Professional Documents
Culture Documents
Grade 9 CHS LM Module
Grade 9 CHS LM Module
Grade 9 CHS LM Module
Learners Material
GOVERNMENT PROPERTY
NOT FOR SALE
ALLOTTED TO
Department of Education
Republic of the Philippines
Computer Hardware Servicing Grade 9
Learners Material
First Edition, 2013
ISBN: ___________
Republic Act 8293, section 176states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Published by the Department of Education
Secretary: Br. Armin A. Luistro FSC
Undersecretary: Dina S.Ocampo, Ph.D.
Assistant Secretary: Lorna Dig Dino, Ph.D.
Development Team of the Learners Material
Authors: Rosalie P. Lujero and Ronaldo V. Ramilo
Editors: Joemar A. Garraton
Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas
Illustrator and Layout Artists:
Subject Specialist: Owen M. Milambiling
Management Team: Dr.Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Marias,
Dr. Jose D. Tuguinayo, Jr.
ii
TABLE OF CONTENTS
Guide Questions .
Pre-Assessment .
Self-Assessment
Lesson 1 .
Firm Up .
Deepen ...
10
Transfer ..
12
Post-Assessment .
14
Feedback ..
16
18
19
20
22
23
Firm Up ..
24
Deepen ......
24
Transfer ..
29
Post-Assessment .
30
Feedback
31
iii
Introduction
33
Objectives..
34
Pre- Assessment
35
36
36
46
46
1.4 Network.....
64
70
76
2. 1 Safety Precautions...
76
80
84
106
123
136
145
.
3.1. Testing Installed equipment/devices/system...
145
Summative Test ..
153
Post- Test .
158
References
159
Glossary of Terms.
161
Acronyms ..
163
165
Pre- assessment
167
iv
169
169
173
175
......
180
AND NETWORKS
2.1 Safety Precautions ...
180
181
188
200
204
211
221
221
226
228
233
243
253
253
257
Post Assessment .
266
Summative Test ..
268
References ..
273
Glossary ..
275
vi
Have you ever thought about running your own business? Entrepreneurship has brought
great success to some people, but it's not a career path for all. Do you think you can handle
the stress and hard work that go with running a small business enterprise? The key to
success in a small business enterprise is your entrepreneurial ability to produce the desired
results. Before embarking on your first business, it's worth spending some time evaluating
your own preparedness for entrepreneurship. Try to examine your own personality and
compare it with the Personal Entrepreneurial Competencies (PECs) of a successful
entrepreneur. Ask yourself if you are ready to enter into the world of business. If your answer
is yes, consider this reminder:Successful entrepreneurs continuously develop and
improve their PECs.
Essential Question
vii
Content Standard
of
Personal
Performance Standard
Guide Questions:
entrepreneur in the future? As honestly as you can, please answer the preassessment below.
viii
Pre- Assessment
A.
Matching Type
Directions: Column A lists the characteristics of a successful entrepreneur.
Draw a line from each of the items in Column A that connectsto
each of the correct definition of terms listed in Column B.
Column A
1. Hardworking
2. Self-Confident
3. Profit-Oriented
4. Goal-Oriented
5. Persistent
6. Responds to feedback
7. Willing to listen
8. Committed
9. Reliable and has integrity
Column B
10. Risk-Taker
Are you done? This time you will do another set of pre- assessment which
could giveyou a better understanding of what this module isall about. Are
you ready? Lets begin!
ix
Multiple Choice.
Directions:Read and study the situation that describes entrepreneurial
characteristics or attributes. Answer the question by writing the letter of your
choice in your assignment notebook or on the answer sheet provided.
Ms. Juliana Frances Rose opens up her own retail business. She knows that her
personal entrepreneurial characteristics are insufficient to ensure the successful
operationalization of a business that she has in mind. Your answers to the questions
below will help in developing her PECs.
1. What PECs must she possessif there are customers who complain about the
quality of her product?
a. Patience
b. Hardwork
c. Versatility
d. All of the above
2.
3.
4.
Ms. Juliana follows the advice of a friend to be flexible especially if she intends
to open a retail business. What PECs has been demonstrated by
Mrs.Pakingan?
a. Self- Confidence
b. Reliable and integrity
c. Open to feedback
d. Oppenes to Persistence
5. She tells Rio, her best friend that she has a strong will and does not give up
finding a solution to a business problem. What PECs has been demonstrated
by Mrs. Pakingan?
a. Hard work
b. Persistence
c. Self-Confidence
d. Risk- Taking
xi
C. Self- Assessment
rd
developed.
Strength
Need to be Developed
Hardworking
Self-Confident
Builds for the future
Profit-Oriented
Goal-Oriented
Persistent
Copes with failure
Responds to feedback
Demonstrates initiative
Willing to listen
Sets own standards
Copes with uncertainty
Committed
Builds on strengths
Reliable and has integrity
Risk-Taker
xii
Did you enjoy examining your PECs? You can become asuccessful
entrepreneur someday. Please dont feel badly when you discover
that some of these are still to be developed.
exploration to find answers
to
Continue your
how to improve on
these
underdeveloped PECs.
1. Hard working: If you are determined to run your own business, you must
concentrate on your work either as a producer or a seller. The success of
your business depends on how much time and effort you will spend on it.
2. Self- Confident: You must have a strong faith in your ability despite the
problems that you will encounter along the way.
3. Future-Oriented: Once you enter in a line of business, you must understand
that you are in a non-stop contract as an entrepreneur. It may take several
years to developa business to a reasonable standard. The goal for most
successful business people is to build a secure job and ensure a stable
income for themselves based on their own ability.
4. Profit-Oriented: When you enter the world of business, you are obviously
looking for what you know will be your bread and butter,not only for you, but
also for your family. Therefore, you must see to it that the business can
generate enough income.
Youneed advanced
preparation for your business. You set along-term goal for the activities that
are needed, an extensive preparation for the production process and
procedures that you need to go through to acquire human and non-human
resources. Everything in your business will have to be set clearly, organized,
and planned depending on the goal you want to achieve.
xiii
grow.
11. SetsOwn Standards:This involves developing and using logical, step-bystep plans to reach the goals, or offering evaluation alternatives, monitoring
progress, and switching to successful strategies for the goal you want to
achieve. To be a successful entrepreneur you must take into consideration
that sales and production depend on your own standards.
12. Copes with Uncertainty:Pursue your vision to be a successfulentrepreneur,
you should know how to handle unusual events that may happen in the
business which include problems in managing the workers, problems on the
delivery of goods and services, and the problems on demand and
production.You must be patient in dealing with these uncertainties.
13. Committed:You should know thatin your business,personal needs,
attachment to your friends, families and relatives are set aside.You must
separate the money for your business from the amount that you need to
spend for personal obligations and lifestyle.
14. Builds on Strengths:Successful business people base their work on
strengths.
xiv
services, knowledge in trade and industry, ability to make and use a wide
network of contacts to build your business.
15. Reliable and has Integrity:As an entrepreneur, to make a wide
networkyou must build a good reputation, possess the courage to do the
right thing, do what you say, walk your talk, be loyal, and be fair in dealing
with subordinates and costumers.
16. Risk-Taker:
When misfortunes
happen, consider these as challenges and work them out and set good
alternatives. Risks may result in loss of your business or even bankruptcy.
Direction:Refer from Activity 2 (Aligning ones PECs) on page 10 to perform the following
tasks:
1. select the appropriate characteristics and traits which you feel best describe a
successful practitioner of contact center servicing in your town. Write down
all the descriptions on the second column;
2. afterhaving completed the list in column two, think of your personal
assessment of a successful practitioner by reflecting it on the third column.
This assessment would give you a good idea of significant characteristics and
traits that a successful practitioner must possess.
Practitioner
Assessment
Characteristics
xv
Traits
-
Activity 2:
Directions: Choose from the list below the characteristics and traits that best describe your
own personal entrepreneurial characteristics.
provided.
Creative
Resourceful
Confident
Ris-Taker
My PECs
Optimistic
1.
Passionate
Persistent
Observant
Organized
Independent
Competent
My simple definition
Flexible
Sensitive
Trustworthy
Creative
2.
Organized
Dynamic
Knowledgeable
Efficient
Persevering
Hardworking
Decisive
Decision-Maker
StrongMinded
Reliable
Courteous
Try to design a concept map that indicates your traits, characteristics and
skills that you need topossess in order to become a successful entrepreneur.
My PECs
xvi
3. Competent
4. Observant
already strong in you, and write them down on the blank arrows on the left
side, right way. PECs written on the arrows at the right side arethe weak
characteristics that need to be further improved, road to improvement.
road to improvement
Right Way
Road to
Improvement
xvii
Hello! Im here once again reminding you whether you have achieved a
certain point that you could honestly tell that you are already successful in
strengthening your own PECs.Let ssee
Example: Self-confidence
xviii
.
.
Selfconfidence
short list of PECs that you need to strengthen. From this activity, prepare an action plan that
requires further development.You may opt to follow the suggested format below. You may
improve or change itfor so long as it suits your own plan of action.
Sample Action Plan
Current
Area
Situation
Goal
Measures
of Success
Actions
Time
Required
Frame
Reward/
Recognition
xix
My PECs
I need to
- To
Achieve
-Selling
-During
-Earns
finished
culminating
expected
activities
income
-After
-Outstanding
develop my
exercise
100%
undefined
my own
completion
characteris-
PECs
of products
development
of
my retail
selling and
business.
learning
performance in
the
selling and
producing
selling
principles,
promoting
such as:
products/
production
theories,
products and
_________
services
products,
__________
my
derived from
own culminating
processes of services
any chosen
__________
proficient in when
dealing competition
__________
sponsored by
______
skill.
business /
entreprise
GO
Post-Assessment
Answer the post assessment questions below to determine whether there is
significant increase in your understanding of PECs. The feedback to this post
assessment is appended on page 16. Good Luck!
A. Matching Type
Directions: Column A lists the characteristics of a successful entrepreneur.
Draw a line from the items in Column A that connects the correct definition of
terms listed in Column B.
Column A
1. Hardworking
2. Self-Confident
3. Profit-Oriented
4. Goal-Oriented
Column B
a.
b.
c.
d.
e.
f.
xx
5. Persistent
6. Responds to feedback
7. Willing to listen
8. Committed
B. Multiple Choice.
Directions: Read and study the situation that describes entrepreneurial
characteristics or attributes. Answer the question by writing the
letter of your choice in your assignment notebook or on the
answer sheet provided.
Ms. Gillian Myles opens up her own retail business. She knows that her personal
entrepreneurial characteristics are insufficient to ensure the successful operationalization
of a business that she has in mind. Your answers to the questions below will help in
developing her PECs.
1. What PECs must she possess if there are customers who complain about the
quality of her product?
a. Patience
b. Hardwork
c. Versatility
d. All of the above
2. Which of the following is NOT considered as a characteristic of an
entrepreneur?
a. Copes with failure
b. Dependent
c. Persistent
d. Opportunity seeker
3. If she wants to ensure a profitable business operation, what characteristic will
she maintain?
xxi
a. Commited
b. Goal oriented
c. Futuristic
d. Opportunity seeker
4. Ms. Gillianfollows the advice of a friend to be flexible especially if she intends to
open a retail business. What PECs has been demonstrated by Mrs. Magno?
a. Self- Confidence
b. Reliable and integrity
c. Open to feedback
d. Oppenes to Persistence
5. She tells Mary, her best friend that she has a strong will and does not give up
finding a solution to a business problem. What PECs has been demonstrated by
Mrs. Magno?
a. Hard work
b. Persistence
c. Self-Confidence
d. Risk-Taking
Feedback
A.
Matching Type
1.d
6. f
2.c
7. e
3.b
8. j
4.a
9. i
5.g
10. h
xxii
B. Multiple Choice
1. a
2.b
3.d
4. c
5. b
xxiii
xxiv
Content Standard
-
Performance Standard
-
Guide Questions:
1. How does one determine the product to be produced or services to be
offered and delivered to the target market or customers in a particular
community?
2. How does one select an entrepreneurial activity?
3. How can one respond effectively to a business enterprise?
Hello there! Are you ready to assess your readiness to generate
Types of merchandise
The access of the target customers
The attractiveness of the store layout
The prevailing prices of goods in the area
xxvi
needs is to supply the products and services that meet the demands of
the market. The term market refers to whoever will use or buy the
products or service, and these may be people or institutions such as
other businesses, establishments, organizations, or government
agencies.
There is a very good business opportunity when there is absolutely no
supply to a pressing market demand.
Businesses or industries in the locality also have needs for goods and
services. Their needs for raw materials, maintenance, and other
services such as selling and distribution are good sources of ideas for
business.
4. Examine the available resources around you. Observe what
materials or skills are available in abundance in your area. A business
can be started out of available raw materials by selling them in raw
form and by processing and manufacturing them into finished products.
For example, in a copra-producing town, there will be many coconut
husks and shells available as waste products. These can be
collected and made into coco rags/doormat and charcoal bricks and
sold profitably outside the community.
A group of people in your neighborhood may have some special skills
that can be harnessed for business. For example, women in the
Mountain Province possess loom weaving skills that have been passed
on from one generation to the next generation. Some communities
there set up weaving businesses to produce blankets, as well as
decorative items and various souvenir items for sale to tourists and
lowland communities.
Business ideas can come from your own skills. The work and
experience you may have in agricultural arts, industrial arts, home
economics, and ICT classes will provide you with business
opportunities to acquire the needed skills which will earn for you extra
income, should you decide to engage in income-generating activities.
With your skills, you may also tinker around with various things in your
spare time. Many products were invented this way.
xxviii
Always think of
something new, something novel, authentic; reinvent the existing ones; and
create your new version of goods/products, and services. For instance, your
own hair straightening is herbal, while in the other salons it is made of
synthetic chemicals.
This kind of changes being made will affect the existing principles in
business and industries that can be easily adapted to the changes in
producing the products/services to meet the needs and wants of people in the
community.
xxx
People keep on searching for new things, new trends, and new issues.
For these reasons, an entrepreneur hurriedly responds to these needs and
wants of people.
As generations come and go, another set of new trends will come or
will exist. In order to adapt to the rapid changes in the business environment,
the existing industries need to improve their products and services. But how
can you generate business ideas with those strong competitors? There are
three main sets of decisions that you need to make-what to produce, how to
produce, and how to share or sell out the product to the market.
xxxi
Activity 1Mini-survey
Directions: Conduct a mini-survey in your immediate community.
Gather pertinent data on population across age brackets as suggested
in the matrix below. Opposite each age group, indicate their probable
needs and wants.
After filling out the chart above, try to list down all the
Population
35
Needs
Wants
Toys, coloring
books, pajamas
5 and below
6- 10 years old
11-15 years old
16-20 years old
21-25 years old
26-35 years old
35-45 years old
46-55 years old
56-65 years old
66 and above
xxxii
Opportunities
Negative Factors
Weaknesses
Threats
Name (optional):
Age:
Sex:
Address:
Monthly Income:
xxxiv
Name (optional):
Age:
Sex:
Monthly Income:
Name of Business Establishment:
Number of years in business:
Number of Employees/workers:
Business Address:
Now that, you have all the information, are you ready to test your ability
to generate your own business idea? If your answer is yes, start studying the
sample vicinity map of a community with a population of two thousand people.
A new housing project will be constructed adjacent to DaangHari St.close to
Old Molino St., its main road. This housing project targets the homeowners
who are young couples with two kids.
In this activity, you need to answer the questions that may lead to the
generation of a probable business. Your answers to these questions will
serve as the bases in formulating your own business ideas.
1.
2.
xxxvi
3.
4.
Can you say that you have seized the most feasible
business opportunity?
Post-assessment
1. The following are examples of peoples basic needs, except:
a. Recreation
b. Clothing
c. Shelter
d. Food
2. Which of the following should be considered first by a prospective
entrepreneur in choosing the right location for his/her store?
a. Types of merchandise
b. The access of the target customers
c. The attractiveness of the store layout
d. The prevailing prices of goods in the area
3. Salie plans to put a digi-print studio in their locality. Which of the
following will help her determine her plan for success in setting up her
business?
a.
b.
c.
d.
Feedback
Pre-assessment and Post assessment
1. a
2. b
3. d
4. c
5. b
xxxviii
MODULE 3:
INSTALL COMPUTER SYSTEMS AND
NETWORKS
Content Standard
The learner demonstrates
understanding of basic concepts,
underlying theories and core
competencies in computer
systems and networks.
Performance Standard
The learner independently provides
quality and marketable service in
computer hardware servicing in terms
of computer systems and networks
installation and diagnose and trouble
shoot computer systems as
prescribed in the TESDA Training
Regulation.
In this module, there will be three (3) major topics that you will
encounter: (1) plan and prepare for installation; (2) install hardware and
software components and operating systems; and (3) conduct test on the
installed computer system. The three major topics contain sub-topics that
discuss the details on installing computer systems and networks. This
module contains what to KNOW, what to PROCESS, what to REFLECT and
UNDERSTAND as well as what to TRANSFER. The competencies for this
module are:
LO 1. Plan and prepare for installation
Observe Occupational Health and Safety policies and procedures in
planning for installation activity in accordance with requirements
Familiarize with computer hardware, software component and other
peripherals in accordance with established procedures on correct
operation and safety policies
You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.
SKILLS TEST
Direction: Listed below are some of the most important skills that you
must gain in order to render quality service when you enter the real world of
Computer Hardware Servicing. Read the skills carefully. Write YES if you
are familiar with the skill and NO if not. Feel free to answer each skill. Write
your answers in your notebook.
Skills in Computer Hardware Servicing
YES
NO
xli
The following topics will enable you to be familiar with planning and
preparing for installation, install equipment and devices, and conduct test on
the installed computer system. All you need to do is to read carefully all the
topics and apply the skills youve gained through the distinct activities
provided in this module.
LESSON 1: PLAN AND PREPARE FOR INSTALLATION
This lesson is intended to develop your skills in planning and preparing
for installation of computer devices and operating system. At the end of this
lesson you are expected to:
Observe OHS policies and procedures in planning for installation activity
in accordance with requirements
Familiarize with computer peripheral/ devices/systems in accordance
with established procedures correct operation and safety
xlii
xliii
Hazardous substances
If the workplace hazard appears to be dangerous to staff and clients
and professional assistance is required:
A. Call the supervisor or manager and advise them of the problem and
the urgency of the matter.
B. Depending on the risk it may be called as an evacuation.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or specialized
personnel who will deal with the spill.
xliv
Name:
Type of Injury
Yr/Sec:
Cause of Injury
Remedy
Fire exits
All fire exits should be kept clear of from obstacles. All students have a
responsibility to make sure that chairs, empty boxes or any other type of
obstacle are not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to
ensure that in the event of an emergency there is a clear exit.
Fire Safety Procedure
Each work area has a designated fire warden, who in the event of a fire will
take charge. They are recognized by the wearing of a red hard hat.
If you find the fire
xlvi
2.
3.
Performance Criteria:
5
UNDERSTANDING COMPUTER
A computer is one of the most brilliant inventions of mankind. Thanks
to the computer technology, we were able to achieve storage and processing
of huge amounts of data; we could rest our brains by employing computer
memory capacities for storing information. Due to computers, we have been
able to speed up daily work, carry out critical transactions and achieve
accuracy and precision in work. Computers of the earlier years were of the
size of a large room and were required to consume huge amounts of electric
power. However, with the advancing technology, computers have shrunk to
the size of a small watch. Depending on the processing power and size of
computers, they have been classified under various types. Let us look at the
classification of computers.
xlvii
xlix
li
lii
device plays an important role, without each other computer system will not
work properly.
What is an Operating System?
The operating system is the most
important program that runs on a computer.
Every general-purpose computer must have
an operating system to run other programs.
Operating systems perform basic tasks, such
as recognizing input from the keyboard,
sending output to the display screen, keeping
track of files and directories on the disk, and
controlling peripheral devices such as disk
drives and printers.
For large systems, the operating
system has even greater responsibilities and powers. It is like a traffic cop -- it
makes sure that different program and users running at the same time do not
interfere with each other. The operating system is also responsible
for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
o
Multi-user: Allows two or more users to run programs at the same time.
Some operating systems permit hundreds or even thousands of
concurrent users.
Linux
Unix
Windows 2000
Multiprocessing : Supports running a program on more than one CPU.
Linux
Unix
Windows 2000
Multitasking : Allows more than one program to run concurrently.
Unix
Windows 2000 and Windows multi point
Multithreading : Allows different parts of a single program to run
concurrently.
Linux
Unix
Windows 2000 and Windows 7
Real time: Responds to input instantly. General-purpose operating
systems, such as DOS and UNIX, are not real-time.
liii
Source: computerit4u.com
liv
Source: laptopmd.com
Source: products.yumecompare.com
lv
Source: www.oempcworld.com
Source: www.mypcmag.com
lvi
Source: www.oempcworld.com
Source:
www.dansdata.com
Source: news.techgenie.com
9. Optical Drive- An optical drive is a storage device that uses lasers to read
data on the optical media. There are three types of optical drives: Compact
Disc (CD), Digital Versatile Disc (DVD) and Blu-ray Disc (BD).
Source: www.ktclear.in
Figure12. CD ROM
10. Digital Versatile Disc (DVD) - Designed to optically access data stored
on a DVD. A laser moves back and forth near the disk surface and accesses
data at a very fast rate.
Source: technology7days.blogspot.com
lviii
Figure14. Keyboard
2. Direct Entry A form of input that does not require data to be keyed by
someone sitting at a keyboard. Direct-entry devices create machinereadable data on paper, or magnetic media, or feed it directly into the
computers CPU.
Three (3) Categories of Direct Entry Devices
1. Pointing Devices - An input device used to move the pointer (cursor) on
screen.
Mouse - The most common 'pointing
device' used in PCs. Every mouse
has two buttons and most have one
or
two scroll wheels.
Source: www.ztenterprise.com
Figure15. Mouse
lix
Source: beestsoftwares.blogspot.com
Source: majoarciniegas.wordpress.com
Source: www.tutorialspoint.com
lx
2. Scanning Devices- A device that can read text or illustrations printed on paper
and translates the information into a form the computer can use.
Source: www.ztenterprise.com
Source: www.digitalwish.com
Source:
www.projectorpoint.co.uk
Source: www.pcworld.co.uk
Figure 25.Types of Printer
(e) Thermal Printer- An inexpensive printer that works by pushing heated pins
against heat-sensitive paper. Thermal printers are widely used in calculators and
fax machines.
lxiii
5. Speakers - Used to play sound. They may be built into the system unit or
connected with cables. Speakers allow you to listen to music and hear sound
effects from your computer.
Source: www.tweaknews.net
Figure 26.Speaker
Source: www.thecomputershow.com
Figure 27.Storage Devices
lxiv
lxv
Direction: In the puzzle below, look for the 10 hidden computer devices and
determine whether it belongs to INPUT, OUTPUT or STORAGE DEVICE.
REVEAL THE PARTS OF A COMPUTER SYSTEM
C
P
Z
Q
I
A
C
N
G
A
R
E
K
L
M
W
K
Y
R
M
G
O
A
U
R
O
U
H
H
S
Y
S
W
E
Q
P
Z
B
N
J
M
R
M
I
T
N
H
X
L
L
B
A
M
I
U
T
Z
Y
F
G
M
K
Z
P
B
R
L
S
P
W
E
C
I
O
N
H
M
V
H
N
Q
I
W
R
A
D
Q
P
F
W
A
M
Q
M
D
E
L
X
T
Y
F
R
G
Y
R
C
U
U
H
T
E
E
K
E
H
R
H
E
U
H
Y
X
W
P
S
S
T
P
G
R
M
T
K
H
M
M
M
W
B
V
L
N
P
T
R
G
Z
D
P
A
J
S
I
Y
R
K
O
P
U
J
1. ________________________
2. ________________________
3. ________________________
4. ________________________
5. ________________________
6. ________________________
7. ________________________
8. ________________________
9. ________________________
10. ________________________
W
A
X
E
U
S
G
A
I
O
I
Y
S
A
W
Z
U
L
G
D
K
A
W
X
Y
I
D
K
Z
S
X
S
I
S
O
W
S
Q
L
U
C
O
A
V
L
L
C
O
T
Q
K
D
O
K
Q
J
E
Q
S
G
P
A
F
I
G
N
J
Z
A
F
P
D
R
S
U
U
C
Y
N
F
A
U
V
R
R
H
F
X
F
A
I
E
R
A
H
B
K
O
P
L
H
A
R
D
D
I
S
K
D
R
I
V
E
I
O
J
Y
V
F
U
K
K
Q
B
V
Q
E
M
O
E
X
W
I
I
V
B
C
N
J
X
H
B
V
W
J
S
E
T
U
H
E
T
L
D
K
E
Y
H
W
O
G
M
X
A
B
M
J
Y
U
B
C
I
D
G
T
A
V
E
N
M
C
P
U
O
O
I
K
U
F
G
F
D
F
Z
M
P
Y
Z
K
K
N
H
M
R
C
L
O
Z
T
M
H
V
F
K
J
Q
S
H
N
D
H
U
Y
B
U
X
U
S
R
O
T
I
N
O
M
Z
D
D
J
A
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
lxvi
Matching Type
Direction: Match column A with Column B and write your answer on a
separate sheet of paper.
A.
1. It serves as the brain of
computer.
2. Printed-circuit
boards
(also
called interface cards) that
enable the computer to use a
peripheral device
3. Also called read/write memory
4. a small, portable disk used
primarily for backing up files
5. The main circuit board of a
computer
6. Also called diskette
7. Acts as a pointing device
8. Device that makes sounds, clips
and any audio materials be
heard.
9. Component that reads and
record data in CDs and DVDs.
10. it is a visual device that displays
the information
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
B.
Adapter
CD- ROM
CPU
Floppy disk
Microphone
Monitor
Motherboard
Mouse
Optical Drive
RAM
ROM
l. Speaker
m. Zip Drive
lxvii
2. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-cpu-socket-types/
3. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-cpu-socket-types/
4. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-display-device-types/
lxviii
5. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-pc-input-devices/
Role Playing
The class will be divided into 5 groups (depending on the class
size), each group will have a minimum of 5 members and maximum of
10. Each member should have a special role pertaining to the devices
of a computer and their functions. Each group will be tasked to
showcase their talents in front of the class. Each presentation will be
rated using the following criteria:
lxix
CRITERIA
PERCENTAGE
SCORE
NETWORK
A network consists of two or more computers that are linked in order to
share resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or infrared light
beams.
There are three basic types of networks which includes the following:
lxxi
Source: www.dlink.com
Source: www.quantrimang.edu.vn
Source: www.robertbcairns.com
lxxii
Source:
www.computerlogics.blogspot.com
Source:www.dlink.com
Source:www.security-solutions.co.za
lxxiii
Now, that you are done with the introduction of network as well as the
networking devices, to enlighten your understanding and knowledge have
some more readings about it thru books and other resources. You should
consider the following topics for research:
1. Different types of Network Topology
2. Common networking tools
http://www.professormesser.com/free-a-plus-training/220801/network-devices/
lxxiv
http://www.professormesser.com/free-a-plus-training/220801/network-topologies-3/
List down all the network devices and their advantages cited in the
video.
List down the different network topologies and their differences.
lxxv
Tools
Screwdriver(standard)
Screwdriver(Philips)
Long nose pliers
Mechanical pliers
Allen wrench
Multi tester
Crimping tools
Soldering iron (30 watts)
Wire stripper
LAN Tester
Anti-static wrist wrap
Device drivers/installers
Materials
Software
applications
Network OS
Software
RJ 45
UTP Cat 5 cable
Motherboards
manual and
installer
Sound device
driver installer
lxxvi
lxxvii
lxxviii
1.
2.
3.
4.
5.
B. Identification.
Direction: Identify the appropriate term described in each sentence. Use a
separate sheet for your answers.
lxxix
After doing the above tasks, make sure that you have a detailed
documentation of it. Write your reflections on your notebooks or other sheet of
paper.
After reflecting on the task given to you, its your chance now to
transfer what you have learned from the activity by having a presentation in
front of the class. You will be grouped with 5 members during the
presentation. Make use of your creativity in presenting each topic to awaken
the interest of your classmates.
lxxx
SAFETY PRECAUTIONS
Personal Protective Equipment - It refers to protective clothing, helmets,
goggles, or other gear designed to protect the wearer's body or clothing from
injury by electrical hazards, heat, chemicals, and infection, for job-related
occupational safety and health purposes.
lxxxi
lxxxii
True or False
Direction: Write TRUE if the statement is correct and FALSE otherwise.
1.
lxxxiii
2.
3.
4.
5.
6.
7.
8.
9.
10.
Always grasp a metal part of the computer chassis with your bare hand
before you touch anything inside. Do this even if you are wearing an
anti-static wristband.
Always handle electronic components by a non-conducting (nonmetallic) edge. Don't touch the pins or other connectors.
Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection.
Never use an anti-static wrist strap when working on a computer
(except when working on monitors)
Everyone is allowed to eat, drink, or smoke while working on a
computer.
Never plug an ATX power supply into AC power unless it is connected
either to a computer's motherboard or to a dummy test load.
Static electricity is the discharge of electricity between two objects with
different electrical potential.
Apron is a garment worn over the front of the body as a protection for
ones cloth.
PPE can also be used to protect the working environment from
pesticide application, pollution or infection from the worker.
Percentage
20%
15%
25%
Grade
lxxxiv
task.
4. The task gave students more critical thinking on the
personal protective equipment.
30%
10%
Performance Rating
SYSTEMS SPECIFICATION
Whenever you purchase software or hardware for your computer, you
should first make sure your computer supports the system requirements.
These are the necessary specifications your computer must have in order to
use the software or hardware. For example, a computer game may require
your computer to have Windows XP or later, a 2.0 GHz processor, 512 MB of
RAM, a 64 MB graphics card, and 500 MB or hard drive space. If your
computer does not meet all of these requirements, the game will not run very
well or might not run at all.
It is just as important to check system requirements for hardware
devices. For example, if you buy a printer, it may require either Windows XP
or Mac OS X 10.3 or later. It may also require a USB port and 80 MB of
available hard drive space. If your computer does not have any USB ports,
you will not be able to physically connect the printer. If your machine does not
have Windows XP or Mac OS X 10.3 or later, the printer drivers may be
incompatible with your operating system. This means your computer will be
unable to recognize the printer.
Most hardware and software products have the system requirements
printed on the side or bottom of the product packaging. When you are
shopping for computer software or hardware, it is a good idea to first find out
exactly what your system's specifications are and write them down on a piece
of paper. The important information to record includes:
1. Operating System (i.e. Windows XP, SP 2 or Mac OS X 10.3.8)
2. Processor Speed (i.e. Pentium 4, 3.2 GHz or Power PC G5, 2.0 GHz)
3. Memory, a.k.a. RAM (i.e. 512 MB)
4. Graphics Card (i.e. ATI Radeon 9800 w/ 256 MB video memory)
lxxxv
Any form of modern computer graphics system can now display highresolution color images on a standard-sized display screen (ie any monitor up
to about 19" in size). The more sophisticated graphics cards now determines
how well a computer can handle the playback of high definition video, as well
as the speed and quality at which 3D scenes can be rendered. Another key
feature of separate graphics cards is that most of them now allow more than
one display screen to be connected to a computer. Others also permit the
recording of video.
As a basic rule, unless a computer is going to be used to handle 3D
graphics or to undertake a significant volume of video editing or recording,
today there is little point in opting for anything other than onboard graphics
(not least because separate graphics cards consume quite a lot of electricity
and create quite a lot of heat and noise). Adding a new graphics card to a
computer with onboard graphics is also a very easy upgrade if required in the
future.
Hard Drive Speed and Capacity
Today 40GB is an absolute minimum hard drive size for a new
computer running Windows 7, with a far larger capacity being recommended
in any situation where more than office software is going to be installed.
Where a computer will frequently be used to edit video, a second internal
hard disk dedicated only to video storage is highly recommended for stable
operation. Indeed, for professional video editing using a program like
Premiere Pro CS5, Adobe now recommend that a PC has at
least three internal hard disks (one for the operating system and programs,
one for video project files, and one for video media).
Two key factors determine the speed of traditional, spinning hard
disks. The first is the rotational velocity of the physical disk itself. This can
currently be 4200, 5400, 7200, 10000 or 15000 rpm (revolutions per minute).
The faster the disk spins, the quicker data can be read from or written to it,
hence the faster the disk the better (although faster disks consumer more
power, make more noise, and generate more heat). Most desktop hard disks
run at either 5400 or 7200 rpm, whilst most laptop hard disks run at 4200 or
5400.
lxxxviii
Now, in order for you to better understand the topics under systems
specification, dig deep into your mind and answer the following essential
questions:
1. In your point of view, describe system specification?
2. How does it affect the performance of the computer?
3. What is the relevance of understanding system specification in computer
hardware servicing?
4. Why do you think that system specification is one of the most important
considerations during installation?
lxxxix
to keep the screws in so you have them when you want to put things back
together.
Step1. Unplugging - The first thing you do is to unplug every cable that is
plugged in to your computer. That includes the cables such as Power, USB,
Mouse, Keyboard, Internet, Ethernet, Modem, AM\FM Antenna, Cable TV,
etc. Just unplug all the cables for safety purposes.
Now that your computer is fully unplugged, move your PC to a clean
work space.
Step2.Opening the Outer Shell/Case First, unscrew the four screws at the
back of the computer. On most computer cases, there will be large knobs that
you can unscrew by hand or by screw driver on the back-right side of the
computer.
Source: www.buildeasypc.com
Side
panel
Source:
www.buildeasypc.com
Figure 29.
Removing the side
panel
xc
NOTICE:
If you are working on a carpet, about every five minutes touch something that
is grounded (Sink faucet / pipe, wire coming from the ground part of a wall
outlet). This is done so you do not shock your motherboard or other parts.
Step3. Removing the System Fan - First, unplug the fan from the
motherboard. You can find the plug by following the wire from the fan. It
should be labeled "SYS_FAN1". Next, you will have to unscrew the fan from
the outside. You should now be able to lift the fan out of the PC.
System Fan
Source: www.buildeasypc.com
CPU Fan
Source: www.buildeasypc.com
Step5. Power Supply - The first thing to do is unplug every wire coming from
the power supply. You must disconnect the motherboard (very large
connector/plug), CD/DVD drive(s) power, internal hard drive power and
portable hard drive slot power.
Once everything is unplugged,
unscrew the four screws holding the
power supply in place, on the back of
the computer. Next, push the power
supply from the outside, and then lift it
out.
Source: www.buildeasypc.com
CD / DVD
Drive
Source: www.buildeasypc.com
xcii
Source: www.buildeasypc.com
Source: www.buildeasypc.com
Figure 35. Removing the hard drive from the side of the slot
Step8. Memory (RAM) - To remove the RAM, push down on both tabs
holding the RAM in place, which are located at both ends of the RAM.
xciii
Source: www.buildeasypc.com
Source: www.buildeasypc.com
xciv
Source: www.buildeasypc.com
xcv
Source: www.buildeasypc.com
Source: www.buildeasypc.com
Source: www.buildeasypc.com
Figure 41. Install CPU
xcvii
Source: www.buildeasypc.com
4. Plug the CPU fan's power connector into the proper connector on the
motherboard.
Step 5. Install Memory (RAM Modules)
In order to install the memory modules, insert them into the proper
sockets (Figure 43) and push down firmly but evenly until the clips on both
sides of the socket pop into place. If your motherboard supports dual-channel
memory, consult the user manual to determine which pairs of RAM sockets
you should use. The motherboard and the CPU are the brain and nerve
center of your PC, so selecting these components is the most important
decision you'll make.
Source:
www.buildeasypc.com
xcviii
Source: www.buildeasypc.com
Source: www.buildeasypc.com
butt-end of a screwdriver, and then replace it with the shield that came with
the new motherboard.
4. Carefully position the motherboard on top of the brass standoffs (Figure
47), line up all the holes, and use the screws that accompanied the case to
fasten down the motherboard. If you are using a removable tray in your
system, slide the tray and motherboard back into the case and then secure
the tray.
Source: www.buildeasypc.com
Source: www.buildeasypc.com
1. First, plug the large ATX power connector (Figure 48) from your power
supply into the matching port on your motherboard. Look Figure X for details.
2. Locate the smaller, square processor power connector (Figure 49) (you
cannot miss it - it is the one sprouting the yellow and black wires) and attach it
to the motherboard. Note: your connector is usually located near the
processor. As always, refer to your motherboard's manual for the exact
locations.
3. Use your motherboard user manual and find the description about frontpanel connectors.
Source: www.buildeasypc.com
Source: www.buildeasypc.com
ci
NOTE:
You are going to be doing work that requires attention to detail and can be
quite frustrating if you do not go into it with the right attitude.
4. Attach each of the tiny leads from the power and reset switches (Figure
50), the hard-disk activity lights, the PC speaker, and any front-panel USB
and FireWire ports to the corresponding pin on your motherboard. The
needle-nose pliers are useful for manipulating small pieces.
Source: www.buildeasypc.com
Source: www.buildeasypc.com
cii
2. Install the graphics board in that slot, and then secure the card with a
screw (Figure 52).
Source: www.buildeasypc.com
ciii
type of power connector that many power supplies don't come with.
Fortunately, many motherboards ship with adapters for converting a
standard four-pin power connector to a SATA power connector (Figure
54).
Source: www.buildeasypc.com
Source: www.buildeasypc.com
civ
Source: www.buildeasypc.com
Source: www.geeks.com
cvi
Source:
www.geeks.com
Performance Test
Direction: Follow
cviii
C. Connecting PC Peripherals
cix
Percentage
Accuracy
50 %
20%
Workmanship(applied safety
precautions)
20%
Speed
10%
Grade
Performance Rating
cx
Insert
the
Windows
XP
CD-ROM
and
reboot
the
computer
If you see a message about press any key to boot the CD, do so now.
Otherwise, you will see a message about Setup inspecting your system.
2.
In the first stage of setup; you will see a series of blue and gray MS-DOSbased screens.
In the first step, you will be asked to press F6 if you need to install any thirdparty or RAID drivers.
Finally, Setup begins. In this step, you can set up XP, launch the Recovery
Console (another, more complicated system recovery tool), or quit.
Press ENTER to continue Setup, and it will examine your hard drives and
removable disks.
cxii
cxiii
If you created a new partition, or wish to change the file system of an existing
partition, you can do so in the next step. NTFS (New Technology File
System) file system is more secured than FAT (File Allocation System).
Regardless of which file system you choose, be sure to select one of the
"quick" format options (the top two choices), if you do need to format, since
these
will
work
much
more
quickly
than
a
full
format.
If you did choose to change or format the file system, this will occur next.
First, you'll be asked to verify the format. If you're installing XP on a system
with more than one partition, especially one that still holds your data on one
of the partitions, be sure you're formatting the correct partition.
Hit F to continue, and a yellow progress bar will indicate the status of the
format. When this is complete, Setup will again examine your disks, and
create a list of files to copy.
cxiv
Setup will now copy system files to the system/boot partition(s) you just
created. This will allow the PC to boot from the C: drive and continue Setup in
GUI mode.
When the file copy is complete, Setup will initialize and save your XP
configuration.
It will then reboot your PC. When the system reboots, you will probably see
the "Press any key to boot from CD" message again. If this happens, do not
press a key: Setup will now boot from your C: drive. In the event that you
cannot prevent the CD-based Setup from reloading, eject the CD and reboot.
Setup will ask for the CD when needed.
Once the system reboots, you will be presented with the GUI Setup phase,
which is much more attractive than the DOS-mode phase. As you progress
through GUI Setup, you can read promotional information on the right side of
the screen about XP.
Next, your hardware devices are detected. This could take several minutes.
In the first interactive portion of GUI Setup, you can choose to customize the
regional and language settings that will be used by XP, as well as the text
input language you'd like. Users in the United States will not normally need to
change anything here.
Click Next to continue.
Now,
enter
your
name
and
your
company.
The name you enter is not the same as your user name, incidentally, so you
should enter your real name here (i.e. Rosalie Lujero or whatever).
Click Next to continue.
cxvi
Now you must enter the 25-character product key that is located on the
orange sticker found on the back of the CD holder that came with Windows
XP. You cannot install XP without a valid product key.Later on, you will be
asked to activate and optionally register your copy of Windows XP. A product
key can be used to install XP on only one PC.
Click Next to continue.
Figure 69. Enter Product Key
13. Enter
a
computer
name and
administrator password
In the next phase of Setup, you can create a name for your computer (which
is used to identify it on a network) and, optionally in Pro Edition only, a
password for the system Administrator, the person who controls the PC (this
will generally be you, of course).
cxvii
Next, you can supply the date and time, which are auto-set based on
information in your BIOS, and the time zone, which is irritatingly set to PST,
which is where Microsoft is. Change these as appropriate.
Click Next to continue.
If you have a networking card or modem, Setup now install the networking
components, which include the client for Microsoft networks, File and Print
Sharing, the Quality of Service (QoS) Packet Scheduler, and the TCP/IP
networking protocol by default.
cxviii
In this phase, you can choose to keep the default settings (recommended) or
enter custom settings.
Note that XP doesn't include the legacy NetBEUI protocol out of the
box. If you want to use this protocol, you will need to install it later from
the XP CD-ROM.
From this point on, Setup will continue to completion without any further need
for interaction. Setup will now copy files, complete installation, install your
Start Menu items, register system components, save settings, remove any
temporary files needed by Setup, and then reboot.
Again, you will probably see the "Press any key to boot from CD" message
on reboot. If this happens, do not press a key, and your new XP install will
boot up. You can remove the XP Setup CD now.
Youll be greeted by the XP splash screen on first boot (this actually appears
briefly when you rebooted into GUI Setup as well).The splash screens for XP
Pro and Home are subtly different.
Users with CRT monitors and some LCDs (such as laptops and flat panel
displays) will see a Display Settings dialog appear, which asks whether you'd
like XP to automatically set the resolution. This will generally change the
resolution from 800 x 600 to 1024 x 768 on a CRT monitor, or to the native
resolution of an LCD display.
Click OK and let XP change the resolution. Then, accept the settings if the
screen display changes and can be read. If you can't see the display, it will
time out after 30 seconds and return to the sub-optimal 800 x 600 resolution.
Click OK to accept the screen resolution change.
Now, you are presented with XP's "Out of Box Experience," or OOBE, which
presents a silly wizard to guide you through the final set up of your PC.
Click Next to continue.
cxxi
In the opening OOBE phase, you are asked to set up your network/Internet
connection, which is required for activation and registration. If you selected
the default networking configuration during Setup and know it will work
(because you're connected directly to a cable modem, perhaps, or are on a
local area network), then select Yes (the default). Otherwise, you can select
No and then Skip.
We'll assume that your network is up and running and select Yes.
Click Next to continue.
If you selected Yes in the previous step, you are asked if you'd like to
activate Windows XP. This will tie your copy of XP to the current PC semipermanently. Activation requires a connection to the Internet, but you can
perform this step later if you want (and don't worry, XP will annoyingly
remind you of this fact every time you boot the machine until you do so).
cxxii
Now, you can set up the user names of the people who will be using the PC.
You will want at least one user (for you), since you shouldn't be logging on as
Administrator. Curiously, each user you do create here has administrative
privileges, however, and no password. You should set up your users correctly
with passwords as soon as possible.
This phase lets you create up to five users. You can create more later, or
manage users, using the User Accounts tool in Control Panel.
Click Finish when done creating users. At this point, OOBE ends and you're
reading to go.
Click Finish again.
Multiple Choice: Read each question carefully and choose the letter of the
best answer. Write your answer on a separate sheet of paper.
1. Which of the following is not a Windows XP minimum requirement?
a. 128MB RAM or higher
c. Lower resolution monitor
b. CD- ROM or DVD ROM
d. 4.3 GB hard disk space or more
2. If you see a message to press any key to boot the CD and you fail to do so,
what do you think will happen?
a. The computer will restart
b. Set up inspecting your system will appear
c. It will be prompted to BIOS setup
d. It will return to boot menu
3. What key should you press if you need to install any third- party or RAID
drivers?
a. F2
c. F2
b. F6
d. F12
4. After reading the license agreement, what function key will press in order to
start the installation?
a. F6
c. F9
b. F8
d. F12
5. Where do we typically install the operating system?
a. Drive C
c. External Drive
b. DVD
d. Floppy Drive
6. What file system is usually used during installation?
a. FAT
c. NTFS
b. FAT32
d. NTFS32
7. Suppose that you will install Windows XP on a system with more than one
partition, what important process should be done?
a. Change the file system
b. Delete the data and files on the different partition
c. Examine the partition
d. Format the correct partition
8. When the folder copy phase is complete your system will reboot, what are
you going to do if see the message Press any key to boot from CD?
a. Press any key
c. Reboot the system
b. Do not press a key
d. Eject the CD
cxxiv
9. What is the next phase after the set up folder copy phase and reboot?
a. GUI set up
c. Username setup
b. Software
d. Software personalization
10. What phase will immediately follow after the first boot phase?
a. Welcome to Windows
c. Change display setting
b. Network Setup
d. Set up users
cxxv
Windows XP Installation
Equipment:
Computer unit with CD or DVD drive
AVR / UPS
Materials:
Windows XP Installer
Procedure:
1. Work in triads or quartet (depending on the number of computer
available)
2. Install the Operating System (OS), Windows XP.
3.
Take turns in doing the above task.
You will be assessed using the criteria in the score card below.
Percentage
Score
CRITERIA
1. Operating System is installed with no errors.
40%
40%
10%
10%
Performance Rating
cxxvi
Windows 7 Installation
As a technician you must be able to know the variations or options in
installing an operating system that is compatible with the hardware
requirement of a personal computer. Another operating system available in
the market now is the Windows 7 version. Now, take a tour through the
procedures in installing a Windows 7 operating system. I believe, the
procedures will be very easy for you.
1. Turn your computer on then press Del or F2 (depend on your computers
main board) to enter the system BIOS.
2. Go to Boot menu and choose Boot from CD/DVD.
cxxvii
4. Insert Windows 7 DVD into your DVD drive then start up your computer,
Windows 7 will be loading files.
cxxviii
you
already
have
previous
Windows
version
cxxix
9. (Skip this step if you chose Upgrade and have only one partition) Select
the drive where you want to install Windows 7 and click Next. If you want to
make any partitions, click Drive options (advanced), make the partitions and
then click Next.
11. After completing the first step, it will expand (decompress) the files that it has
been copied.
cxxxi
13. After that it will automatically restart after 15 seconds and continue the setup.
You can also click Restart now to restart without any delays.
cxxxii
15. It will now automatically restart again and continue the setup. You can
click Restart now to restart without any delays.
Figure96.First Start Up
16. Type your desired user name in the text-box and click Next. It will
automatically fill up the computer name.
Figure97.Software Personalization
cxxxiii
17. If you want to set a password, type it in the text-boxes and click Next.
Figure98.Password Set- up
18. Type your product key in the text-box and click Next. You can also skip this
step and simply click Next if you want to type the product key later. Windows
will run only for 30 days if you do that.
cxxxiv
cxxxv
21. If you are connected to any network, it will ask you to set the networks
location.
Hands- on Activity:
You are tasked to reformat / install an operating system particularly Windows
7, however, during the process of installation a problem occurred the machine /
computer did not boot from CD. What do you think might be the reason for this
unplanned incident? Your task now is to demonstrate the correct procedures to solve
and respond to this unplanned event in accordance to the established procedures.
PERCENTAGE
SCORE
50 %
30 %
20 %
PERFORMANCE RATING
100%
1. Watch video presentation on the said topic and have a proper documentation
of the procedures in obtaining approval from the appropriate personnel.
2. Interview a person in the field to acquire the knowledge (procedures) and
skills on the said competency.
Windows 7 Installation
Equipment:
Computer unit with CD or DVD drive
AVR / UPS
Materials:
Windows 7 Installer
Procedure:
1.
2.
3.
Percentage
40%
40%
Score
10%
10%
PERFORMANCE RATING
cxxxviii
cxxxix
The BIOS is accessed and configured through the BIOS Setup Utility.
The BIOS Setup Utility is, for all reasonable purposes, the BIOS itself. All
available options in BIOS are configurable via the BIOS Setup Utility. The
BIOS Setup Utility is accessed in various ways depending on your computer
or motherboard make and model.
BIOS access and configuration on PC systems is independent of
any operating system because the BIOS is part of the motherboard hardware.
It doesn't matter if a computer is running Windows 7, Windows Vista,
Windows XP, Linux, UNIX, or no operating system at all - BIOS functions
outside of the operating system environment and is no way dependent upon
it.
BIOS contain a number of hardware configuration options that can be
changed through the setup utility. Saving these changes and restarting the
computer applies the changes to the BIOS and alters the way BIOS instructs
the hardware to function. The following list shows the things you can do in
most BIOS systems:
Change the Boot Order
Load BIOS Setup Defaults
Remove a BIOS Password
Create a BIOS Password
Change the Date and Time
Change Floppy Drive Settings
Change Hard Drive Settings
Change CD/DVD/BD Drive Settings
View Amount of Memory Installed
Change the Boot Up NumLock Status
Device Drivers
Now that you successfully installed the operating system, youll need to
configure the devices such as Video Cards, Network Interface Cards, Sound
Cards, etc by installing the device drivers of each. In many cases, if Windows
recognizes the device, drivers will be installed automatically. In some cases,
generic drivers are installed so that the devices will work properly.
Drivers are small software programs that help the operating system
use or drive the device. Whenever a device doesnt work properly, ask if the
proper driver has been installed.
cxl
The procedures listed below describe how to obtain and install drivers
for hardware devices on a Microsoft Windows 2000-based computer.
Step 1: Determine the Hardware Manufacturer
If you do not know the manufacturer of the device for which you want to install
the driver, follow these steps to determine the manufacturer:
1. On the desktop, right-click My Computer, and then click Manage.
2. Under System
Tools,
click Device
Manager.
The devices that are installed on the computer are listed in the right
pane.
cxli
Device Manager
3. In the right pane, expand the category of the device that you want to
configure. For example, expand Display adapters.
NOTE: The device may be listed under other devices.
Expanded Device
Category
cxlii
4. Right-click the device for which you want to install the driver, and then
click Properties.
NOTE: The device may appear as Unknown device or as a generic
device.
5. Click the General tab. Make a note of the manufacturer and model of
the device.
cxliii
6. Click Cancel,
and
then
quit
Computer
Management.
cxliv
The driver files that you download from the OEM, device manufacturer, or
chipset manufacturer differ depending on how the driver is packaged by the
manufacturer.
If the file is an executable program, run the program to extract the files. If the
file is in .zip format, you can use a third-party utility such as WinZip to extract
the files. For more information about how to extract the driver files, see the
instructions that are provided by the manufacturer of the driver.
The driver may use a setup program. The driver package may contain raw
driver files, or it may contain only raw driver files. Some examples include .inf
files, and .sys files. To install the driver, use one of the following methods as
appropriate
to
your
situation.
cxlv
5. Click the Driver tab, and then click Update Driver. The Upgrade Device
Driver wizard starts.
6. Click Next.
7. Do one of the following:
o Click Search
for a suitable driver for my device
(recommended),
and
then
click Next.
-oro Click Display a list of the known devices for this device so
that I can choose a specific driver, and then click Next.
Click Have Disk, click Browse, locate the .inf files that you
downloaded in Step 2: Obtain the Driver, click an .inf file, and then
click Open.
8. Follow the wizard instructions to install the driver.
9. Restart the computer.
Device Is Not Displayed in Device Manager
Use the Add New Hardware wizard in Control Panel to install drivers for
non-Plug and Play devices. You may have to use this method to install certain
modems, serial ports, or printer ports.
1. Click Start, point to Settings, and then click Control Panel.
2. Double-click Add/Remove Hardware.
3. Click Next.
4. Click Add/Troubleshoot a device, and then click Next.
5. Do one of the following:
o Click Yes, search for new hardware, and then click Next.
-oro Click No, I want to select the hardware from a list, and then
click Next.
6. Follow the wizard instructions to install the driver.
7. Restart the computer.
cxlvi
Performance Criteria
Criteria
20%
20%
20%
20%
20%
PERFORMANCE RATING
cxlvii
Grade
You need to adhere to health and safety regulations as they will help to
protect you and others and will avoid any unnecessary legal action for
reckless and unsafe working practices. If you identify any health and safety
problems, you should tell your line manager or the health and safety
representative immediately.
The most basic test is to switch the system on to check it starts without
errors. ICT professionals are also likely to use tools and utilities to check that
all is well with the system after an installation.
The Use of Diagnostic Tools in testing installed hardware components
and other peripherals
Diagnostic tools are used to test and diagnose equipment. Diagnostic
tools include the following:
Digital multimeter is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays the
information on an LCD or LED.
Source: www.fluke-87.com
Software Tools
Like hardware tools, there are a variety of software tools that can be
used to help technicians pinpoint and troubleshoot problems. Many of these
tools are free and several come with the Windows operating system.
Disk Management Tools
Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able
to use a range of software tools to diagnose problems, maintain hardware,
and protect the data stored on a computer.
You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
The following are some disk management tools:
cl
Test procedures
A test procedure is a set of steps to guide you through what needs to
be done to thoroughly test the installation. It is designed to help you work
more effectively and to make sure you test everything that needs testing.
Test procedures are created in-house and could include these steps:
1. Gathering test information. The first step is to run the tests required by
the procedure and find out what happens. You should record all the results of
your tests in a log so that you know which pass and which fail, thereby
requiring further action.
2. Validating the test information. The next step is to check the data you
gathered from the tests to make sure it is correct. This is usually done by
running the tests again.
3. Responding to test information. This step is important because you need
to be able to recognize when a test shows problems or is successful. For
example, if ping is used to test a network connection then Request timed out
shows the test was not successful.
4. Checking specification. The final step is an important end to testing. You
need to check the specification for the installation to make sure that it has
been met. For example, if a user requested an upgrade to make their display
run at 1920 x 1200, then the ICT professional should check that the graphics
card and screen can do this.
External Visual Inspection
The external visual inspection consists of a quick inspection of the
exterior of the computer, the monitor, the keyboard, any peripherals, and
cables. While performing the visual inspection, make any necessary
corrections. To perform the external visual inspection, perform the following
steps:
1. Turn off the computer, the monitor, and all peripherals.
2. Verify that all power cables are properly connected to the computer,
the monitor and peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly
attached to the proper connectors on the back of the computer.
cli
For a serial mouse, the mouse interface cable must be firmly attached
to one of the serial port connectors, and its captive screws must be
secure enough to ensure a firm connection.
Each of the serial and parallel port interface cables must be firmly
attached to an appropriate connector on the back of the computer as
well as to the interface connector on the device. The captive screws
that secure these connectors at each end of the interface cable must
be secure enough to ensure a firm connection.
6. Verify that the video interface cable is firmly attached to the video
connector on the back panel or to a video expansion card, and also to
the connector on the back of the monitor. For proper connection of the
video monitor, see the documentation for the monitor.
7. Inspect all external monitor controls for any obvious damage or
improper settings. For proper settings of the video monitor controls,
see the documentation for the monitor.
8. Inspect the keyboard to ensure that no keys are sticking. If one or
more keys are sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and
indicators, and all user-accessible data storage devices for any signs
of physical damage. Does the inspection reveal any problems?
Yes. Proceed to the appropriate procedure in "Removing and Replacing
Parts."
No. Proceed to "Observing the Boot Routine."
Observing the Boot Routine
After you have performed an external visual inspection as described in
the previous section, you should boot the system and, while the boot routine
is running, observe the system for any indications of problems.
clii
To observe problem indications during the boot routine, perform the following
steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.
Does the fan run normally?
o
o
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on
the upper-right corner of the keyboard. After all three indicators flash
momentarily, and following a long pause (approximately 30 seconds),
the Num Lock indicator should light up and remain on (unless the Num
Lock option is set to Off in the System Setup program).
Do these indicators flash on and off within approximately 10 seconds
after the boot routine starts?
o
o
4. During the boot routine, observe the system for any of the following
indications:
o
cliii
CAUTION: The heat sink assembly can get extremely hot during
system operations. Be sure that it has had sufficient time to cool
before touching it.
CAUTION: When handling the heat sink assembly, take care to
avoid sharp edges on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink
assembly or assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly
on the top of each chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are
firmly attached to their appropriate connectors.
7. Reinstall the computer cover.
8. Reconnect the computer and any attached peripherals to their power
sources, and turn them on.
cliv
clv
Test I. Identification
Direction: Identify the terms being described in the following sentences.
1. These are mobile computers that are very handy to use.
2. They are computers designed to provide services to client machines in a
computer network.
3. They are also called mid-range systems or workstations.
4. A computer with a microprocessor and its central processing unit it.
5. They fall in the category of laptops, but are inexpensive and relatively smaller in
size.
6. A type of computer which is intended be used on a single location.
7. They use digital circuits and are designed to operate on two states, namely bits
0 and 1.
8. Computers that have the capacities to host multiple operating systems and
operate as a number of virtual machines and can substitute for several small
servers.
9. It is a handheld computer and popularly known as a palmtop.
10. These computers can be worn on the body and are often used in the study of
behavior modeling and human health.
11. It is considered as the most important program that runs on a computer.
12. It is composed of a device that accepts data and instructions from the user or
from another computer system.
13. Any piece of computer hardware that displays results after the computer has
processed the input data that has been entered.
14. Any apparatus for recording computer data in a permanent or semi-permanent
form.
15. It protects a computer network from unauthorized access.
16. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
17. This is an internetworking system capable of joining together two networks that
use different base protocols.
18. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications.
19. It is a small, simple, inexpensive device that joins multiple computers together.
20. A device filters data traffic at a network boundary.
3. Always grasp a metal part of the computer chassis with your bare hand
before you touch anything inside. Do this even if you are wearing an
anti-static wristband.
4. Always handle electronic components by a non-conducting (nonmetallic) edge. Don't touch the pins or other connectors.
5. Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection
clvii
b.
c.
d.
5. If you see a message to press any key to boot the CD and you fail to do so,
what do you think will happen?
a. The computer will restart
b. Set up inspecting your system will appear
c. It will be prompted to BIOS setup
d. It will return to boot menu
6. What key should you press if you need to install any third- party or RAID
drivers?
a. F2
c. F9
b. F6
d. F12
7. Where do we typically install the operating system?
a. Drive C
b. DVD
c. External Drive
d. Floppy Drive
8. Suppose that you will install Windows XP on a system with more than one
partition, what important process should be done?
a. Change the file system
b. Delete the data and files on the different partition
c. Examine the partition
d. Format the correct partition
9. What file system is usually used during installation?
a. FAT
b. FAT32
c. NTFS
d. NTFS32
10. Which of the following is a connector on the back of a computer or other
device?
a. Modem
b. Port hub
c. Router
d. Network Gateway
clviii
A.
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
k)
l)
m)
n)
o)
p)
q)
B.
Adapter
CD- ROM
CPU
Flash Drive
Floppy disk
Microphone
Monitor
Motherboard
Mouse
Multitasking
Optical Discs
PDA
Power supply
Printer
RAM
Register
ROM
r) Speaker
s) Tablet
t) Zip Drive
clix
SKILLS TEST
Direction: Listed below are some of the most important skills that you must gain in order
to render quality service when you enter the real world of Computer Hardware Servicing.
Read the skills carefully. Write YES if you are familiar with the skill and NO if not. Feel
free to answer each skill. Write your answers in your notebook.
Skills in Computer Hardware Servicing
YES
NO
clx
Electronic Resources:
Computer Memory Types Retrieved from
http://www.buzzle.com/articles/computer-memory-types.html
Measurements for Memory & Storage Retrieved from
http://www.athropolis.com/popup/c-comp2.htm
Fundamentals of PC repair Retrieved from http://www.ustudy.in/ce/hard/u1
clxi
clxii
Adapters- These are printed-circuit boards that enables the computer to use
a peripheral device for which it does not have the necessary connections or
circuit boards.
Analog Computers- It uses continuous variables for mathematical
operations and utilizes mechanical or electrical energy.
Bridge is a device filters data traffic at a network boundary
Digital Computers- They use digital circuits and are designed to operate on
two states, namely bits 0 and 1
Digital multimeter is a device that can take many types of measurements. It
tests the integrity
Drivers- are small software programs that help the operating system use or
drive the device
Ethernet switch is a device that gathers the signals from devices that are
connected to it
Hard disk drive- Is a magnetic storage device that is installed inside the
computer.
Hardware-These are the tangible component of a computer system.
Hazard-Is a situation in the workplace that has the potential to harm the
health and safety of people or to damage plant and equipment.
Hub- is a small, simple, inexpensive device that joins multiple computers
together
Hybrid Computers- a combination of both digital and analog computers
clxiii
clxiv
clxv
clxvi
MODULE 4:
DIAGNOSE AND
TROUBLESHOOT
COMPUTER SYSTEMS (DT)
Content Standard
Performance Standard
The
learner
demonstrates
understanding of the underlying
concepts
and
principles
on
diagnosing and troubleshooting of
computer systems.
clxvii
In this module, there will be four (4) major topics that you will
encounter: (1) be plan and prepare diagnosis of computer system errors;
(2) diagnose and configure computer systems and networks; (3) inspect and
test the configured computer systems and networks; and (4) test systems and
networks. The four major topics contains sub-topics which all leads to
diagnose and troubleshoot computer systems. This module contains what
to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well
as what to TRANSFER. The competencies for this module are:
LO 1. Plan and prepare for diagnosis of computer systems errors
Follow OHS procedures in planning and preparing diagnosis of computer
systems errors
Determine the computer systems errors using manual and software
diagnosis
LO 2. Diagnose and configure computer systems and networks
Follow OHS procedures in planning and preparing diagnosis of computer
systems and network errors
Identify the diagnosed computer systems and network errors based on
the job requirements
Configure computer systems and networks
LO 3. Inspect and test the configured computer systems and networks
clxviii
You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.
Instruction:
Knowledgeable
Have a
No
Little
Knowledge
Knowledge
at All
and requirements
Diagnose fault or problem in the
computer systems and networks
in line with standard operating
procedures (SOP)
Configure the identified systems
and networks based on
specifications and job
requirements
Inspect and test configured
computer systems and networks
in conformity with manufacturer's
instructions/manual
Correct/adjust components or
parts of computer systems and
networks in accordance with job
requirements
Test computer systems and
networks to ensure safe
operation
Perform scheduled/periodic
maintenance in accordance with
manufacturer's requirements
Make needed
repairs/replacements in
accordance with established
procedures, when necessary
Document tasks undertaken in
accordance with SOP
Clean and clear worksite of all
surplus/excess materials in
accordance with company SOP
clxx
SAFETY PRECAUTIONS
Personal Protective Equipment
Proper preparation is the key to a successful work. Before you begin,
make sure that you have the tools you will need, and secure a clear well-lit
workplace. Gather all the components youll be using and unpack them at the
same time. Always keep in mind that personal protection is one of the traits of
a good computer technician.
Types of personal protective devices
1. Anti-static devices
2. Power surge protectors
3. Personal equipment
Anti-static devices
Devices designed to protect the computer from static electricity.
Source: www.desktopreality.com
Source: www.desktopreality.com
Anti-static Mat
clxxi
Source: www.desktopreality.com
Source: www.rapidonline.com
Anti-static Bag
Anti-static Spray
Source: www.neopower.com
Source: www.amazon.co.uk
clxxii
Personal Equipment
screw drivers
compressed air
handheld vacuum
clxxiii
Choose a partner
Do a simulation exercise
o One will act out the role of a computer teacher.
o The other will be the student
Situation: Computer teacher will show/demonstrate to the students the
Personal Protective Devices, what they are and how they are used.
The Student keeps on asking about the Personal Protective
Devices/Equipment and how they can be maintained in good condition
of PC.
clxxiv
10. Application causes system to restart - Just like the mouse problem, when
you open a program that will take the whole screen like for example a game
and/or a program applications, when you close it, it will cause your system to
restart.
Aside from the common computer errors, computers also can have
different Operating System (OS) errors. OS errors can be classified into
various categories such as:
1. System errors These are moderately dangerous types of errors
among those that can pop up on your PC. System errors are caused
by malfunctioning hardware components, corrupted operating system
modules, etc.
2. Runtime errors Runtime errors are caused by corrupted or
malfunctioning system files or software executables. Most runtime
errors cause the application that caused it to shut down. However,
more serious runtime errors may cause the system to become
unstable or unresponsive, suggesting that you should restart your
computer.
3. Stop errors Stop errors are caused by corrupted hardware,
especially malfunctioning RAM modules and bad sectors on hard
disks. Stop errors can be difficult to resolve at times.
4. Device Manager Errors These are usually caused by corrupted
driver files or malfunctioning hardware components. In case of the
former cause, the problem is often solved by reinstalling or updating
the drivers. However, the latter cause can often be solved only by
replacing hardware components.
5. POST code errors POST code errors are caused by malfunctioning
hardware components, and are characterized by short beep sounds
from the tiny internal speaker of your motherboard. POST code errors
occur when you press the power button to turn on your PC.
6. Application errors These can happen at any point of time. As the
name suggests, these are caused by applications while those are
running. These are commonly caused by glitches in the program code
itself. These are normally resolved by updating the program to its latest
version.
7. Browser Status Codes These are caused by problems faced by
browsers when trying to access a website. These can be caused by
misplaced web pages in the server of the website itself, or due to
clxxvi
connection problems. For instance, a 404 error would indicate that the
browser is trying to access a webpage that does not exist in the
specified location.
Trial and error: When you find a faulty component in your computer,
check it with the other computers so that you can make sure whether
the fault is in the component or not.
Check cables: In case of any device failure, check all the cables of
your computer such as data cables, power cable, internal circuitry
cable and make sure that all these are plugged in and working fine.
Hardware settings: Check the hardware settings in the CMOS and in
the device manager of the system and make all the device drivers up
to date and all the cards are plugged in properly.
Notice changes: When you notice a software or hardware error in
your computer, determine what was changed before the problem
occurred.
Event viewer: In the event viewer, you will find the error or warning
messages associated with any faulty hardware or software.
Make notes: Troubleshooting is a useful skill and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a
record on how a certain problem occurred and how did you solve it.
clxxvii
clxxviii
clxxix
AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch
Power Supply
clxxx
Passed
Failed
SAFETY PRECAUTIONS
Occupational Health and Safety (OHS) refers to the legislation,
policies, procedures and activities that aim to protect the health, safety and
welfare of all people at the workplace.
Every worker has the right to a healthy and safe work and to a work
environment that enables them to live a socially and economically productive
life. Safety practices should be learned early and must be followed when
working with any electrical device including personal computers and
peripherals.
clxxxi
Electron
clxxxii
Proton
Matter
Atom
Current
Voltage
Resistance
Conductors are materials that easily allow the flow of current, or it has
a low resistance to current flow.
Examples; aluminum, gold, silver, copper, iron
Insulators are materials that do not easily allow the flow of current, or
it has a high resistance to current flow.
Examples; rubber, plastic, paper
clxxxiii
Types of Current
1. Direct Current
In direct current (DC), the flow of electric charge is only in one
direction, the type of electricity produced by batteries, static, and lightning.A
voltage is created and maybe stored until it is consumed when the current
flows directly, in one direction. In the circuit, the current flows at a specific,
constant voltage (this is oversimplified somewhat but good enough for our
needs.) When you use a flashlight, pocket radio, portable CD player or
virtually any other type of portable or battery-powered device, you are using
direct current.
Most DC circuits are relatively low in voltage; for example, your car's
battery is approximately 12V, and that's about as high a DC voltage as most
people ever use.
Source: www.electrostudy.com
clxxxiv
2. AC Alternating Current
In alternating current (AC, also ac) the movement of electric charge
periodically reverses direction. This type of electricity is produced or
generated by AC generators commonly from a hydro electric plant. It is the
commercial power that we use in homes and offices. Delivered through a
power transmission lines.AC current can be reduced through the use of
power transformer to suite for its application.It can also be converted to DC
for a specific purpose. In the Philippines AC is rated as 220V AC at 60 Hz.
Alternating currents change direction, flowing first one way and then
the other. They are sinusoidal waves, so that they change in time. They are
produced from sources such as power supplies and AC generators. In North
America, AC is 120 volts and 60 hertz or cycles per second. This means it
changes direction 60 times per second. In Europe, it is generally 50 hertz with
220 to 240 volts.
Source: www.electrostudy.com
clxxxv
PCs use only direct current, which means that the alternating current
provided by your utility must be converted to direct current before use.
This is the primary function of your power supply.
AC POWER
PCs PSU
DC POWER
MOTHERBOARD
DRIVES
COOLING FANS
clxxxvi
Types of Circuit
1. Open Circuit - a type of circuit that has an open path for current to flow. It
means that current cannot flow in open circuit.
Supply
Load
Switch
Load
Supply
Switch
Figure6. A closed circuit
The switch is said to be CLOSED the current cant flow into the circuit
and the bulb is ON
clxxxvii
I. Identification:
Direction: Identify the following statement.
_________1.
_________2.
_________3.
_________4.
_________5.
Anything that occupy space and has mass. It can be a solid, liquid
or gas in state.
_________6.
_________7.
_________8.
The amount of pulling force that makes the electron flow. Also
known as potential difference or EMF (electromotive force). The
amount of voltage can be measured in volt (V).
_________9.
_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.
clxxxviii
clxxxix
2.
3.
4.
5.
Peopleware
Untrained personnel could have damaged programs in PC.
Firmware
Programs or software burnt in chips may be corrupted.
Software
Corrupted operating systems would cause the system to fail.
Hardware
Defective hardware components would lead to computer malfunction.
Hardware conflicts and viruses can hinder your computers performance.
cxc
Component Isolation
This section will aid in determining components in your system which
are failing. First, most systems have 3 major components; monitor, system
unit, and printers. Some have multiple external devices. To troubleshoot, you
need to isolate major components which are failing to operate.
Diagnostics Procedure for ATX Power Supply Failure
1. Determine whether or not the power comes on.
2. Check the switch operation with a Digital Volt Meter on the
continuity or resistance setting.
3. Check the pins if the corresponding voltage are properly
regulated to the motherboard.
4. Replace the power supply unit if defective.
cxci
cxcii
Things to Consider:
There are many devices, parts, cords, and connections on a computer,
which means that there are many possible problems that could arise. In
addition, your computer uses a variety of software, which can also cause
problems. However, no matter what the problem is, you can use the
following tips to help you find a solution:
Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If the
basic troubleshooting steps don't work, you may need the information you
have taken.
Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you
don't repeat yourself. If you can't remember it, then write it down. If you
end up asking someone for help, it will be much easier if they know
exactly which steps you've taken.
cxciii
If a program is running slowly or otherwise isn't working right, the first thing
you should try is closing the program and re-opening it.
You can also shut down your computer, wait a few seconds, and boot it
up again. Some minor problems will work themselves out when you do
this.
Check with the company for any known problems or updates to the
software.
cxciv
10.Resetting
Figure
a surge protector
If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case and
the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often, this
will require you to plug a lamp or other electrical device into the outlet to
make sure it is receiving power.
If the computer is plugged into a surge protector, verify that it is turned
on. You may have to reset the surge protector by turning it off and then
back on. You can also plug a lamp or other device into the surge protector
to verify that it is on.
cxcv
If you are using a laptop, the battery may not be charged. Plug the AC
adapter into the wall and then try to turn on the laptop. If it still doesn't
start up, you may need to wait a few minutes and then try again.
cxcvi
Check for overheating. Make sure the vents in the case are not blocked.
Confirm that there is good air flow around the computer.
Update your antivirus software and scan for viruses.
Figure13.Virus Scanning
Problems with the Monitor and Speakers
No Picture on the Monitor
Check the volume control on your computer. In Windows, the sound icon
will usually be on the taskbar, and you can also access the sound options
in the Control Panel. On Macs, the sound options are found at the top of
the screen or in System Preferences.
Most media programs (such as iTunes or Windows Media Player) have
a volume control, which will need to be turned up.
Make sure the speakers are turned on, if using external speakers.
cxcviii
Make sure external speakers are connected to the correct audio port or a
USB port. If your computer has color-coded ports, the audio output will
usually be green.
Connect headphones to the correct audio port and determine if sound is
audible from the headphones.
cxcix
Passed Failed
cc
cci
4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic
discharge in the work area.
ccii
Source: www.nudata.com
Source: www.ted-kyte.com
cciii
Solution
Because of the large variety of network configurations, operating
systems and setup, not all of the below information may apply to your network
or operating system. If your computer is connected to a company or large
network, or you are not the administrator of the network, it is recommended
that if you are unable to resolve your issues after following the below
recommendations, you should contact the network administrator or company
representative.
Verify connections / LEDs
Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable,
ensure that the LEDs on the network are properly illuminated. For example, a
network card with a solid green LED or light usually indicates that the card is
either connected or receiving a signal.
If, however, the card does not have any lights or has orange or red
lights, it is possible that the card is bad, not connected properly, or the card is
not receiving a signal from the network.
cciv
7. When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For
example, when using the above values on one computer you would want
to use an IP address of 102.55.92.2 on another computer and then specify
the same Subnet Mask.
Firewall
If your computer network utilizes a firewall, ensure that all ports required
are open. If possible, close the firewall software program or disconnect the
computer from the firewall to ensure it is not causing the problem.
Additional time
In some cases it may take a computer some additional time to detect
or see the network. If after booting the computer you are unable to see the
network, give the computer 2-3 minutes to detect the network. Windows users
may also want to try pressing the F5 (refresh) key when in Network
Neighborhood to refresh the network connections and possibly detect the
network
Additional troubleshooting
If after following or verifying the above recommendations you are still
unable to connect or see the network, attempt one or more of the below
recommendations.
If you have installed or are using TCP/IP as your protocol you can ping
another computer's IP address to verify if the computer is able to send and
receive data. To do this, Windows or MS-DOS users must be at a prompt and
Linux / Unix variant users must open or be at a shell.
Once at the prompt assuming, that the address of the computer you
wish to ping is 102.55.92.2, you would type:
ping 102.55.92.2
If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the
network. If you are still unable to connect or see the network, it is possible
that other issues may be present.
Another method of determining network issues is to use the tracert
command if you are a MS-DOS or Windows user or the trace route command
ccvi
if you are a Linux / Unix variant user. To use this command you must be at
the command prompt or shell. Ortrace route 102.55.92.2
This should begin listing the hops between the computer and network
devices. When the connection fails, determine what device is causing the
issue by reviewingthe trace route listing.
ccviii
Failed
ccix
ccx
hardware
solutions
to
handle
day-to-day
ccxi
Smooth Setup
One key advantage of a peer-to-peer network is that its easy to setup.
With the simplest sort of peer-to-peer network, you just use the built-in
networking that comes with your operating system (Windows 98, Windows
XP, Windows 7, Windows 8 and so on) and you have very little software to
set up even less if you have computers that have the operating system
preinstalled, as most computers do these days.
For Windows XP and Windows 7, the basic steps to setting up a peerto-peer network are as follows:
(Review for Cabling) UTP Cable
A UTP cable (category 5) is one of the most popular LAN cables. This
cable consists of 4 twisted pairs of metal wires (that means there are 8 wires
in the cable). Adding RJ45 connectors at both ends of the UTP cable it
becomes a LAN cable they usually use.
ccxii
Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter
Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we
call this side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it
tightly.
5. Make the other side of the cable (we call this side B-side) in the same
way.
6. After you made it, you don't need to take care of the direction of the cable.
(Any cable in this page is directionless --- that means you can set either
end of the cable to either device.)
ccxiii
The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white
twisted pairs.
10 Base T / 100 Base T Straight
10BaseT and 100BaseT are most common mode of LAN. You can use
UTP category-5 cable for both modes. (You can use UTP category-3 cable for
10BaseT, in which there are only 3 wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it
to connect 2 hubs in the case one of the hubs has an uplink port (and you use
normal port on the other hub).
Pin ID
1
2
3
4
5
6
7
8
side A
side B
orange-white
orange
green-white
blue
blue-white
green
brown-white
brown
orange-white
orange
green-white
blue
blue-white
green
brown-white
brown
ccxiv
side A
orangewhite
orange
side B
greenwhite
green
3
4
greenwhite
blue
orangewhite
blue
5
6
7
8
blue-white
green
brownwhite
brown
blue-white
orange
brownwhite
brown
2. Start Windows and install the network drivers. Windows may detect your
network card and install the drivers when you start the computer. If the
network card drivers are not included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
3. Choose a client and a common protocol for each computer. To do this,
follow these steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click Add, click Client, and then click Add.
c. In the Manufacturers box, click the appropriate manufacturer, click the
appropriate client in the Network Clients box, and then click OK.
d. Click Add, click Protocol, and then click Add.
e. In the Manufacturers box, click the appropriate manufacturer, click the
appropriate protocol in the Network Protocol box, and then click OK.
4. Configure a peer server. Each computer that is configured for File and
Printer Sharing can act as a server. To configure a computer for File and
Printer Sharing, use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click File and Print Sharing, click one or both options to share files and
printers, click OK, and then click OK again.
c. Click Yes when you are prompted to restart your computer.
5. Give each computer a unique computer name. To do this, use the following
steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. On the Identification tab, type a unique name in the Computer name box.
c. Click OK, and then click Yes when you are prompted to restart your
computer.
NOTE: The computer name must be unique for each computer on the
: network and should be no more than 15 characters in length. In small
networks, the workgroup name should be the same for each computer
so that all computers are visible in the same workgroup when
browsing. You should not use spaces or the following characters in
ccxvi
computer and workgroup names
ccxvii
Total:
More Security for Remote Desktop
Task2. Analyze the situations below and answer the questions that
follow.
When Enzo travels on company business, he finds its a great help to be able
to access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.One way you can help Enzo to
add more security is to change the port that Remote Desktop uses.
Knowledgeable hackers know that Remote Desktop uses port 3389, but if you
change this port to a secret port, hackers are less likely to find the open port.
Search the MicrosoftKnowledge Base articles (support.microsoft.com) for a
way to change the port that RemoteDesktop uses. Practice implementing this
change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use another
computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer using
the secret port. Print a screen shot showing how you made the connection using
the secret port. Verify the session works by transferring files in both directions.
3. What secret port did you use?
ccxviii
THE
CONFIGURED
COMPUTER
After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
Finally, reinstall all covers correctly before returning the unit to the
customers.
ccxix
Electrical safety
Electric current from power, telephone, and communication cables can
be hazardous. To avoid personal injury or equipment damage, disconnect the
attached power cords, telecommunications systems, networks and modems
before you open the server/workstation covers, unless instructed otherwise in
the installation and configuration procedure.
Precautions
Disconnect all power before:
Performing a mechanical inspection
Working near power supplies
Removing or installing main units
Before starting work on the machine, unplug the power cord.
Never assume that power has been disconnected from a circuit.
First, check that it has been powered-off.
Always look carefully for possible hazards in your work
Moist floors
Non-grounded power extension cables
Power surges.
If an electrical accident occurs:
Switch off power
Send another person to get medical aid
Safety Inspection Guide
These steps will help you identify potentially unsafe conditions on electrical
products:
Check exterior covers for damage (loose, broken, or sharp edges)
Power-off computer. Disconnect the power cord.
The power cord should be the appropriate type.
Insulation on the power cord must not be frayed or worn out.
Remove the cover.
Check for any obvious alteration. Use good judgment as to the
safety of any alterations.
Check for worn out, frayed or pinched cables.
Check that the power-supply cover fasteners (screws or rivets)
have not been removed or tampered with.
Accident Reporting Policy and Procedure
There must be a process put in place to report accidents, incidents or near
misses for immediate action and to help track causes. The organization needs to
ccxx
ccxxi
ccxxii
Accident reports
Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.
Accident reports contain the following details:
Name:
Type of Injury
Yr/Sec:
Cause of Injury
Remedy
ccxxiii
Memory
Video Cards (also referred to as a graphics accelerator)
Network Interface Card
Hard disk drive
Motherboard
Processor
CMOS Battery
CD/DVD Drive
Sound card
ccxxiv
Memory
Video card
NIC
Motherboard
HDD
ccxxv
ccxxvi
5. Empty Recycle Bin: Delete all the files and folders from the recycle bin
and you will get the space of C drive for reusability.
ccxxvii
ccxxviii
only installing one drive or the new drive is to be the master then use the
master connector, if the drive is to be the slave then use the slave connector.
The IDE cable will be marked down one side with a red or black strip,
this denotes Pin 1, match this with the Pin 1 indicator on the back of the hard
drive.
The power cable you will find in your case is attached to your power
supply; you can see an example below in figure 35.
Figure
34. Standard IDE Cable
ccxxix
ccxxx
Quick Steps
Quick Steps
ccxxxi
Quick Steps
ccxxxii
Quick Steps
Network problem is
not accessible
Message: "....is not
accessible. You may
not have permission to
use this network
resource. Contact the
administrator of this
server to find out if you
have access
permissions. The
semaphore timeout
period has expired."
Possible Solutions
Make sure no any firewall running.
Make sure you have created the same
workgroup, and the same username for logging
on a remote computer.
3. Check user's rights.
4. You may want to enable guest account on
windows.
5. if you are using simple file sharing, you may try
to disable it and re-share the drive manually.
6. If it is mixed OS network, enable NetBIOS over
TCP/IP.
7. Make sure the Computer Browser service is
started if all computers are w2k/xp.
8. Stop Computer Browser service on wwin9x, ME
and NT if this is a mixed OS network.
9. Cache
credential
by
using
net
use \\computername\share /user:username
command (it is better to have the username
logon shared computer).
10. If you have tried enabling netbios over tcp/ip but
doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
12. Still
need
help,
contact
consultant at http://hidev.com/contactus.asp for
the tech support.
1.
2.
transactions"
to create it.
"Multiple connections
to the server or shared
resource are not
allowed"
Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all previous
connections to the
server or shared
resource and try
again."
"Network path not
found" in a domain
network 1
SYMPTOMS:
When trying to join a
domain by using he
NetBIOS
domain
name,
you
are
successful but not the
FQDN and you may
receive one of the
following
error
messages:
ccxxxv
SYMPTOMS:
When
accessing shares on a
server from a client,
you may receive "Not
enough server storage
is available to process
this command." error.
You may receive this
message and Event ID:
2011 after you install
Norton Antivirus for
Windows.
ccxxxvi
available".
"The
password
is
incorrect. Try again"
ccxxxvii
"Unable
to
access
Computers near Me" or
"Workgroup
is
not
accessible" errors
"Unable to Browse
Network"
1.
2.
3.
4.
ccxxxviii
ccxxxix
ccxl
ccxli
Integrated Peripherals
This menu allows you to change the various I/O devices such as IDE
controllers, serial ports, parallel port, keyboard etc. You can make changes as
necessary.
ccxlii
PnP/PCI Configurations
This menu allows you to configure your PCI slots. You can assign
IRQ's for various PCI slots. It is recommended that you leave the default
settings as it can get a bit complicated messing around with IRQ's
ccxliii
ccxliv
ccxlv
Task 1. The BIOS settings in the CMOS memory have become corrupted
or damaged
Task: Check the CMOS battery and replace if needed.
Procedure:
1. Power on your desktop pc and wait for the POST
2. Read the Power on self-test report and do the necessary procedure to
solve the problem.
3. Boot up your pc into BIOS setup.
4. Look for incorrect or changing time settings. A noticeable symptom is an
invalid time showing within the operating system. This symptom is confirmed
if time sets after the computer system is restarted. Under these
circumstances,
the
CMOS
battery
should
be
replaced.
Procedure: On how to replace the CMOS Battery.
1. Locate your CMOS battery
2. Obtain battery information
3. Removing the battery
4. Insert the new battery
5. Enter CMOS values
You will be assessed using the following criteria
Evaluation
CRITERIA
Passed
Failed
ccxlvi
ccxlvii
Hardware Upgrade
Tool, Materials, and Equipment
Tools
Philip Screw Deriver
Anti-static wrist strap
Anti-static mat
Equipment
Network Card
Network Card Upgrade
Given the tools and materials, upgrade your computer by installing a
network card.
Failed
ccxlviii
Hardware
Software
Firmware
Keyboard connector
Mouse Connector
ccxlix
4. Power supply
Power cord
Fuse
Fuse
Power cord
ccl
ccli
Task to be accomplished
Hardware component testing
Status
Working
properly
Software testing
Not working
properly
Status
Working
properly
Not working
properly
cclii
ccliii
1 Beep
Error message
Memory refresh failure
Memory parity error
Solution
Check memory
Check memory
Check memory
2 Beeps
3 Beeps
4Beeps
5Beeps
Processor exception
interrupt
Replace motherboard
Replace processor
Replace motherboard
Replace processor
6 Beeps
7 Beeps
8 Beeps
9 Beeps
10 Beeps
Display memory
read/write failure
ROM checksum error
CMOS shutdown
read/write error
Bad cache memory
Replace BIOS
chip/Motherboard
Replace BIOS
chip/Motherboard
Replace cache memory
ccliv
Indicator
Error message
1-1-4-1
Cache error
1-2-2-3
Solution
Check cache memory
Check BIOS ROM
Check DRAM
Keyboard controller
test
RAM failure
Check keyboard
controller
Check memory
1-3-1-1
1-3-1-3
1-3-4-1
RAM failure data bits
of low memory bus
Check memory
Check memory
1-3-4-3
RAM failure data bits
of high memory bus
1-4-1-1
Check ROM
ROM copyright notice
2-1-2-3
Test for unexpected
interrupt
cclv
Error message
Solution
Video error
Non-fatal error
1-2-2-3
1-3-4-1
2-1-2-3
1-1-4-1
1-3-1-1
cclvi
Directions:
Test I. Identify the tools presented below and write your answer in separate
paper.
1.
2.
3.
4.
5.
cclvii
Directions:
Test II. List down at list Five (5) common problem and solution. Use a
separate sheet of paper if needed.
Common Problem
Solution
cclviii
Assigned Task
Hardware component testing
Condition
Working
properly
Not working
properly
Computer monitor
Power supply
Keyboard
Mouse
cclix
CRITERIA
Percentage
20%
20%
30%
30%
Performance Rating
100%
Percentage
30%
30%
40%
Performance Rating
100%
cclx
POST ASSESSMENT
Do the Activity on More Security for Remote Desktop
When Enzo travels on company business, he finds its a great help to
access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.
One way to help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop
uses port 3389, but if you change this port to a secret port, hackers are less
likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop
uses.
Practice implementing this change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop session
to the host computer. Verify the session works by transferring files in both
directions.
2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer
using the secret port. Print a screen shot showing how you made the
connection using the secret port. Verify the session works by transferring files
in both directions.
3. What secret port did you use?
cclxi
Instruction:
I Can
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to onform with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration
in accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures
(SOP)
YES
NO
cclxii
cclxiii
__________10. Just like the mouse problem, when you open a program that
will take the whole screen like for example a game and/or a program
applications, when you close it, it will cause your system to restart.
II. Choose the letter of the best answer:
1) These are moderately dangerous types of errors among those that can
pop up on your PC. System errors are caused by malfunctioning
hardware components, corrupted operating system modules, etc.
a. System error
b. Runtime errors
c. Stop errors
d. Device managers errors
c. Stop errors
d. Device managers errors
c. Stop errors
d. Device managers errors
c. Stop errors
d. Device managers errors
c. Application errors
d. Post Code errors
cclxiv
10) a type of circuit that has an open path for current to flow. It means that
current cannot flow in open circuit.
a. Open circuit
b. resistance
c. Current circuit
d. close circuit
Column B
A. Screw drivers
B. Pliers and tweezers
C. Soldering iron
D. Lens cleaner
spray
F. Thermal paste
G. LAN Tester
H. Crimping tool
I.
IV. Arrange the following steps in verifying the correct protocols are
installed on the computer.
_____Within the configuration tab double-click the TCP/IP protocol icon.
Note: Do not click on the PPP or Dial-Up adapter, click on the network card
adapter.
_____Select the option to specify an IP address
_____Click Start / Settings / Control Panel
_____Double-click the Network icon
_____In the TCP/IP properties click the IP address tab
_____When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For example,
when using the above values on one computer you would want to use an IP
address of 102.55.92.2 on another computer and then specify the same
Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an
address could be:IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192
cclxvi
V. List down at list Five (5) common computer problems and solutions.
Common Computer Problems
1.
2.
3.
4.
5.
Solutions
cclxvii
cclxviii
cclxix
Motherboard - Also called the "system board," it is the main printed circuit
board in an electronic device, which contains sockets that accept additional
boards. In a desktop computer, the motherboard contains the CPU, chipset,
PCI bus slots, AGP slot, memory sockets and controller circuits for the
keyboard, mouse, disks and printer. It may also have built-in controllers for
modem, sound, display and network, obviating the need to plug in a card. A
laptop motherboard typically has all peripheral controllers built in.
Operating System - The master control program that runs the computer. The
first program loaded when the computer is turned on, its main part, the
"kernel," resides in memory at all times. The operating system sets the
standards for all application programs that run in the computer. The
applications "talk to" the operating system for all user interface and file
management operations. Also called an "executive" or "supervisor," an
operating system performs the following functions.
Peripheral -Any hardware device connected to a computer, such as a
monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick,
paddle or mouse
Server - A computer system in a network that is shared by multiple users.
Servers come in all sizes from x86-based PCs to IBM mainframes. A server
may have a keyboard, monitor and mouse directly attached, or one keyboard,
monitor and mouse may connect to any number of servers via a KVM switch.
Servers may be also be accessed only through a network connection as well.
cclxx