. As you can see the first boot device is set to floppy. This ensures that the floppy disk is read first when the system boots, and therefore can boot from windows boot disk. The second boot device is the Hard disk and third is set to LS120. If you want to boot from a bootable CD then you can set the third boot device to CD/DVD-ROM.
  • 229. 222 Advanced Chipset Features Here you can setup the contents of the chipset buffers. It is closely related to the hardware and is therefore recommended that you leave the default setting unless you know what you are doing. Having an incorrect setting can make your system unstable. If you know that your SDRAM can handle CAS 2, then making changes can speed up the memory timing. If you have 128MB SDRAM then the maximum amount of memory the AGP card can use is 128MB. Figure47. Advance Bios Chipset Figure46. Advance Bios Feature
  • 230. 223 Integrated Peripherals This menu allows you to change the various I/O devices such as IDE controllers, serial ports, parallel port, keyboard etc. You can make changes as necessary. Figure48. Integrated Peripherals Power Management Setup The power management allows you to setup various power saving features, when the PC is in standby or suspend mode. Figure49. Power Management setup
  • 231. 224 PnP/PCI Configurations This menu allows you to configure your PCI slots. You can assign IRQ's for various PCI slots. It is recommended that you leave the default settings as it can get a bit complicated messing around with IRQ's Figure50. Pnp /PCI Configurations PC Health Status This menu displays the current CPU temperature, the fan speeds, voltages etc. You can set the warning temperature which will trigger an alarm if the CPU exceeds the specified temperature. Figure51. PC Health Status
  • 232. 225 Load Fail-Safe Defaults If you made changes to the BIOS and your system becomes unstable as a result, you can change it back to default. However if you made many changes and don't know which one is causing the problem, your best bet is to choose the option "Load Fail Safe Mode Defaults" from the BIOS menu. This uses a minimal performance setting, but the system would run in a stable way. From the dialog box Choose "Y" followed by enter to load Fail-Safe Defaults. Figure52. Load fail-safe defaults Load Optimized Defaults Like the Fail-Safe mode above, this option loads the BIOS default settings, but runs the system at optimal performance. From the dialog box Choose "Y" followed by enter to load Optimized Defaults. Figure53. Load optimized Set Password To password protect your BIOS you can specify a password. Make sure you don't forget the password or you cannot access the BIOS. The only way you can access the BIOS is by resetting it using the reset jumper on the motherboard. Figure54. Load optimized
  • 233. 226 Save and Exit Setup To save any changes you made to the BIOS you must choose this option. From the dialog box choose "Y". Figure55. Save to CMOS and EXIT Exit without Saving If you don't want to save changes made to the BIOS, choose "N" from the dialog box. Figure56. Quit Without Saving
  • 234. 227 Task 1. The BIOS settings in the CMOS memory have become corrupted or damaged Task: Check the CMOS battery and replace if needed. Procedure: 1. Power on your desktop pc and wait for the POST 2. Read the Power on self-test report and do the necessary procedure to solve the problem. 3. Boot up your pc into BIOS setup. 4. Look for incorrect or changing time settings. A noticeable symptom is an invalid time showing within the operating system. This symptom is confirmed if time sets after the computer system is restarted. Under these circumstances, the CMOS battery should be replaced. Procedure: On how to replace the CMOS Battery. 1. Locate your CMOS battery 2. Obtain battery information 3. Removing the battery 4. Insert the new battery 5. Enter CMOS values You will be assessed using the following criteria CRITERIA Evaluation Passed Failed 1. Sequence of steps in CMOS diagnosing procedure is followed. 2. Sequence of steps for replacing CMOS battery is followed carefully. 3. Safety precaution is observed. Remarks
  • 235. 228 Practicing TCP/IP Networking Skills While connected to the Internet or another TCP/IP network, answer these questions: 1. What is your current IP address? 2. Release and renew your IP address. Now what is your IP address? 3. Are you using dynamic or static IP addressing? How do you know? 4. What is your adapter address for this connection? 5. What is your default gateway IP address? 6. What response do you get when you ping the default gateway? Task 2. Investigating Verizon FiOS Verizon (www.verizon.com) is currently offering an alternative to DSL and cable modem for broadband Internet access. FiOS is a fiber-optic Internet service that uses fiber-optic cable all the way to your house for both your residential telephone service and Internet access. Search the Web for answers to these questions about FiOS: 1. Give a brief description of FiOS and how it is used for Internet access. 2. What downstream and upstream speeds can FiOS support? 3. When using FiOS, does your telephone voice communication share the fiber-optic cable with Internet data? 4. What does Verizon say about FiOS cabling used for television? 5.Is FiOS available in your area?
  • 236. 229 Hardware Upgrade Tool, Materials, and Equipment Tools Philip Screw Deriver Anti-static wrist strap Anti-static mat Equipment Network Card Network Card Upgrade Given the tools and materials, upgrade your computer by installing a network card. You will be assessed using the following criteria CRITERIA Evaluation Passed Failed 1. Safety precautions are observed. 2. Appropriate tools are used in upgrading 3. Necessary improvement and adjustment are done in terms up upgrading. Remarks
  • 237. 230 LESSON 4: TEST SYSTEMS AND NETWORKS Testing Computer System Is your PC healthy? Don't be too sure. Think back to when you heard a kerklunk sound coming from the hard drive. Or maybe you remember the last time your Internet connection was down. The best way to find out what's wrong is to take a proactive approach: Check under your PC's hood with the following mostly free diagnostic tools, and see if anything is amiss--before disaster strikes. Three Major Components of Computer System:  Hardware  Software  Firmware Test Your Hardware Checking your computer hardware and its peripherals 1. Computer Monitor and its peripherals  Monitor and interface cables  Video card  Monitor power cable Interface cables
  • 238. 231 2. Keyboard and Mouse  Keyboard connector  Mouse Connector 3. I/O port and devices  Connection between the I/O port and the peripheral device  A faulty cable between the I/O port and the peripheral device  A faulty peripheral device  Incorrect settings in the System Setup program  Incorrect settings in the system's configuration files  Faulty I/O port logic on the system board Video cards Monitor power cable Mouse connector Keyboard connecter
  • 239. 232 4. Power supply  Power cord  Fuse I/O circuit board Parallell ports Power supply Fuse Power plug
  • 240. 233 Testing Your Software Check the different software installed in the computer. 1. Operating system  Run live updates for your operating systems to get the latest patches and protection for your OS.  Run registry scanners to check the OS registry configuration 2. Application Software  Check for live updates
  • 241. 234 3. Anti-virus software  Run anti-virus program  Check for virus signature updates  Check for spyware updates Test Your Firmware Firmware- is a combination of hardware and software integrated on a chip. To test the firmware Check for the correct configuration can accomplish this by configuring the BIOS in the computer
  • 242. 235 Sample Accomplishment Report Form Task to be accomplished Status Hardware component testing Working properly Not working properly Software testing Status Working properly Not working properly
  • 243. 236 Error Beep codes When a PC is first switched on or reset it performs a special diagnostic test called a POST (Power-On Self Test), to check all components in the PC, the POST program sends out a signal to each device initializing each device's built-in self test procedure. The POST test is a two stage process: 1. First, it will check all the basic components including among other things the system clock, the processor, RAM, the keyboard controller and the Video 2. After the video has been tested the BIOS will then indicate any errors encountered by displaying either a numeric code or a text message on the screen. When a device fails the first part of the POST, the BIOS will send a series of beeps from the PC's speaker (internal) to inform the PC user that there is a problem these beeps are coded allowing the user to diagnose the troublesome component. When the POST has been completed successfully, the PC will make a short beep to let the user know everything is as it should be. Three (3) major brands of BIOS chip 1. AWARD BIOS 2. Phoenix BIOS 3. AMI BIOS
  • 244. 237 Each type of BIOS chip has it own error code AMI BIOS ERROR BEEP CODES Indicator Error message Solution 1 Beep 2 Beeps 3 Beeps 4Beeps 5Beeps 6 Beeps 7 Beeps 8 Beeps 9 Beeps 10 Beeps Memory refresh failure Memory parity error Memory read/write error Motherboard timer not functioning Processor error Gate A20/keyboard controller failure Processor exception interrupt Display memory read/write failure ROM checksum error CMOS shutdown read/write error Bad cache memory Check memory Check memory Check memory Replace motherboard Replace processor Replace motherboard Replace processor Replace video card Replace BIOS chip/Motherboard Replace BIOS chip/Motherboard Replace cache memory
  • 245. 238 Phoenix BIOS ERROR BEEP CODES Phoenix BIOS beep codes are a series of beeps separated by a pause, for example: beep --- beep beep --- beep --- beep beep would be 1-2-1-2 Indicator Error message Solution 1-1-4-1 1-2-2-3 1-3-1-1 1-3-1-3 1-3-4-1 1-3-4-3 1-4-1-1 2-1-2-3 Cache error BIOS ROM Checksum DRAM test rate Keyboard controller test RAM failure RAM failure data bits of low memory bus RAM failure data bits of high memory bus ROM copyright notice Test for unexpected interrupt Check cache memory Check BIOS ROM Check DRAM Check keyboard controller Check memory Check memory Check memory Check ROM
  • 246. 239 AWARD BIOS ERROR BEEP CODES Indicator Error message Solution One long beep and two short beeps Two short beeps Video error Non-fatal error Replace video card Reset RAM, Check other components. Directions: Answer the following questions and place your answers on your answer sheet. 1. What does the acronym POST stand for? 2. What are the Three Major Brand of BIOS chips 3. Identify the following error codes:  1-2-2-3  1-3-4-1  2-1-2-3  1-1-4-1  1-3-1-1
  • 247. 240 Directions: Test I. Identify the tools presented below and write your answer in separate paper. 1. 2. 3. 4. 5.
  • 248. 241 Directions: Test II. List down at list Five (5) common problem and solution. Use a separate sheet of paper if needed. Task 1.Understanding Hardware Documentation Obtain the manual for the motherboard for your PC. (If you cannot find the manual, trydownloading it from the motherboard manufacturer’s Web site.) Answer these questions: 1.What processors does the board support? 2.What type of RAM does the board support? 3.What is the maximum RAM the board can hold? 4.If the board has a PCIe slot, what version of PCIe does the board use? 5.What chipset does the board use? Task 2. Teaching Yourself About Windows Meeting Space Using the Windows Help and Support window, Search for information on Windows Meeting Space. Describe the tool. When would you want to use it? What can you do with Windows Meeting Space? Set up and test the tool with a friend on a network connection.
  • 249. 242 Task 1. Testing a Computer Unit Equipment, Tools, and Materials: Tools Multi-tester Screw driver Equipment Computer unit Monitor Keyboard and mouse Power cables Materials Bond paper Ruler and Pencil Hardware Testing and Documentation Directions: Test the following computer peripherals and equipment with the use of the tools provider. Document your testing with the use of an accomplishment form. Assigned Task Condition Hardware component testing Working properly Not working properly Computer monitor Power supply
  • 250. 243 Keyboard Mouse You will be assessed using the following criteria CRITERIA Rating 1. Sequence of steps in testing is followed. 20% 2. Safety precautions are observed. 20% 3. Appropriate tools are used in testing. 30% 4. An accomplishment report is created. 30% Total 100% Task 2.Identify Error codes Equipment, Tools, and Materials: Tools Screw drivers Anti-static wrist strap Equipment Computer unit Memory Error Codes
  • 251. 244 Given the tools and equipment, identify the memory error code by removing the module in the computer unit You will be assessed using the following criteria Evaluation: CRITERIA Rating 1. Observance of safety precautions. 30% 2. Appropriate tools are used in testing. 30% 3. Identifying the error code. 40% Total 100%
  • 252. 245 POST ASSESSMENT Do the Activity on More Security for Remote Desktop When Enzo travels on company business, he finds it’s a great help to be able to access his office computer from anywhere on the road using Remote Desktop. However, he wants to make sure his office computer as well as the entire corporate network is as safe as possible. One way you can help Enzo add more security is to change the port that Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses port 3389, but if you change this port to a secret port, hackers are less likely to find the open port. Search the Microsoft Knowledge Base articles (support.microsoft.com) for a way to change the port that Remote Desktop uses. Practice implementing this change by doing the following: 1. Set up Remote Desktop on a computer to be the host computer. Use another computer (the client computer) to create a Remote Desktop session to the host computer. Verify the session works by transferring files in both directions. 2. Next, change the port that Remote Desktop uses on the host computer to a secret port. Print a screen shot showing how you made the change. Use the client computer to create a Remote Desktop session to the host computer using the secret port. Print a screen shot showing how you made the connection using the secret port. Verify the session works by transferring files in both directions. 3. What secret port did you use?
  • 253. 246 Instruction:  Read each of the questions in the left-hand column of the chart.  Place a check on the column that indicate your answers I Can YES NO Plan and prepare work to ensure occupational health and safety (OHS) policies and procedures are followed Obtain materials, tools, equipment and testing devices needed to on form with job requirements Interpret work instructions according to job requirements Obtain computer components/devices/systems and determines its location prior to installation Install equipment/devices/systems in accordance with job requirements Check/Test devices/systems and/or installations to determine the conformity to job requirements. Check computer systems and networks for configuration in accordance with specifications and requirements Diagnose fault or problem in the computer systems and networks in line with standard operating procedures (SOP) Configure the identified systems and networks based on specifications and job requirements Inspect and test configured computer systems and networks in conformity with manufacturer's instructions/manual Correct/Adjust components or parts of computer systems and networks in accordance with job requirements Test computer systems and networks to ensure safe operation Perform scheduled/periodic maintenance in accordance with manufacturer's requirements Make needed repairs/replacements in accordance with established procedures, when necessary Document tasks undertaken in accordance with SOP Clean and clear worksite of all surplus/excess materials in accordance with company SOP
  • 254. 247 Summative Test I. Identify what computer error is illustrated on the following situations. __________1. The LED indicator of your monitor is in steady orange color. _________ 2. When you open your PC, nothing shows up in your monitor and the LED indicator of your monitor is flashing in yellow color. __________3. When you open your PC it will show the processor brand and/or the motherboard brand but doesn't continue. Usually this error will result to system restart over and over again. __________4.This also happens even if you try disconnecting your computer set from the internet. This is what we called aftershock virus which will continue to run even if internet is disconnected. __________5. The computer opens up then boots but when the operating system loads it doesn't continue and it will take a lifetime if you're going to wait for it to load. __________6. This happens even if you try installing the hardware. When you restart your set it will happen again. __________7. When you try going to safe mode all you will see is a list of files in Command prompt style. __________8. Upon loading he operating system, you will hear a loading sound and then the sound stops, when you try running an audio file, no sound will be heard __________9.This will happen only in standby mode, when you move your mouse or type something, your system will automatically restart and the worst part is it will delete a file at random. __________10. Just like the mouse problem, when you open a program that will take the whole screen like for example a game and/or a program applications, when you close it, it will cause your system to restart.
  • 255. 248 II. Choose the letter of the best answer: 1) These are moderately dangerous types of errors among those that can pop up on your PC. System errors are caused by malfunctioning hardware components, corrupted operating system modules, etc. a. System error C. Stop errors b. Runtime errors D. Device managers errors 2) These are caused by corrupted or malfunctioning system files or software executables. Most runtime errors cause the application that caused it to shut down. However, more serious runtime errors may cause the system to become unstable or unresponsive, leaving you with no choice but to reach for the Reset button. a. System error C. Stop errors b. Runtime errors D. Device managers errors 3) These are caused by corrupted hardware, especially malfunctioning RAM modules and bad sectors on hard disks. Stop errors can be difficult to resolve at times. a. System error C. Stop errors b. A Runtime errors D. Device managers errors 4) These are usually caused by corrupted driver files or malfunctioning hardware components. In case of the former cause, the problem is usually solved simply by reinstalling or updating the drivers. However, the latter cause can often be solved only by replacing hardware components. a. System error C. Stop errors b. B. Runtime errors D. Device managers errors 5) These are caused by malfunctioning hardware components, and are characterized by short beep sounds from the tiny internal speaker of your motherboard. POST code errors occur when you press the power button to turn on your PC.. a. System error C. Application errors b. B. Runtime errors D. Post Code errors 6) These can be caused at any point of time. As the name suggests, these are caused by applications while those are running. These are usually caused by glitches in the program code itself. These are usually resolved by updating the program to its latest version. a. System error C. Application errors b. Browser status errors D. Post Code errors 7) These are caused by problems faced by browsers when trying to access a website. These can be caused by misplaced web pages in the server of the
  • 256. 249 website itself, or due to connection problems. For instance, a 404 error would indicate that the browser is trying to access a webpage that does not exist in the specified location. a. System error C. Application errors b. Browser status errors D. Post Code errors 8) is define as the flow of electron or electric current. It is an invisible form of energy that can be transform into other form of energy like heat light and mechanical. a. electricity C. Proton b. atom D. Post Code errors 9) the amount of pulling force that makes the electron flow. Also known as potential difference or EMF(electromotive force). a. electricity C. Current b. resistance D. Voltage 10)a type of circuit that has an open path for current to flow. It means that current cannot flow in open circuit. a. Open circuit C. Current circuit b. resistance D. close circuit III. Match Column A with Column B Column A Column B 1. Used for installing and removing screws in the computer unit. A. Screw drivers 2. Used for picking small parts in the computer unit. B. Pliers and tweezers 3. Used for eliminating electrostatic discharge in the work area. C. Soldering iron 4. Primarily used for connecting terminals in the power supply and circuit board with the use of a soldering lead. D. Lens cleaner 5. It is a paste used for heat dissipation of the processor. E. Anti-static wrist strap, mat and spray 6. A device used for cleaning optical media, such as DVD-ROMS and CD-writers. F. Thermal paste 7. A device used to crimp the RJ45 connector to the UTP cable G. LAN Tester 8. A device used for testing the network connection H. Crimping tool I. Systems Tool Box
  • 257. 250 IV. Arrange the following steps in verifying the correct protocols are installed on the computer. _____Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not click on the PPP or Dial-Up adapter, click on the network card adapter. _____Select the option to specify an IP address _____Click Start / Settings / Control Panel _____Double-click the Network icon _____In the TCP/IP properties click the IP address tab _____When specifying these values, the computers on the network must all have the same Subnet Mask and have a different IP Address. For example, when using the above values on one computer you would want to use an IP address of 102.55.92.2 on another computer and then specify the same Subnet Mask. _____Enter the IP address and Subnet Mask address, an example of such an address could be: IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192 V. List down at list Five (5) common computer problems and solutions. Common Computer Problems Solutions 1. 2. 3. 4. 5.
  • 258. 251 KEY TO CORRECTIONS Test I 1. No Video Output 2. No Video Output 3. Doesn't Boot 4. Lots of pop up windows showing on standby mode 5. Never Ending Loading of Operating system 6. Lots of hardware installation windows appear 7. Safe mode doesn't work 8. Sound on/off error 9. Keyboard and mouse system restart 10. Application causes system to restart Test II 1. A 2. B 3. C 4. D 5. D 6. C 7. B 8. A 9. C 10. A Test III 1. A 2. B 3. E 4. C 5. F 6. D 7. H 8. G Test IV 3, 5, 1, 2, 4, 7, 6 Test V Answers may vary
  • 259. 252 GLOSSARY OF TERMS Computer System - The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes. Configuration - The makeup of a system. To "configure" is to choose options in order to create a custom system. "Configurability" is a system's ability to be changed or customized. Connector - Any plug and socket that links two devices together. Although taken for granted and rarely in the limelight, connectors are a huge industry, and the quality of these components is more critical than most people would imagine. When not designed or constructed properly, they often become the weakest element in an electronic system. Display Adapter - A plug-in card in a desktop computer that converts the images created in the computer to the electronic signals required by the monitor. It determines the maximum resolution, refresh rate and number of colors that can be displayed, which the monitor must also be able to support. On many PC motherboards, the display adapter circuits are built into the chipset, and an AGP or PCI card is not required. ESD (Electro Static Discharge)- A small amount of static electricity that can destroy small parts of your computer. Expansion Board - A printed circuit board that plugs into an expansion slot and extends the computer's capability to control a peripheral device. All the boards (cards) that plug into a computer's bus are expansion boards, such as display adapters, disk controllers, network adapters and sound cards. Expansion Bus - An input/output bus typically comprised of a series of slots on the motherboard. Expansion boards (cards) are plugged into the bus. ISA and PCI are the common expansion buses in a PC. Graphical User Interface - A graphics-based user interface that incorporates movable windows, icons and a mouse. The ability to resize application windows and change style and size of fonts are the significant advantages of a GUI vs. a character-based interface. GUIs have become the standard way users interact with a computer, and the major GUIs are the Windows and Mac interfaces along with Motif for Unix and the GNOME and KDE interfaces for Linux. Motherboard - Also called the "system board," it is the main printed circuit board in an electronic device, which contains sockets that accept additional boards. In a desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP slot, memory sockets and controller circuits for the keyboard, mouse, disks and printer. It may also have built-in controllers for modem, sound, display and network,
  • 260. 253 obviating the need to plug in a card. A laptop motherboard typically has all peripheral controllers built in. Operating System - The master control program that runs the computer. The first program loaded when the computer is turned on, its main part, the "kernel," resides in memory at all times. The operating system sets the standards for all application programs that run in the computer. The applications "talk to" the operating system for all user interface and file management operations. Also called an "executive" or "supervisor," an operating system performs the following functions. Peripheral -Any hardware device connected to a computer, such as a monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse Server - A computer system in a network that is shared by multiple users. Servers come in all sizes from x86-based PCs to IBM mainframes. A server may have a keyboard, monitor and mouse directly attached, or one keyboard, monitor and mouse may connect to any number of servers via a KVM switch. Servers may be also be accessed only through a network connection as well. Sound Card - Also called a "sound board" or "audio adapter," it is a computer expansion board that records and plays back sound, providing inputs from a microphone or other sound source and outputs to speakers or an external amplifier. The de facto standard for sound card compatibility in PCs is Creative Labs' Sound Blaster. User Interface - All graphics based today, the user interface includes the windows, menus and method of interaction between you and the computer. Prior to the Mac, Windows and Motif (Unix) interfaces, all interaction was based on commands entered by the user. Operating systems may support optional interfaces and allow a new shell, or skin, to be used instead. Virus - Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.
  • 261. 254 REFERENCES Books and Articles and Printed Materials: Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, IN 46256 Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, IN 46256 Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, IN 46256 Ronaldo V. Ramilo and Deover M. Pasco , K to 12 Basic Education Curriculum- Technology and Livelihood Education Learning Module – Computer Hardware Servicing Jethro Campos , et.al , Competency – Based Learning Materials for Strengthening Technical Vocational Education Program Electronic Resources: http://www.buzzle.com/articles/computer-memory-types.html Computer Memory Types http://www.athropolis.com/popup/c-comp2.htm Measurements for Memory & Storage http://www.ustudy.in/ce/hard/u1 Fundamentals of PC repair http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20- %20With%20Oral%20Questioning_0.pdf Occupational Health and Safety Precautions http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp Puzzles for Activities http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_v 40_Chapter2.pdf Occupational Safety Precautions http://www.youtube.com/watch?v=tfKe8PPI2zs&feature=related Conversion of Decimal N umber to Binary http://www.youtube.com/watch?v=s7M6_VeDhJE&feature=related http://www.youtube.com/watch?v=6N7bqBsFL0w-
  • 262. 255 Computer Hardware Basics http://www.wikihow.com/Install-Computer-Hardware- How to install Computer Hardware http://www.directron.com/howtoupsys.html- How to install Computer components en.wikipedia.org http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20 10/ProperToolSelection.pdf Tool Selection http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics