Grade 9 CHS LM Module

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 270

Basic Education Curriculum

TECHNOLOGY AND LIVELIHOOD


EDUCATION

Information and Communications


Technology

Computer Hardware Servicing

Learners Material
GOVERNMENT PROPERTY
NOT FOR SALE
ALLOTTED TO

District/ School: _________________________________________


Division _________________________________________________
First Year of Use: _________________________________________
Source of Fund (Year included):__________________________

Department of Education
Republic of the Philippines
Computer Hardware Servicing Grade 9
Learners Material
First Edition, 2013
ISBN: ___________
Republic Act 8293, section 176states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Published by the Department of Education
Secretary: Br. Armin A. Luistro FSC
Undersecretary: Dina S.Ocampo, Ph.D.
Assistant Secretary: Lorna Dig Dino, Ph.D.
Development Team of the Learners Material
Authors: Rosalie P. Lujero and Ronaldo V. Ramilo
Editors: Joemar A. Garraton
Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas
Illustrator and Layout Artists:
Subject Specialist: Owen M. Milambiling
Management Team: Dr.Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Marias,
Dr. Jose D. Tuguinayo, Jr.

Printed in the Philippines by ____________


Department of Education-Instructional Materials Council Secretariat(DepEd-IMCS)
nd
Office Address:
2 Floor Dorm G, Philsports Complex, Meralco Avenue,
Pasig City, Philippines 1600
Telefax:
(02) 634-1054, 634-1072
E-mail Address:
imcsetd@yahoo.com

ii

TABLE OF CONTENTS

Module 1: PERSONAL ENTREPRENEURIAL COMPETENCIES


Explore your Understanding .

Guide Questions .

Pre-Assessment .

Self-Assessment

Lesson 1 .

Firm Up .

Deepen ...

10

Transfer ..

12

Post-Assessment .

14

Feedback ..

16

Module 2: ENVIRONMENT AND MARKET


Explore your Understanding ..

18

Lesson 1: Needs and Wants of People ..

19

Lesson 2: Generating Ideas for Business .

20

Lesson 3: Selecting the Right Ideas

22

Lesson 4: Environmental Scanning

23

Firm Up ..

24

Deepen ......

24

Transfer ..

29

Post-Assessment .

30

Feedback

31

Module 3: INSTALL COMPUTER SYSTEMS AND NETWORKS

iii

Introduction

33

Objectives..

34

Pre- Assessment

35

Lesson 1: PLAN AND PREPARE FOR INSTALLATION

36

1.1 Safety Measures: OHS Policies and Procedures

36

1.2 Understanding Computer System..

46

1.3 Computer Systems, Devices and Peripheral ..

46

1.4 Network.....

64

1.5 Materials, tools, equipment and testing devices..

70

Lesson 2: INSTALL EQUIPMENT / DEVICES and SYSTEMS .

76

2. 1 Safety Precautions...

76

2.2 System Specification....

80

2.3 Installation of Hardware components and other peripherals

84

2.4 Installing Operating System ..

106

2.5 Windows 7 installation ...

123

2.6 Basic Computer Configuration Set- up ...

136

Lesson 3: CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM

145

.
3.1. Testing Installed equipment/devices/system...

145

Summative Test ..

153

Post- Test .

158

References

159

Glossary of Terms.

161

Acronyms ..

163

Module 4: DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEM

165

Pre- assessment

167

iv

Lesson 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEM


.

169

1.1 Safety Precautions

169

1.2 Types of Computer System Error ....

173
175

1.3 Diagnosing Computer Systems

......

Lesson 2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS

180

AND NETWORKS
2.1 Safety Precautions ...

180

2.2 Basic Concepts of Electricity

181

2.3 Techniques for Testing Computer System.

188

2.4 Tools for Testing Computer System...

200

2.5 Troubleshooting Computer System Network ...

204

2.6 Computer System and Network Configurations ..

211

Lesson 3: INSPECT AND TEST THE CONFIGURED COMPUTER SYSTEMS


AND NETWORKS ..

221

3.1 General Safety Tips and Reminders

221

3.2 Replacing Different Components .

226

3.3 Upgrading your Computer Components .

228

3.3 Basic Network Errors ..

233

3.4 Award BOS / CMOS Setup

243

Lesson 4: TEST SYSTEMS AND NETWORKS..

253

4.1 Testing Computer System .

253

4.2 Error Beep Codes ..

257

Post Assessment .

266

Summative Test ..

268

References ..

273

Glossary ..

275

vi

Technology and Livelihood Education


Entrepreneurship
Module 1: Personal Entrepreneurial Competencies

Have you ever thought about running your own business? Entrepreneurship has brought
great success to some people, but it's not a career path for all. Do you think you can handle
the stress and hard work that go with running a small business enterprise? The key to
success in a small business enterprise is your entrepreneurial ability to produce the desired
results. Before embarking on your first business, it's worth spending some time evaluating
your own preparedness for entrepreneurship. Try to examine your own personality and
compare it with the Personal Entrepreneurial Competencies (PECs) of a successful
entrepreneur. Ask yourself if you are ready to enter into the world of business. If your answer
is yes, consider this reminder:Successful entrepreneurs continuously develop and
improve their PECs.

EXPLORE Your Understanding

Essential Question

How can one ensure entrepreneurial success?

vii

Content Standard

The learner demonstrates understanding


Entrepreneurial Competencies (PECs)

of

Personal

Performance Standard

The learner prepares an activity plan that addresses his/her


development areas based on his/her PECs and improves further
his/her areas of strength.

Guide Questions:

1. Why is there a need to assess ones personal characteristics, attributes,


lifestyles, skills and traits?
2. What are the personal entrepreneurial competencies of a successful
entrepreneur?
3. Why is it necessary to compare ones personal characteristics, attributes,
lifestyles, skills and traits with the personal entrepreneurial competencies of a
successful entrepreneur?
4. How do you relate your PECs to the PECs of a successful entrepreneur?
5. Based on the data that you have gathered from the interview with the
successfulentrepreneur in your community, how do you develop your PECs?
6. Can you prepare an action plan that addresses your areas of development
and strength based on your PECs?
7. How does your action plan help sustain your strong areas and / or address
your development areas based on your PECs?
Hello there!

Are you ready to assess yourself to become a successful

entrepreneur in the future? As honestly as you can, please answer the preassessment below.

viii

Pre- Assessment

A.

Matching Type
Directions: Column A lists the characteristics of a successful entrepreneur.
Draw a line from each of the items in Column A that connectsto
each of the correct definition of terms listed in Column B.

Column A

1. Hardworking
2. Self-Confident
3. Profit-Oriented
4. Goal-Oriented
5. Persistent
6. Responds to feedback
7. Willing to listen
8. Committed
9. Reliable and has integrity

Column B

a. Ability to set realistic targets


b. Interest in money generation
c. To succeed, one must believe in ones
self
d. Working diligently and industriously
e. Being able to heed the advice of others
f. Obtaining useful comments and advice
from others
g. Being patient as one strives to achieve
the goal
h. Ability to take measures or calculated
threats
i. Being honest, fair, and trustworthy
j. A major characteristic that is a priority in
the entrepreneurs life

10. Risk-Taker

Are you done? This time you will do another set of pre- assessment which
could giveyou a better understanding of what this module isall about. Are
you ready? Lets begin!

ix

Multiple Choice.
Directions:Read and study the situation that describes entrepreneurial
characteristics or attributes. Answer the question by writing the letter of your
choice in your assignment notebook or on the answer sheet provided.
Ms. Juliana Frances Rose opens up her own retail business. She knows that her
personal entrepreneurial characteristics are insufficient to ensure the successful
operationalization of a business that she has in mind. Your answers to the questions
below will help in developing her PECs.

1. What PECs must she possessif there are customers who complain about the
quality of her product?
a. Patience
b. Hardwork
c. Versatility
d. All of the above
2.

Which of the following is NOT considered as a characteristic of an


entrepreneur?
a. Copes with failure
b. Dependent
c. Persistent
d. Opportunity seeker

3.

If she wants to ensure a profitable business operation, what characteristic will


she maintain?
a. Commited
b. Goal oriented
c. Futuristic
d. Opportunity seeker

4.

Ms. Juliana follows the advice of a friend to be flexible especially if she intends
to open a retail business. What PECs has been demonstrated by
Mrs.Pakingan?
a. Self- Confidence
b. Reliable and integrity
c. Open to feedback
d. Oppenes to Persistence

5. She tells Rio, her best friend that she has a strong will and does not give up
finding a solution to a business problem. What PECs has been demonstrated
by Mrs. Pakingan?
a. Hard work
b. Persistence
c. Self-Confidence
d. Risk- Taking

This timeevaluate your own personal entrepreneurial characteristicsto


determine whether you too, can become an entrepreneur. If you are ready,
you may begin!

xi

C. Self- Assessment

Directions:Below is a list of Personal Entrepreneurial Competencies(PECs) of a successful


entrepreneur.

Put a checkmark in the 2nd column that indicates your strong

PECs. The check markin the 3

rd

column are those PECs that need to be

developed.

My Personal Entrepreneurial Competencies


Personal Entrepreneurial
Competencies of an
Entrepreneur

Strength

Need to be Developed

Hardworking
Self-Confident
Builds for the future
Profit-Oriented
Goal-Oriented
Persistent
Copes with failure
Responds to feedback
Demonstrates initiative
Willing to listen
Sets own standards
Copes with uncertainty
Committed
Builds on strengths
Reliable and has integrity
Risk-Taker

xii

Did you enjoy examining your PECs? You can become asuccessful
entrepreneur someday. Please dont feel badly when you discover
that some of these are still to be developed.
exploration to find answers

to

Continue your

how to improve on

these

underdeveloped PECs.

Lesson1.Important Entrepreneurial Traits


The following are the fundamental characteristics of an entrepreneur:

1. Hard working: If you are determined to run your own business, you must
concentrate on your work either as a producer or a seller. The success of
your business depends on how much time and effort you will spend on it.
2. Self- Confident: You must have a strong faith in your ability despite the
problems that you will encounter along the way.
3. Future-Oriented: Once you enter in a line of business, you must understand
that you are in a non-stop contract as an entrepreneur. It may take several
years to developa business to a reasonable standard. The goal for most
successful business people is to build a secure job and ensure a stable
income for themselves based on their own ability.
4. Profit-Oriented: When you enter the world of business, you are obviously
looking for what you know will be your bread and butter,not only for you, but
also for your family. Therefore, you must see to it that the business can
generate enough income.

Another plan of action is to expand your own

business through the use of your generated income.


5. Goal-Oriented:

An entrepreneur is forward looking.

Youneed advanced

preparation for your business. You set along-term goal for the activities that
are needed, an extensive preparation for the production process and
procedures that you need to go through to acquire human and non-human
resources. Everything in your business will have to be set clearly, organized,
and planned depending on the goal you want to achieve.

xiii

6. Persistent: Differences in opinion and judgment may vary. Your opponent


can be part of the rejection about what you intend to do for your endeavor. As
an entrepreneur, you must be firm, strong-willed, and be able to stick to or
follow your own belief.
7. Copes with Failure: Learn from mistakes. As an entrepreneur, you must
learn how to deal with the frustrations and failures.Instead, turn these into
productive learning experiences.
8. Responds to Feedback or Is open to Feedback: You must be concerned
about knowing how well you are doing and keep track of your performance.
You must obtain useful feedback and advice from other people.
9. Takesthe Initiative: Asuccessful entrepreneur takes the initiative. You must
put yourself in a position where you personally are responsible for the failure
orsuccess of your business.
10. Willing to Listen:

Take time to listen to the advice, suggestions, and

recommendations of fellow entrepreneurs.

These will help your business

grow.
11. SetsOwn Standards:This involves developing and using logical, step-bystep plans to reach the goals, or offering evaluation alternatives, monitoring
progress, and switching to successful strategies for the goal you want to
achieve. To be a successful entrepreneur you must take into consideration
that sales and production depend on your own standards.
12. Copes with Uncertainty:Pursue your vision to be a successfulentrepreneur,
you should know how to handle unusual events that may happen in the
business which include problems in managing the workers, problems on the
delivery of goods and services, and the problems on demand and
production.You must be patient in dealing with these uncertainties.
13. Committed:You should know thatin your business,personal needs,
attachment to your friends, families and relatives are set aside.You must
separate the money for your business from the amount that you need to
spend for personal obligations and lifestyle.
14. Builds on Strengths:Successful business people base their work on
strengths.

Use your manual skills, knowledge in creating products or

xiv

services, knowledge in trade and industry, ability to make and use a wide
network of contacts to build your business.
15. Reliable and has Integrity:As an entrepreneur, to make a wide
networkyou must build a good reputation, possess the courage to do the
right thing, do what you say, walk your talk, be loyal, and be fair in dealing
with subordinates and costumers.
16. Risk-Taker:

Risk sometimes cannot be anticipated.

When misfortunes

happen, consider these as challenges and work them out and set good
alternatives. Risks may result in loss of your business or even bankruptcy.

Activity 1: Assessing the PECs of a Practitioner

Direction:Refer from Activity 2 (Aligning ones PECs) on page 10 to perform the following
tasks:

1. select the appropriate characteristics and traits which you feel best describe a
successful practitioner of contact center servicing in your town. Write down
all the descriptions on the second column;
2. afterhaving completed the list in column two, think of your personal
assessment of a successful practitioner by reflecting it on the third column.
This assessment would give you a good idea of significant characteristics and
traits that a successful practitioner must possess.

Practitioner

Assessment

Characteristics

xv

Traits
-

Activity 2:

Aligning ones PECs

Directions: Choose from the list below the characteristics and traits that best describe your
own personal entrepreneurial characteristics.

Find ways to align them

according to the personal entrepreneurial characteristics of an entrepreneur


which were discussed earlier.

Write your answers in the activity sheet

provided.

Creative

Resourceful

Confident

Ris-Taker

My PECs
Optimistic

1.

Passionate

Persistent

Observant

Organized

Independent

Competent

My simple definition
Flexible
Sensitive

Trustworthy

Things to do to align with PECs of a


successful entrepreneur/practitioner
Committed

Creative

2.
Organized
Dynamic

Knowledgeable

Efficient

Persevering

Hardworking

Decisive

Decision-Maker

StrongMinded

Reliable

Courteous

Try to design a concept map that indicates your traits, characteristics and
skills that you need topossess in order to become a successful entrepreneur.

My PECs

xvi

3. Competent
4. Observant

Activity 3.My PECs that need to be further improved


Directions:At the junction in the street are arrows where positive and negative
characteristics and traits are written.

Pick out the positive PECs thatare

already strong in you, and write them down on the blank arrows on the left
side, right way. PECs written on the arrows at the right side arethe weak
characteristics that need to be further improved, road to improvement.

road to improvement

Right Way

Road to
Improvement

xvii

Lesson 1. Strengthening your Identified PECs


Here are your guides on how to strengthen your own PECs.

1. React positively to criticisms and open to feedback.


2. Always demonstrate positive attitude to achieve a desired goal.
3. Always project a strong and well-balanced behavior.
4. Always exercise an assertive style in your work environment.
5. Avoid being too passive and too aggressive.
6. Dont let anyone worsen your business life.
7. Prioritize your business goal rather than personal goal in order to become a
successful entrepreneur.
8. Acquire specific skills for creating and maintaining a conducivework
environment.
9. Be responsible in everything you do in your business.
10. Always observe business ethics in putting up a business.

Hello! Im here once again reminding you whether you have achieved a
certain point that you could honestly tell that you are already successful in
strengthening your own PECs.Let ssee

Activity 1: My techniques to strengthen PECs


Directions: From the given chart below, write at leastsix techniques that would allow youto
strengthen your own PECs. Write the PECs that you feel that you still need to
focus on to strengthen these.

Example: Self-confidence

xviii

.
.

Selfconfidence

Preparation of an Action Plan


Culminating Activity
Directions:

Examine yourself as an entrepreneur / business person once again. Make a

short list of PECs that you need to strengthen. From this activity, prepare an action plan that
requires further development.You may opt to follow the suggested format below. You may
improve or change itfor so long as it suits your own plan of action.
Sample Action Plan

Specific Purpose Statement: ( Your vision of your future)


Ex. Developing self-confidence in retail business.
Focus

Current

Area

Situation

Goal

Measures
of Success

Actions

Time

Required

Frame

Reward/
Recognition

xix

My PECs

I need to

- To

Achieve

-Selling

-During

-Earns

finished

culminating

expected

activities

income

-After

-Outstanding

develop my

exercise

100%

undefined

my own

completion

characteris-

PECs

of products

development

tics need for during

of

my retail

selling and

business.

learning

performance in

PECs through activities in

the

selling and

producing

selling

principles,

promoting

such as:

products/

production

theories,

products and

_________

services

products,

__________

my

derived from

own culminating

and any of chosen


of career.
-Participate

-To become proper manner in skills

processes of services
any chosen

__________

proficient in when

dealing competition

__________

my chosen with people.

sponsored by

______

skill.

the NGO and

business /
entreprise

GO

Post-Assessment
Answer the post assessment questions below to determine whether there is
significant increase in your understanding of PECs. The feedback to this post
assessment is appended on page 16. Good Luck!

A. Matching Type
Directions: Column A lists the characteristics of a successful entrepreneur.
Draw a line from the items in Column A that connects the correct definition of
terms listed in Column B.
Column A

1. Hardworking
2. Self-Confident
3. Profit-Oriented
4. Goal-Oriented

Column B

a.
b.
c.
d.
e.
f.

Ability to set realistic targets


Interest in money generation
To succeed, one must believe in ones self
Working diligently and industriously
Being able to heed the advice of others
Obtaining useful comments and advice from
others

xx

5. Persistent
6. Responds to feedback
7. Willing to listen
8. Committed

g. Being patient as one strives to achieve the


goal
h. Ability to take measures or calculated
threats
i. Being honest, fair, and trustworthy
j. A major characteristic that is a priority in the
entrepreneurs life

9. Reliable and has integrity


10. Risk-Taker

B. Multiple Choice.
Directions: Read and study the situation that describes entrepreneurial
characteristics or attributes. Answer the question by writing the
letter of your choice in your assignment notebook or on the
answer sheet provided.
Ms. Gillian Myles opens up her own retail business. She knows that her personal
entrepreneurial characteristics are insufficient to ensure the successful operationalization
of a business that she has in mind. Your answers to the questions below will help in
developing her PECs.

1. What PECs must she possess if there are customers who complain about the
quality of her product?
a. Patience
b. Hardwork
c. Versatility
d. All of the above
2. Which of the following is NOT considered as a characteristic of an
entrepreneur?
a. Copes with failure
b. Dependent
c. Persistent
d. Opportunity seeker
3. If she wants to ensure a profitable business operation, what characteristic will
she maintain?

xxi

a. Commited
b. Goal oriented
c. Futuristic
d. Opportunity seeker
4. Ms. Gillianfollows the advice of a friend to be flexible especially if she intends to
open a retail business. What PECs has been demonstrated by Mrs. Magno?
a. Self- Confidence
b. Reliable and integrity
c. Open to feedback
d. Oppenes to Persistence
5. She tells Mary, her best friend that she has a strong will and does not give up
finding a solution to a business problem. What PECs has been demonstrated by
Mrs. Magno?
a. Hard work
b. Persistence
c. Self-Confidence
d. Risk-Taking
Feedback

Pre-assessment/ Post- assessment

A.

Matching Type
1.d

6. f

2.c

7. e

3.b

8. j

4.a

9. i

5.g

10. h

xxii

B. Multiple Choice
1. a
2.b
3.d
4. c
5. b

xxiii

Technology and Livelihood Education


Entrepreneurship
Module 2: Environment and Market

One of your greatest dreams in life is to become a successful


entrepreneur. As a person, you are capable of developing your character and
personality and how to respond to some business challenges and
opportunities. You can make things happen by identifying the opportunities
around you. You may ask yourself these questions: What do people need?
What products and services are available in the market today? Can they be
improved? How are they made or delivered? Can things be done better?
cheaper? faster? cleaner? Can a product which is used for a specific
purpose be also used for some other purposes?
You slowly find answers to these questions as you decide to do the
first step in launching a business enterprise. Be cautious however, that you
should develop ahabit of identifying opportunities around you. Only then will
you find the activity both exciting and easy.

EXPLORE your Understanding


Essential Question
-

How does one select an entrepreneurial activity?

xxiv

Content Standard
-

The learner demonstrates understanding of environment


and market that relates with the career choice.

Performance Standard
-

The learner formulates a business idea based on the


analysis of the environment and market

Guide Questions:
1. How does one determine the product to be produced or services to be
offered and delivered to the target market or customers in a particular
community?
2. How does one select an entrepreneurial activity?
3. How can one respond effectively to a business enterprise?
Hello there! Are you ready to assess your readiness to generate

potential business ideas? Lets try by answering the succeeding


pre-assessment.
Pre-assessment
1. The following are examples of peoples basic needs, except:
a. Recreation
b. Clothing
c. Shelter
d. Food
2. Which of the following should be considered first by a prospective
entrepreneur in choosing the right location for his/her store?
a.
b.
c.
d.

Types of merchandise
The access of the target customers
The attractiveness of the store layout
The prevailing prices of goods in the area

3. Thong plans to put a digi-print studio in their locality. Which of the


following will help him determine a successfulplan for setting up of his
business?
a. Survey of consumer associations
b. Checking for similar business to avoid competition
xxv

c. Getting feedback on the quality of service


d. Conducting a SWOT analysis
4. Caesar studies the population in his immediate community. He is doing
this to
a. identify his would-be suki.
b. Predict who his biggest buyer.
c. select his favorite would be costumers.
d. determine whom to sell his product or service.
5. When an entrepreneur improves and alters products to make it more
appealing to target consumers, he/she is doing an_____ of the product.
a. alteration
b. invention
c. innovation
d. improvisation

Lesson 1: Needs and Wants of People


Everyone has his or her own needs and wants. However, people have
different concepts of needs and wants.

Needs in business are important

things that every individual cannot do without in a society. These include:


1. Basic commodities for consumption
2. Clothing and other personal belongings
3. Shelter, sanitation, and health
4. Education and relaxation
Basic needs are essential to every individual so he/she may be able to
live with dignity and pride in the community of people. These needs can
obviously help you generate business ideas.
Wants are desires, luxury, and extravagance that signify wealth and an
expensive way of living. Wants or desires are considered above all the basic
necessities of life. Some examples are the eagerness or the passion of every
individual which are non- basic needs like: fashion accessories, shoes,

xxvi

clothes; travelling around the world; eating in an exclusive restaurant;


watching movies, concerts, plays; having luxurious cars; wearing expensive
jewelry, perfume; living in impressive homes; and others.
Needs and wants of people are the basic indicators of the kind of
business that you may engage in because it can serve as the measure of
your success. Some other good points that you might consider in business
undertakings are the kind of people, their needs, wants, lifestyle, culture and
tradition, and social orientation that they have.
Lesson 2: Generating Ideas for Business
Here are some ways by which you may generate possible ideas for business.
1. Examine the existing goods and services. Are you satisfied with
the product? What do other people who use the product say about it?
How can it be improved? There are many ways of improving a product
from the way it is made to the way it is packed and sold? You can also
improve the materials used in crafting the product. In addition, you
introduce new ways of using the product, making it more useful and
adaptable to the customers many needs. When you are improving the
product or enhancing it, you are making an innovation. You can also
make an invention by introducing an entirely new product to replace
the old one.
Business ideas may also be generated by examining what goods and
services are sold outside by the community. Very often, these
products are sold in a form that can still be enhanced or improved.
2. Examine the present and future needs. Look at and listen to what
the customers, institution, and communities are missing in terms of
goods and services. Sometimes, these needs are already obvious and
felt at the moment. Other needs are not that obvious because they
can only be felt in the future, in the event of certain developments in
the community. For example, a town will have its electrification facility
in the next six months. Only by that time will the entrepreneur think of
electrically- powered or generated business such as a photocopier,
computer service, digital printing, etc.
3. Examine how the needs are being satisfied. Needs for the products
and services are referred to as market demand. To satisfy these
xxvii

needs is to supply the products and services that meet the demands of
the market. The term market refers to whoever will use or buy the
products or service, and these may be people or institutions such as
other businesses, establishments, organizations, or government
agencies.
There is a very good business opportunity when there is absolutely no
supply to a pressing market demand.
Businesses or industries in the locality also have needs for goods and
services. Their needs for raw materials, maintenance, and other
services such as selling and distribution are good sources of ideas for
business.
4. Examine the available resources around you. Observe what
materials or skills are available in abundance in your area. A business
can be started out of available raw materials by selling them in raw
form and by processing and manufacturing them into finished products.
For example, in a copra-producing town, there will be many coconut
husks and shells available as waste products. These can be
collected and made into coco rags/doormat and charcoal bricks and
sold profitably outside the community.
A group of people in your neighborhood may have some special skills
that can be harnessed for business. For example, women in the
Mountain Province possess loom weaving skills that have been passed
on from one generation to the next generation. Some communities
there set up weaving businesses to produce blankets, as well as
decorative items and various souvenir items for sale to tourists and
lowland communities.
Business ideas can come from your own skills. The work and
experience you may have in agricultural arts, industrial arts, home
economics, and ICT classes will provide you with business
opportunities to acquire the needed skills which will earn for you extra
income, should you decide to engage in income-generating activities.
With your skills, you may also tinker around with various things in your
spare time. Many products were invented this way.

xxviii

5. Read magazines, news articles, and other publications on new


products and techniques or advances in technology. You can pick
up new business ideas from Newsweek, Readers Digest, Business
Magazines, Go Negosyo, KAB materials, Small- industry Journal. The
Internet serves as a library where you may browse and surf on
possible businesses. It will also guide you on how to put the right
product in the right place, at the right price, at the right time.
Listing of possible businesses to set up in an area may also be
available from banks or local non-government organizations.
Lesson 3: Selecting the Right Idea
Once you have embarked on identifying the business
opportunities, you will eventually see that there are many possibilities
that are available for you. It is very unlikely that you will have enough
resources to pursue all of them at once. Which one will you choose?
You have to select the most promising one from amonga
hundred and one ideas. It will be good to do this in stages. In the first
stage, you screen your ideas to narrow them down to about five
choices. In the next stage, trim down the five choices to two options.
In the final stage, choose between the two and decide which business
idea worth pursuing.
In screening your ideas, examine each one in terms of the
following factors:
1. How much capital is needed to put up the business?
2. How big is the demand for the product? Do many people need this
product and will continue to need it for a long time?
3. How is the demand met? Who are processing the products to meet
the need (competition or demand)? How much of the need is now
being met (supply)?
4. Do you have the background and experience needed to run this
particular business?
5. Will the business be legal, not going against any existing or foreseeable
government regulation?
6. Is the business in line with your interest and expertise?
Your answers to these questions will be helpful in screening which
ones from among your many ideas are worth examining further and worth
pursuing.
xxix

Lesson 4: Environmental Scanning


There is a need to conduct environmental scanning to identify the
needs and wants of people, the niche for your business mission, and to give
attention to trends and issues. This may also serve as an evaluation of the
type of the entrepreneurial activity appropriate in the community.

Environmental scanning is defined as a process of gathering,


analyzing, and dispensing information for tactical or strategic purposes. The
environmental scanning process entails obtaining both factual and subjective
information on the business environments in which a company is operating.
External Environment in the community can be viewed according to its
technological, political, legal, environmental, economic, and social aspects.
For example, in the past, people in the community used personal computers
but the transmission of development in terms of technology was interrupted
because people were not satisfied with what they had. They still look for the
changes in their life and corresponding changes in their environment.
As a future entrepreneur, you must be well-versed in this kind of
advancement and progression of your environment, particularly in technology,
so as to secure the success of your future business.

Always think of

something new, something novel, authentic; reinvent the existing ones; and
create your new version of goods/products, and services. For instance, your
own hair straightening is herbal, while in the other salons it is made of
synthetic chemicals.
This kind of changes being made will affect the existing principles in
business and industries that can be easily adapted to the changes in
producing the products/services to meet the needs and wants of people in the
community.

xxx

In generating business idea, you should first identify what type of


business is suited to your business idea. You should analyze and scan the
potential environment, study the marketing practices and strategies of your
competitors, analyze the Strengths, Weaknesses, Opportunities, and the
Threats in your environment to ensure that the products/goods and services
you are planning to offer will be patronized within the easy reach by your
target markets/consumers.
Bear in mind these simple rules for successful SWOT analysis.
1. Be realistic about the strengths and weaknesses of your business
when conducting SWOT analysis.
2. SWOT analysis should distinguish between where your business is
today, and where it could be in how far in the future.
3. SWOT should always be specific. Avoid grey areas.
4. Always apply SWOT in relation to your competition, i.e., better than or
worse than your competition.
5. Keep your SWOT short and simple. Avoid complexity and over
analysis
6. SWOT is subjective.

People keep on searching for new things, new trends, and new issues.
For these reasons, an entrepreneur hurriedly responds to these needs and
wants of people.
As generations come and go, another set of new trends will come or
will exist. In order to adapt to the rapid changes in the business environment,
the existing industries need to improve their products and services. But how
can you generate business ideas with those strong competitors? There are
three main sets of decisions that you need to make-what to produce, how to
produce, and how to share or sell out the product to the market.

xxxi

Activity 1Mini-survey
Directions: Conduct a mini-survey in your immediate community.
Gather pertinent data on population across age brackets as suggested
in the matrix below. Opposite each age group, indicate their probable
needs and wants.

Activity 2 Screening business ideas


Directions:

After filling out the chart above, try to list down all the

probable business opportunities which you may wish to venture in.


Remember to consider the ideas and suggestions discussed in Lesson
3. Use the suggested matrix below to indicate your choice. Write your
answers in your notebook.
Age Bracket
Example:

Population
35

Needs

Wants

Toys, coloring
books, pajamas

Wooden toys, glossy


coloring books, etc.
fashionable pajamas

5 and below
6- 10 years old
11-15 years old
16-20 years old
21-25 years old
26-35 years old
35-45 years old
46-55 years old
56-65 years old
66 and above

xxxii

Example: Selling wooden toys


Positive Factors
Strengths

Opportunities

Negative Factors
Weaknesses

Threats

Activity 3: Survey Questionnaire to Determine Potential


Costumers
Direction: As a group, create/craft a survey questionnaire to determine
a potential customer. This survey form should include the profile of the
potential customers, their needs, wants, lifestyles, culture and tradition
and etc. Questions should be focused on: customers view about the
product and determining their level of satisfaction on the services being
offered.
Administer the survey questionnaire to generate data on your
potential customers.
Below is a sample Survey Questionnaire where you can refer
from. Feel free to revise, add and/or alter items/questions being asked
to make it fit to the target customers.
Sample Survey Questionnaire
I Personal Profile
a.
b.
c.
d.
e.

Name (optional):
Age:
Sex:
Address:
Monthly Income:

II Product /Services Satisfaction:


1. How do I want the contact center services rendered?
____________________________________________________
____________________________________________________
____________________________________________________
___
xxxiii

2. How much would you prefer to pay for services?


____________________________________________________
____________________________________________________
____________________________________________________
___
3. What kind of innovation would you like to be integrated in these
services?
____________________________________________________
____________________________________________________
____________________________________________________
___

4. What else do you want to be included in these types of services?


_____________________________________________________
_____________________________________________________
_____________________________________________________
______

You have experienced creating/crafting a survey questionnaire to


identify potential customers. This time, you are going to
create/craft a survey questionnaire to determine your potential
competitor.

Activity 4: Survey Questionnaire to Determine Potential Competitors


Direction: As part of a group in your class, create/craft a survey questionnaire
to determine a potential competitor. This survey questionnaire should include
the profile of the potential competitor, the products and services being
offered, their manner of delivery, and the innovations that are integrated in
selling these products or services.
Administer the survey questionnaire to generate data on your potential
competitor.
Below is a sample Survey Questionnaire where you can refer from.
Feel free to revise, add and/or alter items/questions being asked to make it fit
to the target competitor.

xxxiv

Sample Survey Questionnaire to Determine the Potential Competitor


I Personal and Business Profile
a.
b.
c.
d.
e.
f.
g.
h.

Name (optional):
Age:
Sex:
Monthly Income:
Name of Business Establishment:
Number of years in business:
Number of Employees/workers:
Business Address:

II Sample Guide Questions to Identify Potential Competitors:


Direction: Utilize the succeeding guide questions during a focused group
discussion to identify potential competitor.
1. What are the business establishments in your community which is
related to your proposed business?
________________________________________________________
________________________________________________________
________________________________________________________
___
2. Who are their common clients, and how do they serve them?
________________________________________________________
________________________________________________________
________________________________________________________
___
3. What are innovations/best practices employed by your potential
competitor?
________________________________________________________
________________________________________________________
________________________________________________________
___
4. What are the raw materials and other resources being utilized by your
potential competitors?
________________________________________________________
________________________________________________________
________________________________________________________
___
xxxv

5. How do your potential competitors procure their resources? Manner of


payment?
________________________________________________________
________________________________________________________
________________________________________________________
___

Now that, you have all the information, are you ready to test your ability
to generate your own business idea? If your answer is yes, start studying the
sample vicinity map of a community with a population of two thousand people.
A new housing project will be constructed adjacent to DaangHari St.close to
Old Molino St., its main road. This housing project targets the homeowners
who are young couples with two kids.

In this activity, you need to answer the questions that may lead to the
generation of a probable business. Your answers to these questions will
serve as the bases in formulating your own business ideas.
1.

Who do you think are your target consumers/markets?

2.

Where is the most ideal location to situate your business?

xxxvi

3.

Which products or services would appeal to your target


consumers/markets?

4.

Can you say that you have seized the most feasible
business opportunity?

Post-assessment
1. The following are examples of peoples basic needs, except:
a. Recreation
b. Clothing
c. Shelter
d. Food
2. Which of the following should be considered first by a prospective
entrepreneur in choosing the right location for his/her store?
a. Types of merchandise
b. The access of the target customers
c. The attractiveness of the store layout
d. The prevailing prices of goods in the area
3. Salie plans to put a digi-print studio in their locality. Which of the
following will help her determine her plan for success in setting up her
business?
a.
b.
c.
d.

Survey of consumer associations


Checking for similar business to avoid competition
Getting feedback on the quality of service
Conducting a SWOT analysis

4. Julius Lorenzo Louise studies the population in his immediate


community. He is doing this to
a. identify his would-be suki.
b. predicting his biggest buyer would be.
c. select his favorite costumers.
d. determine whom to sell his product or service.
5. When an entrepreneur improves and alters products to make it more
appealing to target consumers, he/she is doing an _____ of the
product.
a. alteration
b. invention
c. innovation
d. improvisation
xxxvii

Feedback
Pre-assessment and Post assessment
1. a
2. b
3. d
4. c
5. b

xxxviii

MODULE 3:
INSTALL COMPUTER SYSTEMS AND
NETWORKS
Content Standard
The learner demonstrates
understanding of basic concepts,
underlying theories and core
competencies in computer
systems and networks.

Performance Standard
The learner independently provides
quality and marketable service in
computer hardware servicing in terms
of computer systems and networks
installation and diagnose and trouble
shoot computer systems as
prescribed in the TESDA Training
Regulation.

Number of Sessions (Time Allotment): 60 Hours (2 Quarters)

Welcome to the next level of your modular training in Computer


Hardware Servicing (CHS) under the Information and Communications
Technology (ICT) Course. In this module you will have a great deal of
understanding of Installing Computer Systems and Networks. At the end of
this module you will be able to apply the knowledge and skills on installing
computer hardware, operating system, software components and networks.
Those skills are essential for you to pass the National Certification II in
Computer Hardware Servicing.
In this module, topics will be introduced progressively lesson by lesson
for easy understanding. After carefully answering the diagnostic assessment,
reading all the lessons, answering all the guide questions, masterfully
performing all the activities, showing evidences of learning and finally
answering the summative test, then you will have a considerable knowledge
and skills in installing computer systems and networks essential to be
successful in computer hardware servicing as one of the career option in ICT.
Reminder! Just follow the instructions given in this module. Now let us
start exploring new things in this module.
xxxix

In this module, there will be three (3) major topics that you will
encounter: (1) plan and prepare for installation; (2) install hardware and
software components and operating systems; and (3) conduct test on the
installed computer system. The three major topics contain sub-topics that
discuss the details on installing computer systems and networks. This
module contains what to KNOW, what to PROCESS, what to REFLECT and
UNDERSTAND as well as what to TRANSFER. The competencies for this
module are:
LO 1. Plan and prepare for installation
Observe Occupational Health and Safety policies and procedures in
planning for installation activity in accordance with requirements
Familiarize with computer hardware, software component and other
peripherals in accordance with established procedures on correct
operation and safety policies

Consult appropriate/ technical personnel to ensure that work is coordinated with


others who are involved in the activity
Obtain materials necessary to complete the work
in accordance with
established procedures
Check the materials received against job requirements

LO 2. Install equipment/devices (hardware, software components and


peripherals) and operating systems

Follow OHS procedures in installing devices, systems, networking


devices, and peripherals
Comply with the requirements in installing devices,/systems, networking
devices, and peripherals
Install computer systems, networking devices and peripherals in
accordance with job requirements
Perform installation of devices and variety of operating systems in
accordance with customer/clients requirements
Obtain approval
from appropriate personnel before implementing
contingency procedures
Respond to unplanned events or conditions in accordance to established
procedures
xl

Check the quality of the work undertaken in accordance with the


established procedures

LO 3. Conduct test on the installed computer system


Follow OHS policies and procedures in conducting tests
Check circuits and systems being isolated using specified testing
procedures
Test devices, systems and/or installation to determine its conformity with
the requirements
Undertake final inspections on the installed devices, systems to ensure
conformity with the requirements
Accomplish technical reports on the tests conducted
Follow procedures in forwarding documentation to appropriate personnel
and/or authority on the test conducted
In order to master the above listed competencies, you must be
knowledgeable of the topics under what to KNOW, perform activities required
under what to PROCESS, accomplish additional meaningful tasks under what
to REFLECT and UNDERSTAND and finally show some evidences of your
learning by transferring what you have learned in a different context under
what to TRANSFER.

You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.
SKILLS TEST

Direction: Listed below are some of the most important skills that you
must gain in order to render quality service when you enter the real world of
Computer Hardware Servicing. Read the skills carefully. Write YES if you
are familiar with the skill and NO if not. Feel free to answer each skill. Write
your answers in your notebook.
Skills in Computer Hardware Servicing

YES

NO

I can open a computer case.


I can connect the mouse.
I can connect the keyboard.
I can connect the monitor.

xli

I can apply occupational health and safety precautions while working.


I can remove the system fan.
I can detach the power supply from the system unit.
I know how to remove the RAM from the motherboard.
I can remove the hard drive from the system unit.
I can install the power supply.
I know how to install the motherboard.
I can install the internal drives in a system unit.
I know how to attach RAM in the memory socket.
I can install CD / DVD drives.
I know how to install an operating system
I know how to configure a hardware components and its related
software
I know the procedures in testing the installed computer components

The following topics will enable you to be familiar with planning and
preparing for installation, install equipment and devices, and conduct test on
the installed computer system. All you need to do is to read carefully all the
topics and apply the skills youve gained through the distinct activities
provided in this module.
LESSON 1: PLAN AND PREPARE FOR INSTALLATION
This lesson is intended to develop your skills in planning and preparing
for installation of computer devices and operating system. At the end of this
lesson you are expected to:
Observe OHS policies and procedures in planning for installation activity
in accordance with requirements
Familiarize with computer peripheral/ devices/systems in accordance
with established procedures correct operation and safety

Consult appropriate/ technical personnel to ensure that work is coordinated with


others who are involved in the activity
Obtain materials necessary to complete the work
in accordance with
established procedures
Check the materials received against job requirements

xlii

OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES


Occupational Health and Safety (OHS) Policy An Information and
communication technology (ICT) student should know how to behave when
working in the computer laboratory, as well as implement a safe way of
accomplishing every task. Safety practices should be learned early and
always adheres in working with any electrical and electronic device, including
personal computers and its peripherals. This is for your protection as well as
to the people working with you, and for the devices that you are using. The
basis for this process begins with Occupational Health and Safety Policies.
Occupational safety and health (OSH) is a planned system of working to
prevent illness and injury where you work by recognizing and identifying
hazards and risks. Health and safety procedure is the responsibility of all
persons in the computer and technology industries. You must identify the
hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard. Students
need to be aware of the type of hazards that are possibly present in their work
environment.
Procedure
1. Identify the hazard
2. Clear the area close to the hazard
3. Partition the hazard off or clearly identify the area to protect other
people from harm
4. If the hazard is easily and safely cleared, then do so
If not
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance

xliii

6. Following clearing of the hazard fill out the correct documentation to


assist in identifying improved practice to reduce further incidence of
hazards.
All hazards must be reported using Accidental Report form. This
enables us to track the kinds of hazards we have in our workplace, and take
action where necessary to make it safer for all student and clients.
Accident reports
Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.
Accident reports contain the following details:

Name of the person injured


Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents

Hazardous substances
If the workplace hazard appears to be dangerous to staff and clients
and professional assistance is required:
A. Call the supervisor or manager and advise them of the problem and
the urgency of the matter.
B. Depending on the risk it may be called as an evacuation.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or specialized
personnel who will deal with the spill.

xliv

Accident report sample form


Date:
Form No:

Accident Report Form


Rm. No:

Name:

Type of Injury

Yr/Sec:

Cause of Injury

Remedy

Fire exits
All fire exits should be kept clear of from obstacles. All students have a
responsibility to make sure that chairs, empty boxes or any other type of
obstacle are not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to
ensure that in the event of an emergency there is a clear exit.
Fire Safety Procedure
Each work area has a designated fire warden, who in the event of a fire will
take charge. They are recognized by the wearing of a red hard hat.
If you find the fire

Assess the danger prior to doing anything.


If it is safe to move assist anyone in the vicinity of the fire away from
danger.
xlv

If it is possible close the door to the fire area.


Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.
Break the glass section of the fire alert call point.
Call to the switch; ensure you know where the fire is, any other details
that may be of assistance to the fire brigade. Details could be size of
the fire, cause or type of fire, any people hurt or trapped, has anyone
tried to put it out.
If safe to do so, attack the fire with the correct extinguisher or fire hose.

If the designated fire officer is not present, someone quickly needs


to take responsibility and:
1.
2.
3.
4.

Locate the source of the fire.


Locate any people.
Remove all people from the building.
Once outside do a head count?

5. Notify the authorities.

Personal Safety While Working with PCs


Computer equipment can be dangerous, and you or others can be
injured or even killed if you dont follow proper safety guidelines when
working along with PCs. The following are some precautionary measures to
take before working with any computer equipment:
Wear shoes with non-conductive rubber soles to help reduce the
chance of being shocked or seriously injured in an electrical accident.
Do not work on components that are plugged into their power source.
Do not remove expansion cards from a computer when it is turned on.
Remove jewelries when working inside any computer related
equipment.
Be sure not to mix electronic components and water.

xlvi

Applying OH&S Policies


1.

Group yourselves into six members.

2.

Conduct a simulation on: Applying OHS Policies and Procedures.

3.

The performance will be rated according to the following:

Performance Criteria:
5

- Have shown five OHS policies in different areas

- Have shown four OHS policies in different areas

- Have shown three OH&S policies in different areas

- Have shown two OH&S policies in different areas

Have not shown any OH&S policies

UNDERSTANDING COMPUTER
A computer is one of the most brilliant inventions of mankind. Thanks
to the computer technology, we were able to achieve storage and processing
of huge amounts of data; we could rest our brains by employing computer
memory capacities for storing information. Due to computers, we have been
able to speed up daily work, carry out critical transactions and achieve
accuracy and precision in work. Computers of the earlier years were of the
size of a large room and were required to consume huge amounts of electric
power. However, with the advancing technology, computers have shrunk to
the size of a small watch. Depending on the processing power and size of
computers, they have been classified under various types. Let us look at the
classification of computers.
xlvii

Different Types of Computers


Based on the operational principle of computers, they are categorized
as analog, digital and hybrid computers.
Analog Computers: These are almost extinct today. These are different from
a digital computer because an analog computer can only perform several
mathematical operations simultaneously. It uses continuous variables for
mathematical operations and utilizes mechanical or electrical energy.

Figure1. Different Types of Computer


Digital Computers: They use digital circuits and are designed to operate on
two states, namely bits 0 and 1. They are analogous to states ON and OFF.
Data on these computers is represented as a series of 0s and 1s. Digital
computers are suitable for complex computation and have higher processing
speeds. They are programmable. Digital computers are either general
purpose computers or special purpose ones. Special purpose computers, as
their name suggests, are designed for specific types of data processing while
general purpose computers are meant for general use.
Hybrid Computers: These computers are a combination of both digital and
analog computers. In this type of computers, the digital segments perform
process control by conversion of analog signals to digital ones.
Classification of Computers
The following are the classification of the different types of computers
based on their sizes and functionalities:
xlviii

Mainframe Computers: Large organizations use mainframes for highly


critical applications such as bulk data processing and ERP (Enterprise
Resource Planning). Most of the mainframe computers have the capacities to
host multiple operating systems and operate as a number of virtual machines
and can substitute for several small servers.
Minicomputers: In terms of size and processing capacity, minicomputers lie
in between mainframes and microcomputers. Minicomputers are also called
mid-range systems or workstations. The term began to be popularly used in
the 1960s to refer to relatively smaller third generation computers.
Servers: They are computers designed to provide services to client machines
in a computer network. They have larger storage capacities and powerful
processors. Running on them are programs that serve client requests and
allocate resources like memory and time to client machines. Usually they are
very large in size, as they have large processors and many hard drives. They
are designed to be fail-safe and resistant to crash.
Supercomputers: The highly calculation-intensive tasks can be effectively
performed by means of supercomputers. Quantum physics, mechanics,
weather forecasting, molecular theory are best studied by means of
supercomputers. Their ability of parallel processing and their well-designed
memory hierarchy give the supercomputers, large transaction processing
powers.
Microcomputers: A computer with a microprocessor and its central
processing unit it is known as a microcomputer. They do not occupy space as
much as mainframes do. When supplemented with a keyboard and a mouse,
microcomputers can be called personal computers. A monitor, a keyboard
and other similar input output devices, computer memory in the form of RAM
and a power supply unit come packaged in a microcomputer. These
computers can fit on desks or tables and prove to be the best choice for
single-user tasks.

xlix

Figure2. Classification of Computer


Personal computers come in different forms such as desktops, laptops
and personal digital assistants (refer to Figure 3). Let us look at each of these
types of computers.
Desktops: A desktop is intended to be used on a single location. The spare
parts of a desktop computer are readily available at relatively lower costs.
Power consumption is not as critical as that in laptops. Desktops are widely
popular for daily use in the workplace and households.
Laptops: Similar in operation to desktops, laptop computers are miniaturized
and optimized for mobile use. Laptops run on a single battery or an external
adapter that charges the computer batteries.

Figure3. Types of Personal Computer


Net books: They fall in the category of laptops, but are inexpensive and
relatively smaller in size. They had a smaller feature set and lesser capacities
in comparison to regular laptops, at the time they came into the market.
Personal Digital Assistants (PDAs): It is a handheld computer and popularly
known as a palmtop. It has a touch screen and a memory card for storage of
data. PDAs can also be used as portable audio players, web browsers and
smart phones. Most of them can access the Internet by means of Bluetooth or
Wi-Fi communication.
Tablet Computers: Tablets are mobile computers that are very handy to use.
They use the touch screen technology. Tablets come with an onscreen
keyboard or use a stylus or a digital pen. Apple's iPod redefined the class of
tablet computers.

li

Wearable Computers: A record-setting step in the evolution of computers


was the creation of wearable computers. These computers can be worn on
the body and are often used in the study of behavior modeling and human
health. Military and health professionals have incorporated wearable
computers into their daily routine, as a part of such studies. When the users'
hands and sensory organs are engaged in other activities, wearable
computers are of great help in tracking human actions. Wearable computers
do not have to be turned on and off and remain in operation without user
intervention.

Direction: Identify the type of computer being described in the following


sentences and write your answer on a separate sheet of paper.
1. These are mobile computers that are very handy to use.
2. They are computers designed to provide services to client machines in a
computer network.
3. They are also called mid-range systems or workstations.
4. A computer with a microprocessor and its central processing unit.
5. They fall in the category of laptops, but are inexpensive and relatively smaller in
size.
6. A type of computer which is intended be used on a single location.
7. They use digital circuits and are designed to operate on two states, namely bits
0 and 1.
8. Computers that have the capacities to host multiple operating systems and
operate as a number of virtual machines and can substitute for several small
servers.
9. It is a handheld computer and popularly known as a palmtop.
10. These computers can be worn on the body and are often used in the study of
behavior modeling and human health.

COMPUTER SYSTEM, DEVICES AND PERIPHERALS


As an aspiring computer technician, it is very important to know the
system that runs your computer and different devices attached to it. Each

lii

device plays an important role, without each other computer system will not
work properly.
What is an Operating System?
The operating system is the most
important program that runs on a computer.
Every general-purpose computer must have
an operating system to run other programs.
Operating systems perform basic tasks, such
as recognizing input from the keyboard,
sending output to the display screen, keeping
track of files and directories on the disk, and
controlling peripheral devices such as disk
drives and printers.
For large systems, the operating
system has even greater responsibilities and powers. It is like a traffic cop -- it
makes sure that different program and users running at the same time do not
interfere with each other. The operating system is also responsible
for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
o

Multi-user: Allows two or more users to run programs at the same time.
Some operating systems permit hundreds or even thousands of
concurrent users.
Linux
Unix
Windows 2000
Multiprocessing : Supports running a program on more than one CPU.
Linux
Unix
Windows 2000
Multitasking : Allows more than one program to run concurrently.
Unix
Windows 2000 and Windows multi point
Multithreading : Allows different parts of a single program to run
concurrently.
Linux
Unix
Windows 2000 and Windows 7
Real time: Responds to input instantly. General-purpose operating
systems, such as DOS and UNIX, are not real-time.
liii

Operating systems provide a software platform on which


other application programs can run. The application programs must be written
to run on top of a particular operating system. Your choice of operating
system, therefore, determines to a great extent the applications you can run.
For PCs, the most popular operating systems are DOS, OS/2, and Windows,
but others are available, such as Linux.
What are the devices of a computer?
The physical, touchable, electronic and mechanical parts of a
computer are called the hardware which is composed of different devices
attached to the computer.
The following list represents a basic set of devices found in most
Personal Computers.
1. System Unit- The main part of a microcomputer, sometimes called the
chassis. It includes the following parts: Motherboard, Microprocessor,
Memory Chips, Buses, Ports, Expansion Slots and Cards.

Source: computerit4u.com

Figure4. Tower Type System Unit

liv

2. Motherboard / Mainboard / System Board- The main circuit board of a


computer. It contains all the circuits and components that run the computer.

Source: laptopmd.com

Figure5. Modern Motherboard


3. CPU (Central Processing Unit) - The processor is the main brain or
heart of a computer system. It performs all of the instructions and
calculations that are needed and manages the flow of information through a
computer.

Source: products.yumecompare.com

Figure6. Examples of CPU (Intel Core 2 Duo and AMD Athlon)

lv

4. Primary storage- (internal storage, main memory or memory) is the


computer's working storage space that holds data, instructions for processing
and processed data (information) waiting to be sent to secondary storage.
Physically, primary storage is a collection of RAM chips.
Two (2) Types of Memory
a. ROM (Read Only Memory) ROM is non-volatile, meaning it holds
data even when the power is ON or OFF.
b. RAM (Random Access Memory) RAM is volatile, meaning it holds
data only when the power is on. When the power is off, RAM's
contents are lost.

Source: www.oempcworld.com

Figure 7.Examples of RAM


5. Expansion Bus - A bus is a data pathway between several hardware
components inside or outside a computer. It does not only connect the parts
of the CPU to each other, but also links the CPU with other important
hardware.

Source: www.mypcmag.com

Figure 8.Expansion Bus

lvi

6. Adapters- Printed-circuit boards (also called interface cards) that enable


the computer to use a peripheral device for which it does not have the
necessary connections or circuit boards. They are often used to permit
upgrading to a new different hardware.

Source: www.oempcworld.com

Figure 9. Adapter (Network Adapter)


6. Power Supply Unit (PSU) - Installed in the back corner of the PC case, next
to the motherboard. It converts 120vac (standard house power) into DC
voltages that are used by other components in the PC.

Source:

www.dansdata.com

Figure10. Power supply


8. Hard Disk Drive (HDD) - Also known as hard drive, is a magnetic storage
device that is installed inside the computer. The hard drive is used as
permanent storage for data. In a Windows computer, the hard drive is usually
configured as the C: drive and contains the operating system and
applications.

Source: news.techgenie.com

Figure 11.Hard Disk


lvii

9. Optical Drive- An optical drive is a storage device that uses lasers to read
data on the optical media. There are three types of optical drives: Compact
Disc (CD), Digital Versatile Disc (DVD) and Blu-ray Disc (BD).

Source: www.ktclear.in

Figure12. CD ROM
10. Digital Versatile Disc (DVD) - Designed to optically access data stored
on a DVD. A laser moves back and forth near the disk surface and accesses
data at a very fast rate.

Source: technology7days.blogspot.com

Figure 13.DVD ROM


What are the input and output devices of a computer?
The devices attached to a personal computer can be classified into
two- the input and output devices. Input Device is composed of a device that
accepts data and instructions from the user or from another computer system.
While, output device is any piece of computer hardware that displays results
after the computer has processed the input data that has been entered.

lviii

Two (2) Types of Input Devices


1. Keyboard Entry Data is inputted to the computer through a keyboard.
Keyboard - The first input device developed for the PC. Data is
transferred to the PC over a short cable with a circular 6-pin Mini-din
connector that plugs into the back of the motherboard.

Figure14. Keyboard
2. Direct Entry A form of input that does not require data to be keyed by
someone sitting at a keyboard. Direct-entry devices create machinereadable data on paper, or magnetic media, or feed it directly into the
computers CPU.
Three (3) Categories of Direct Entry Devices
1. Pointing Devices - An input device used to move the pointer (cursor) on
screen.
Mouse - The most common 'pointing
device' used in PCs. Every mouse
has two buttons and most have one
or
two scroll wheels.

Source: www.ztenterprise.com

Figure15. Mouse

Touch screen- A display screen that is sensitive to the touch of a


finger or stylus. Used in myriad applications, including ATM
machines, retail point-of-sale terminals, car navigation and

lix

industrial controls. The touch screen became wildly popular for


smart phones and tablets.

Source: beestsoftwares.blogspot.com

Figure16. Touch Screen Devices


Light Pen - A light-sensitive stylus wired to a video terminal used to
draw pictures or select menu options. The user brings the pen to
the desired point on screen and presses the pen button to make
contact.

Source: majoarciniegas.wordpress.com

Figure17. Light Pen

Digitizer Tablet - A graphics drawing tablet used for sketching new


images or tracing old ones. Also called a "graphics tablet," the user
contacts the surface of the device with a wired or wireless pen or puck.
Often mistakenly called a mouse, the puck is officially the "tablet cursor."

Source: www.tutorialspoint.com

Figure18. Digitizer Tablet

lx

2. Scanning Devices- A device that can read text or illustrations printed on paper
and translates the information into a form the computer can use.

Source: www.ztenterprise.com

Figure19. Image scanner


Source: www.barcodeman.com

Figure20. Bar Code Reader


3. Voice- Input Devices - Audio input devices also known as speech or voice
recognition systems that allow a user to send audio signals to a computer for
processing, recording, or carrying out commands. Audio input devices such
as microphones allow users to speak to the computer in order to record a
voice message or navigate software.

Source: www.digitalwish.com

Figure 21. Microphones


Output Devices
1. Computer Display Monitor- It displays information in visual form, using
text and graphics. The portion of the monitor that displays the information
is called the screen or video display terminal.
Types of Monitor
a. CRT Monitors - Cathode Ray Tubes (CRT) were the only type of displays for
use with desktop PCs. They are relatively big (14" to 16" deep) and heavy (over
15 lbs).
lxi

Figure22. Types of Monitor


b. LCD Monitors Liquid Crystal Display (LCD) technology has been used in
laptops for some time. It has recently been made commercially available as
monitors for desktop PCs.
c. LED Monitors (Light Emitting Diode) - A display and lighting technology used
in almost every electrical and electronic product on the market, from a tiny
on/off light to digital readouts, flashlights, traffic lights and perimeter lighting.

2. LCD Projectors- utilize two sheets of polarizing


material with a liquid crystal solution between
them. An electric current passed through the
liquid causes the crystals to align so that light
cannot pass through them. Each crystal,
therefore, is like a shutter, either allowing light to
pass through or blocking the light.
Source: www.projectorpoint.co.uk
Figure23. LCD Projector

3. Smart Board - A type of display screen that has a touch sensitive


transparent panel covering the screen, which is similar to a touch screen.

Source:
www.projectorpoint.co.uk

Figure24. Smart Board


lxii

4. Printer - A device that prints text or illustrations on paper.


Types of printer
a) Ink-Jet or Bubble-Jet Printer - spays ink at a sheet of paper. Ink-jet
printers produce high-quality text and graphics.
b) Laser Printer - Uses the same technology as copy machines. Laser
printers produce very high quality text and graphics.
c) LCD and LED Printer- Similar to a laser printer, but uses liquid crystals or lightemitting diodes rather than a laser to produce an image on the drum.
d) Line Printer - Contains a chain of characters or pins that print an entire line at
one time. Line printers are very fast, but produce low-quality print.

Source: www.pcworld.co.uk
Figure 25.Types of Printer

(e) Thermal Printer- An inexpensive printer that works by pushing heated pins
against heat-sensitive paper. Thermal printers are widely used in calculators and
fax machines.

lxiii

5. Speakers - Used to play sound. They may be built into the system unit or
connected with cables. Speakers allow you to listen to music and hear sound
effects from your computer.

Source: www.tweaknews.net
Figure 26.Speaker

What is a Storage Device?


Aside from the devices attached on a PC, there are also the so called
storage devices that perform a special task in computing system. Storage
device is any apparatus for recording computer data in a permanent or semipermanent form.

Source: www.thecomputershow.com
Figure 27.Storage Devices

lxiv

Types of storage devices


Floppy diskette- is a random access, removable data storage medium that
can be used with personal computers. The term usually refers to the magnetic
medium housed in a rigid plastic cartridge measuring 3.5 inches square and
about 2millimeters thick. Also called a "3.5-inch diskette," it can store up to
1.44 megabytes (MB) of data.
Compact disc (CD) also called optical disc is a nonmagnetic, polished
metal disk used to store digital information. The disc is read by the CD- ROM.
Digital Versatile Disc (DVD)- an optical disc technology with a 4.7 gigabyte
storage capacity on a single-sided, one-layered disk, which is enough for a
133-minute movie.
Jump disk and USB flash disk- is a plug-and-play portable storage device
that uses flash memory and is lightweight enough to attach to a key chain. A
USB drive can be used in place of a floppy disk, Zip drive disk, or CD.
Hard disk- is the main, and usually largest, data storage device in a
computer. The operating system, software titles and most other files are
stored in the hard disk drive.
LS-120- is a drive which supports a special floppy diskette which can store up
to 120MB of information as well as being backwards compatible and still
supporting the standard 1.44MB floppy diskettes.
Zip disk-is a small, portable disk drive used primarily for backing up and
archiving personal computer files.

lxv

Direction: In the puzzle below, look for the 10 hidden computer devices and
determine whether it belongs to INPUT, OUTPUT or STORAGE DEVICE.
REVEAL THE PARTS OF A COMPUTER SYSTEM
C
P
Z
Q
I
A
C
N
G
A
R
E
K
L
M
W
K
Y
R
M

G
O
A
U
R
O
U
H
H
S
Y
S
W
E
Q
P
Z
B
N
J

M
R
M
I
T
N
H
X
L
L
B
A
M
I
U
T
Z
Y
F
G

M
K
Z
P
B
R
L
S
P
W
E
C
I
O
N
H
M
V
H
N

Q
I
W
R
A
D
Q
P
F
W
A
M
Q
M
D
E
L
X
T
Y

F
R
G
Y
R
C
U
U
H
T
E
E
K
E
H
R
H
E
U
H

Y
X
W
P
S
S
T
P
G
R
M
T
K
H
M
M
M
W
B
V

L
N
P
T
R
G
Z
D
P
A
J
S
I
Y
R
K
O
P
U
J

1. ________________________
2. ________________________
3. ________________________
4. ________________________
5. ________________________
6. ________________________
7. ________________________
8. ________________________
9. ________________________
10. ________________________

W
A
X
E
U
S
G
A
I
O
I
Y
S
A
W
Z
U
L
G
D

K
A
W
X
Y
I
D
K
Z
S
X
S
I
S
O
W
S
Q
L
U

C
O
A
V
L
L
C
O
T
Q
K
D
O
K
Q
J
E
Q
S
G

P
A
F
I
G
N
J
Z
A
F
P
D
R
S
U
U
C
Y
N
F

A
U
V
R
R
H
F
X
F
A
I
E
R
A
H
B
K
O
P
L

H
A
R
D
D
I
S
K
D
R
I
V
E
I
O
J
Y
V
F
U

K
K
Q
B
V
Q
E
M
O
E
X
W
I
I
V
B
C
N
J
X

H
B
V
W
J
S
E
T
U
H
E
T
L
D
K
E
Y
H
W
O

G
M
X
A
B
M
J
Y
U
B
C
I
D
G
T
A
V
E
N
M

C
P
U
O
O
I
K
U
F
G
F
D
F
Z
M
P
Y
Z
K
K

N
H
M
R
C
L
O
Z
T
M
H
V
F
K
J
Q
S
H
N
D

H
U
Y
B
U
X
U
S
R
O
T
I
N
O
M
Z
D
D
J
A

______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________
______________________

lxvi

Matching Type
Direction: Match column A with Column B and write your answer on a
separate sheet of paper.
A.
1. It serves as the brain of
computer.
2. Printed-circuit
boards
(also
called interface cards) that
enable the computer to use a
peripheral device
3. Also called read/write memory
4. a small, portable disk used
primarily for backing up files
5. The main circuit board of a
computer
6. Also called diskette
7. Acts as a pointing device
8. Device that makes sounds, clips
and any audio materials be
heard.
9. Component that reads and
record data in CDs and DVDs.
10. it is a visual device that displays
the information

a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.

B.
Adapter
CD- ROM
CPU
Floppy disk
Microphone
Monitor
Motherboard
Mouse
Optical Drive
RAM
ROM

l. Speaker
m. Zip Drive

To deepen your understanding with regard to the different


components / devices of a computer, utilize the Internet and the
website www.professormesser.com, view the video regarding parts
of the computer. Use the URLs below:
1. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-motherboard-types/

lxvii

2. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-cpu-socket-types/

3. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-cpu-socket-types/

4. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-display-device-types/

lxviii

5. http://www.professormesser.com/free-a-plus-training/220-801/anoverview-of-pc-input-devices/

After watching the videos, answer the following questions:


1. What are the different types of motherboard shown in the video?
2. What are the different sizes of a motherboard?
3. What are the different types of CPU?

4. Describe the different types of memory cited in the video.


5. What do you think is the most efficient monitor used in our
computers nowadays?
6. Give at least 5 input devices featured in the video
presentation.

Role Playing
The class will be divided into 5 groups (depending on the class
size), each group will have a minimum of 5 members and maximum of
10. Each member should have a special role pertaining to the devices
of a computer and their functions. Each group will be tasked to
showcase their talents in front of the class. Each presentation will be
rated using the following criteria:

lxix

PERFORMANCE SCORE CARD

CRITERIA

PERCENTAGE

SCORE

Accuracy (Accurate role and function of a


30%
device was accurately shown)
Presentation (Organization or sequence
30%
of the play, appropriate gestures was
used)
Clarity (Clearly delivered each topic)
30%
Team work (cooperation of each member)
10%
Performance Rating

NETWORK
A network consists of two or more computers that are linked in order to
share resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or infrared light
beams.
There are three basic types of networks which includes the following:

Local Area Network (LAN)


Metropolitan Area Network (MAN)
Wide Area Network (WAN)

Local Area Network


A Local Area Network (LAN) is a network that is confined to a relatively
small area. It is generally limited to a geographic area such as a writing lab,
school, or building. Rarely are LAN computers more than a mile apart.
In a typical LAN configuration, one computer is designated as the file
server. It stores all of the software that controls the network, as well as the
software that can be shared by the computers attached to the network.
lxx

Computers connected to the file server are called workstations. The


workstations can be less powerful than the file server, and they may have
additional software on their hard drives. On most LANs, cables are used to
connect the network interface cards in each computer.
Metropolitan Area Network
A metropolitan area network (MAN) is a network that interconnects
users with computer resources in a geographic area or region larger than that
covered by even a large local area network (LAN) but smaller than the area
covered by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network (which may
then also offer efficient connection to a wide area network). It is also used to
mean the interconnection of several local area networks by bridging them
with backbone lines. The latter usage is also sometimes referred to as a
campus network.
Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas, such
as Florida, the United States, or the world. Dedicated transoceanic cabling or
satellite uplinks may be used to connect this type of network.
Networking Devices
Consist of, but are not limited to non-local printers, workstations,
servers, webcams, data loggers, instruments, dial-in devices, and, in general
anything that requires an Ethernet connection. These devices are supported
on a best-effort basis limited by the staffing and equipment level available.
Hub is a small, simple, inexpensive device
that joins multiple computers together.
Many network hubs available today support
the Ethernet standard. Other types
including USB hubs also exist, but Ethernet
is the type traditionally used in home
networking.
Source: www.stepbystep.com

lxxi

Ethernet switch is a device that gathers the


signals from devices that are connected to it, and
then regenerates a new copy of each signal.

Source: www.dlink.com

Bridge is a device filters data traffic at a


network boundary. Bridges reduce the
amount of traffic on a LAN by dividing it into
two segments.

Source: www.quantrimang.edu.vn

Routers are small physical devices that join multiple


networks together.

Source: www.robertbcairns.com

Network gateway is an internetworking system


capable of joining together two networks that use
different base protocols. A network gateway can be
implemented completely in software, completely in
hardware, or as a combination of both.

lxxii

Source:
www.computerlogics.blogspot.com

Source:www.dlink.com

Source:www.security-solutions.co.za

Network interface is a device that


connects a client computer, server, printer
or other component to your network. Most
often, a network interface consists of a
small electronic circuit board that is
inserted into a slot inside a computer or
printer. Alternatively, some computers,
printers, or other services include network
interfaces as part of their main circuit
boards (motherboards).

Modem is a contraction of the terms


modulator and demodulator. Modems
perform a simple function: They translate
digital signals from a computer into analog
signals that can travel across
conventional phone lines. The modem
modulates the signal at the sending end
and demodulates at the receiving end.

Network firewall protects a computer


network from unauthorized access.
Network firewalls may be hardware
devices, software programs, or a
combination of the two. Network firewalls
guard an internal computer network
(home, school, business intranet) against
malicious access from the outside.
Network firewalls may also be configured
to limit access to the outside from internal
users.

lxxiii

Direction: Identify what is being described in the following sentences and


write your answer on a separate sheet of paper.
1. It protects a computer network from unauthorized access.
2. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
3. This is an internetworking system capable of joining together two networks
that use different base protocols.
4. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications.
5. They translate digital signals from a computer into analog signals that can
travel across conventional phone lines.
6. It is a device that connects a client computer, server, printer or other
component to your network.
7. A device filters data traffic at a network boundary.
8. It is a device that gathers the signals from devices that are connected to it,
and then regenerates a new copy of each signal.
9. It is a small, simple, inexpensive device that joins multiple computers
together.
10. Type of network that is confined to a relatively small area.

Now, that you are done with the introduction of network as well as the
networking devices, to enlighten your understanding and knowledge have
some more readings about it thru books and other resources. You should
consider the following topics for research:
1. Different types of Network Topology
2. Common networking tools

After the research, you can also deepen your understanding by


watching a video presentation using the URL below:
o

http://www.professormesser.com/free-a-plus-training/220801/network-devices/

lxxiv

http://www.professormesser.com/free-a-plus-training/220801/network-topologies-3/

After the video presentation here are your tasks:


1.
2.

List down all the network devices and their advantages cited in the
video.
List down the different network topologies and their differences.

lxxv

MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES


The following tools and equipment are classified according to their
functions and uses.
Equipment and
Accessories
LAN Card
UPS
Server
24 port-hub
Modem
Fax machine
PC Video camera
USBExternalCD writer
USB scanner
USB printers
USB Flash Drive

Tools
Screwdriver(standard)
Screwdriver(Philips)
Long nose pliers
Mechanical pliers
Allen wrench
Multi tester
Crimping tools
Soldering iron (30 watts)
Wire stripper
LAN Tester
Anti-static wrist wrap
Device drivers/installers

LAN Card is a network interface card. This is a


computer circuit board or card that is installed in a
computer so that it can be connected to a network.

Server is a part of a network. It is a special


computer that users on the network can access to
carry out a particular job.

Port hub /Port is a connector on the back of a


computer or other device. A port is either a serial port
or a parallel port.

Materials
Software
applications
Network OS
Software
RJ 45
UTP Cat 5 cable
Motherboards
manual and
installer
Sound device
driver installer

lxxvi

Modem (Modulator-Demodulator) The


modem is a device that allows a given computer
to share data or otherwise a device which let
computers exchange information

Scanner- it is an input device that read text or


illustration printed on paper, translates the
information into a form that a computer can use

Flat Screw Driver is used to drive or


fasten negative slotted screws

USB Universal Serial Bus, a hardware


interface for low-speed peripherals such as
the keyboard, mouse, joystick, scanner,
printer and telephony devices.

Printer - is a piece of hardware that


produces a paper copy (also known as
hardcopy) of the information generated by
the computer.

RAM Random Access Memory, is a


primary memory. This memory is used
inside the computer to hold programs and
data while it is running.

BIOS Basic Input/ Output System, chip


that controls the most basic functions of the
computer and performs a self-test every
time you turn it on.

Flash drive RAM that can retain data


without electrical power. It is widely used for
BIOS chips and for digital camera and digital
music storage

lxxvii

Video Camera - camera using videotape: a


camera that records onto videotape

Long nose Pliers is used for holding, bending


and stretching the lead of electronics component
or connecting wire.

Soldering Iron is used to join two or


more metal conductors with the support of
soldering lead melted around it.

Desoldering Tool is used to unsolder


unwanted parts or component in the circuit
with the support of soldering pencil

Philips Screw Driver- is used to drive or fasten


positive slotted screws

LAN Tester- for RJ11,12,45& BNC w/ Remote


Unit This ergonomic tester is designed to test
most network cable wiring.
You can either
conduct an auto or manual test.

UTP Unshielded Twisted Pair, is a popular


type of cable used in computer networking that
consists of two shielded wires twisted around
each

lxxviii

Using Testing Tools and Equipment


A. Direction: Identify the following tools and materials, give their uses.

1.

2.

3.

4.

5.

B. Identification.
Direction: Identify the appropriate term described in each sentence. Use a
separate sheet for your answers.

________1. It is a connector at the black of a computer or other device.


________2. A computer circuit board installed in a computer so that it can be
connected to a network.
________3. A device that allows a given computer to share a data.
________4. An input device that read text or illustration printed on paper,
translated the information into a form that a computer that can use.
________5.The least expensive and most popular network media.

lxxix

For you to deepen your knowledge and skills and understanding in


planning and preparing for installation, you need to determine the location of
the devices / systems to be used, obtain materials necessary to complete the
work in accordance with established procedures and check the materials
received against job requirements . Your task is to have a research, find as
well and watch video presentations relating and showing the following:
1. Consult appropriate technical personnel to ensure that work is coordinated
with others who are involved in the activity;
2. Proper location / storage of the devices / systems and materials;
3. Correct way of obtaining the necessary materials to complete the work;
4. Fill up job order forms, request form and report sheets; and
5. Appropriate procedures in checking the materials received.

After doing the above tasks, make sure that you have a detailed
documentation of it. Write your reflections on your notebooks or other sheet of
paper.

After reflecting on the task given to you, its your chance now to
transfer what you have learned from the activity by having a presentation in
front of the class. You will be grouped with 5 members during the
presentation. Make use of your creativity in presenting each topic to awaken
the interest of your classmates.

lxxx

LESSON2. INSTALL EQUIPMENT / DEVICES and SYSTEMS


This lesson is designed to give you the proper procedures used in
installing devices and operating system of a personal computer, alongside
with it is the basic computer configuration set up. At the end of this lesson you
should be able to:
a) Apply OHS procedures in installing devices, systems, networking devices,
and peripherals;
b) Comply with the requirements in installing devices,/systems, networking
devices, and peripherals;
c) Install computer systems, networking devices and peripherals in
accordance with job requirements;
d) Perform variations in installing devices and systems in accordance with
customer/clients requirements;
e) Obtain approval
from appropriate personnel before implementing
contingency procedures;
f) Respond to unplanned events or conditions in accordance to established
procedures; and
g) Check the quality of the work undertaken in accordance with the
established procedures.

SAFETY PRECAUTIONS
Personal Protective Equipment - It refers to protective clothing, helmets,
goggles, or other gear designed to protect the wearer's body or clothing from
injury by electrical hazards, heat, chemicals, and infection, for job-related
occupational safety and health purposes.

lxxxi

PPE can also be used to protect the working environment from


pesticide application, pollution or infection from the worker (for example in a
microchip factory).
It is important that students and teachers during their laboratory period
should be required to use personal protective equipment. Some of these are:

Goggles A large spectacles, with


shields around the rims, for
protecting the eyes from dust,
excessive light, wind, etc.

Rubber Sole A special type of shoes


used to prevent electrical shock and
for waterproofing and insulating
purposes.

Apron A garment worn over the front


of the body as a protection for ones
cloth.

Face Mask A covering for the face to


prevent the inhaling or absorbing
dust and other chemicals

Gloves The covering material with a


separate sheath for each finger used
for hand protection.

lxxxii

Anti-Static and Safety Precautions


The little shock you experience while you are walking across a
carpeted floor or when you touched a door knob, table, counter or even
another person is a result of static electricity. Static electricity is the
discharge of electricity between two objects with different electrical potential.
Humans can't feel a static shock until it is several thousand volts strong, but it
takes less than 30 volts to fry a sensitive computer component, such as a
stick of RAM or a processor.
That's why computer technicians and home computer builders have to
guard their computers against the damaging effect of static electricity, as well
as take steps to avoid injury.
Safety and Anti-Static Rules

Always use an anti-static wrist strap when working on a computer


(except when working on monitors)
Always disconnect a computer from the AC power and from any
powered peripherals while you are working on it.
Always grasp a metal part of the computer chassis with your bare hand
before you touch anything inside. Do this even if you are wearing an
anti-static wristband.
Always handle electronic components by a non-conducting (nonmetallic) edge. Don't touch the pins or other connectors.
Never plug an ATX power supply into AC power unless it is connected
either to a computer's motherboard or to a dummy test load.
Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection.
Never eat, drink, or smoke while working on a computer.

True or False
Direction: Write TRUE if the statement is correct and FALSE otherwise.
1.

Always disconnect a computer from the AC power and from any


powered peripherals while you are working on it.

lxxxiii

2.

3.
4.
5.
6.
7.
8.
9.
10.

Always grasp a metal part of the computer chassis with your bare hand
before you touch anything inside. Do this even if you are wearing an
anti-static wristband.
Always handle electronic components by a non-conducting (nonmetallic) edge. Don't touch the pins or other connectors.
Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection.
Never use an anti-static wrist strap when working on a computer
(except when working on monitors)
Everyone is allowed to eat, drink, or smoke while working on a
computer.
Never plug an ATX power supply into AC power unless it is connected
either to a computer's motherboard or to a dummy test load.
Static electricity is the discharge of electricity between two objects with
different electrical potential.
Apron is a garment worn over the front of the body as a protection for
ones cloth.
PPE can also be used to protect the working environment from
pesticide application, pollution or infection from the worker.

Directions: The class will


be divided into five (5) groups. Each group has its own respective leader.
The group will perform a task regarding familiarizing the personal protective
equipment. After the activity they will be graded using the given Performance
Score Card below:
PERFORMANCE SCORE CARD
Performance Criteria

Percentage

1. The student clearly identified personal protective


equipment.

20%

2. The student utilized actual tools/device in


performing the actual procedures.

15%

3. The student applied safety precautions during the

25%

Grade

lxxxiv

task.
4. The task gave students more critical thinking on the
personal protective equipment.

30%

5. The student cooperatively performed the task.

10%

Performance Rating

SYSTEMS SPECIFICATION
Whenever you purchase software or hardware for your computer, you
should first make sure your computer supports the system requirements.
These are the necessary specifications your computer must have in order to
use the software or hardware. For example, a computer game may require
your computer to have Windows XP or later, a 2.0 GHz processor, 512 MB of
RAM, a 64 MB graphics card, and 500 MB or hard drive space. If your
computer does not meet all of these requirements, the game will not run very
well or might not run at all.
It is just as important to check system requirements for hardware
devices. For example, if you buy a printer, it may require either Windows XP
or Mac OS X 10.3 or later. It may also require a USB port and 80 MB of
available hard drive space. If your computer does not have any USB ports,
you will not be able to physically connect the printer. If your machine does not
have Windows XP or Mac OS X 10.3 or later, the printer drivers may be
incompatible with your operating system. This means your computer will be
unable to recognize the printer.
Most hardware and software products have the system requirements
printed on the side or bottom of the product packaging. When you are
shopping for computer software or hardware, it is a good idea to first find out
exactly what your system's specifications are and write them down on a piece
of paper. The important information to record includes:
1. Operating System (i.e. Windows XP, SP 2 or Mac OS X 10.3.8)
2. Processor Speed (i.e. Pentium 4, 3.2 GHz or Power PC G5, 2.0 GHz)
3. Memory, a.k.a. RAM (i.e. 512 MB)
4. Graphics Card (i.e. ATI Radeon 9800 w/ 256 MB video memory)
lxxxv

5. Hard Disk Space (i.e. 80 GB available)


6. I/O Ports (i.e. USB, Firewire, Serial, Parallel, SCSI, VGA, DVI ports)
By recording these specifications from your computer, you will be able
to make sure your computer supports the products you are buying. In terms of
installation, systems specification is a big consideration in order for a
computer to run and work properly for the most efficient way it could be.
In broad terms, the performance of a computer depends on four
factors: the speed and architecture of its processor or "central processing
unit" (CPU), how much random access memory (RAM) it has, its graphics
system, and its internal hard drive speed and capacity. Also of importance to
most users will be the specification of its Internet connection. Most computer
users and in particular those working with a lot of photographs, music files or
videos should also think about the most suitable storage devices they will
need in order to keep and back-up all of their valuable data.
Processor speed and architecture
The speed of a computer's processor chip (technically known as its
"clock speed") in measured in gigahertz (GHz), with the fastest modern
processors currently running at up to 4.7GHz. However, for most computing
tasks, including web browsing, sending e-mails, word processing and
spreadsheet work any processor running at 1GHz or more remains perfectly
sufficient.
For applications such as video editing, 3D graphics work and (for the
majority of "power users") playing computer games, higher processor speeds
is highly required. CPU performance is now determined by far more than raw
speed alone. Intel made this very clear when it introduced its system
of processor numbers. These provide an indication of a processor's
"architecture", "cache" and "front side bus (FSB) speed" in addition to its clock
speed.
The architecture of a processor is the most important factor to
determine its performance, and refers to its basic design and complexity.
Some processors are simply more sophisticated than others, with Intel (for
example) producing "basic" processors called Celerons and Pentiums, as well
as more powerful processors under its "Core" processor family. The later
include the Core 2, Core i3, Core i5 and Core i7, with the last of these being
the most powerful.
lxxxvi

In addition to clock speed and architecture, a processor's cache and


front side bus (FSB) speed also determine a computer's overall power.
Cache is a form of very fast memory integrated into the processor chip, and
used to store up instructions (work for the processor) so that it has to slow
down as little as possible between tasks. Cache is measured in megabytes
(MB), with (for example) low-end Celeron processors having as little as
0.25MB of cache (256KB), and high-end Itaniums having up to 24MB. The
simple message is, the more cache the better- though high levels of cache
still come at a very significant price.
Front side bus (FSB) speed is a measure of how fast a
microprocessor communicates with the computer's main circuit board (or
"motherboard") into which it is physically connected. Again, the higher the
measure the better for overall performance, with FSB speeds currently
ranging from 533MHz (still perfectly sufficient for the vast majority of
applications) up to 1600 MHz.
RAM
To a large extent, the more RAM a computer has the faster and more
effectively it will operate. Computers with little RAM have to keep moving data
to and from their hard disks in order to keep running. This tends to make them
not just slow in general, but more annoyingly intermittently sluggish.
RAM is measured in megabytes (MB) and gigabytes (GB), as detailed
on the storage page. Just how much RAM a computer needs depends on
the software it is required to run effectively. A computer running Windows XP
will usually function quite happily with 1GB of RAM, whereas twice this
amount (such as 2GB) is the realistic minimum for computers running
Windows 7.
Graphics system
A computer's graphics system determines how well it can work with
visual output. Graphics systems can either be integrated into a computer's
motherboard, or plugged into the motherboard as a separate "video card".
Graphics systems integrated into the motherboard (also known as "onboard
graphics") are now quite powerful, and sufficient for handling the
requirements of most software applications aside from games playing, 3D
modeling, and some forms of video editing.
lxxxvii

Any form of modern computer graphics system can now display highresolution color images on a standard-sized display screen (ie any monitor up
to about 19" in size). The more sophisticated graphics cards now determines
how well a computer can handle the playback of high definition video, as well
as the speed and quality at which 3D scenes can be rendered. Another key
feature of separate graphics cards is that most of them now allow more than
one display screen to be connected to a computer. Others also permit the
recording of video.
As a basic rule, unless a computer is going to be used to handle 3D
graphics or to undertake a significant volume of video editing or recording,
today there is little point in opting for anything other than onboard graphics
(not least because separate graphics cards consume quite a lot of electricity
and create quite a lot of heat and noise). Adding a new graphics card to a
computer with onboard graphics is also a very easy upgrade if required in the
future.
Hard Drive Speed and Capacity
Today 40GB is an absolute minimum hard drive size for a new
computer running Windows 7, with a far larger capacity being recommended
in any situation where more than office software is going to be installed.
Where a computer will frequently be used to edit video, a second internal
hard disk dedicated only to video storage is highly recommended for stable
operation. Indeed, for professional video editing using a program like
Premiere Pro CS5, Adobe now recommend that a PC has at
least three internal hard disks (one for the operating system and programs,
one for video project files, and one for video media).
Two key factors determine the speed of traditional, spinning hard
disks. The first is the rotational velocity of the physical disk itself. This can
currently be 4200, 5400, 7200, 10000 or 15000 rpm (revolutions per minute).
The faster the disk spins, the quicker data can be read from or written to it,
hence the faster the disk the better (although faster disks consumer more
power, make more noise, and generate more heat). Most desktop hard disks
run at either 5400 or 7200 rpm, whilst most laptop hard disks run at 4200 or
5400.

lxxxviii

The second key factor that determines performance of a traditional,


internal hard disk is the interface used to connect it to the computer's
motherboard. Three types of interface exist: Serial Advance Technology
Attachment (SATA), which is the most modern and now pretty much the
norm on new PCs; Integrated Device Electronics (IDE) (also known as
UDMA), which is a slower and older form of interface, and finally SCSI (Small
Computer System Interface), which happens to be the oldest but in it most
modern variant is still the fastest disk interface standard.

Now, in order for you to better understand the topics under systems
specification, dig deep into your mind and answer the following essential
questions:
1. In your point of view, describe system specification?
2. How does it affect the performance of the computer?
3. What is the relevance of understanding system specification in computer
hardware servicing?
4. Why do you think that system specification is one of the most important
considerations during installation?

INSTALLATION OF HARDWARE COMPONENTS AND OTHER


PERIPHERALS
One of the basic skills that you must acquire in computer hardware
servicing is to independently assemble and disassemble a personal computer
or simply setting up a PC. After familiarizing with all the tools, devices,
peripherals and safety precautions I believe that you are now ready to gain
another experience in CHS by going through this lesson.
Personal Computer Disassembly
Before starting computer disassembly, make sure you have the tools
you need and they're all close by and handy and be sure to have a container

lxxxix

to keep the screws in so you have them when you want to put things back
together.
Step1. Unplugging - The first thing you do is to unplug every cable that is
plugged in to your computer. That includes the cables such as Power, USB,
Mouse, Keyboard, Internet, Ethernet, Modem, AM\FM Antenna, Cable TV,
etc. Just unplug all the cables for safety purposes.
Now that your computer is fully unplugged, move your PC to a clean
work space.
Step2.Opening the Outer Shell/Case First, unscrew the four screws at the
back of the computer. On most computer cases, there will be large knobs that
you can unscrew by hand or by screw driver on the back-right side of the
computer.

Source: www.buildeasypc.com

Figure 28. Screw at the back of computer chasis


The left side has small screws because on that side you cant access
much on the inside. Once the screws are removed, you can remove the side
panels. On most computers, they just slide off. Start with the left side panel
(the side that once had the knobs), slide it towards the back of the computer.
Now you can remove the left panel. Just like the other side, slide it towards
the back of the computer.

Side
panel

Source:
www.buildeasypc.com

Figure 29.
Removing the side
panel

xc

NOTICE:
If you are working on a carpet, about every five minutes touch something that
is grounded (Sink faucet / pipe, wire coming from the ground part of a wall
outlet). This is done so you do not shock your motherboard or other parts.
Step3. Removing the System Fan - First, unplug the fan from the
motherboard. You can find the plug by following the wire from the fan. It
should be labeled "SYS_FAN1". Next, you will have to unscrew the fan from
the outside. You should now be able to lift the fan out of the PC.

System Fan

Source: www.buildeasypc.com

Figure 30. Removing the system fan


Step4. Removing the CPU Fan- The CPU fan is located right on top of the
CPU heat sink, which is a large piece of metal with fins on the top. The CPU
fan plugs into the motherboard in an awkward place, that is hard to access.
But just follow the wires and you should easily find it. It is labeled "CPU
FAN1". To remove the fan from the heat sink, remove the four screws
securing it in place.

CPU Fan

Source: www.buildeasypc.com

Figure 31. Removing the CPU fan


xci

Step5. Power Supply - The first thing to do is unplug every wire coming from
the power supply. You must disconnect the motherboard (very large
connector/plug), CD/DVD drive(s) power, internal hard drive power and
portable hard drive slot power.
Once everything is unplugged,
unscrew the four screws holding the
power supply in place, on the back of
the computer. Next, push the power
supply from the outside, and then lift it
out.

Source: www.buildeasypc.com

Figure32. Unscrew the power supply


Step6. CD/ DVD Drive(s)-First, unplug the ribbon from the back of the drive.
Once that is completed, pull on the tab securing the drive in place, then push
it out from the inside.

CD / DVD
Drive

Source: www.buildeasypc.com

Figure 33. Location of CD / DVD Drive


Step7. Hard Drive - First, unplug the connector at the back of the slot, and
unplug the other end from the motherboard. Also unplug the SATA cable from
the motherboard and the hard drive. The portable hard drive slot is secured
the same way the CD/DVD drive is, with a tab. Pull on the tab, then slide the
slot out.

xcii

Source: www.buildeasypc.com

Figure 34. Unplugging the Hard Drive connector


To remove the hard drive from the side of the slot, unscrew the four screws
securing it in place. You must be very careful not to drop the hard drive, since
it is very delicate!

Source: www.buildeasypc.com

Figure 35. Removing the hard drive from the side of the slot
Step8. Memory (RAM) - To remove the RAM, push down on both tabs
holding the RAM in place, which are located at both ends of the RAM.

xciii

Source: www.buildeasypc.com

Figure 36. Removing the Memory


Step9. Motherboard - The motherboard has seven screws holding it to the
frame, which are indicated by large white circles around them. Remove them
and then lift the motherboard out of the frame.

Source: www.buildeasypc.com

Figure 37. Removing the Motherboard

Personal Computer Assembly


Now that you have the skills in disassembling a personal computer, I
believe that you are ready to take another step of this module which is
assembling a personal computer. All you need to do is to follow the step by
step procedures provided in this module.

xciv

Step 1. Prepare your workplace


1. Take Inventory:
Before you start, take an inventory of your parts. Do not begin
assembling your computer if you don't have everything you need. Begin the
step-by-step process once you are ready with everything you need.

Source: www.buildeasypc.com

Figure 38. Take inventory of the Different Computer Parts


2. Make Space, Make Time:
Building a PC takes up space - about a dining room table worth. So
make sure you have plenty of working room and a few hours to proceed with
minimal interruption. Work on a flat, stable table top surface, or bare floor,
where you have room to layout all of the items.
3. Prepare Grounding Protection:
Use an inexpensive antistatic wrist strap. Make sure you are wearing
your antistatic wrist strap correctly (it does you no good at all if you do not
wear it!), and you are ready to proceed. Look at Figure 39 for details.

xcv

Source: www.buildeasypc.com

Figure 39. Wearing the Anti- static Wrist Strap Correctly


4. Have the Drivers Ready:
Assuming you have another internet connected PC, download the
latest drivers from the vendors' websites for each component you will be
installing. Sometimes drivers are updated between the time the component
was manufactured and the time you are installing it. It is always best to have
the latest. Copy them to a CD for easy access.
Step 2. Prepare the Motherboard
1. Great care should be taken when installing the motherboard. First, take
the board out of its packaging
and put it on top of the antistatic
bag it came in (see Figure 40).
Remember, you always want to
safeguard your components
from
potentially
hazardous
static electricity (wear your
strap).

Source: www.buildeasypc.com

Figure 40. Motherboard in an Antistatic Bag

2. Before you secure the motherboard onto the PC case/chassis, inspect


it carefully for any visible defects.
3. Next, review the motherboard manual, to make sure you are familiar
with the motherboard layout and understand which socket is which.
Manuals are extremely helpful, usually easy to read, and include
xcvi

illustrations. Below you can find instructions on how to install the


processor, the heat sink and the memory modules on the motherboard.
You should not place the motherboard in the computer case until you
are told to do so.
Step 3. Install the CPU
1. Use the unlocking mechanism to open the CPU socket which is usually
a lever.
2. Carefully line up the pins and place the chip in its socket; it will fit only
when oriented the proper way. An arrow or a missing pin on one corner
of the chip will show you how to line things up.
3. Align Triangular CPU and socket key marks as shown in Figure 41.
4. Lower the lever to lock the CPU into place.

Source: www.buildeasypc.com
Figure 41. Install CPU

Step 4. Install the CPU Heat Sink


1. Follow the manufacturer's directions to install the heat sink and the fan
that will cool the processor. If you bought an OEM CPU and a separate
heat sink, you may need to spread a thin layer of the thermal grease
that came with the heat sink over the chip to ensure proper transfer of
heat (some heat sinks come with this grease already applied).

xcvii

Source: www.buildeasypc.com

Figure 42. Install CPU Heat Sink


3. Attach the clip that holds the heat sink in place keeping in mind that it may
require a fair amount of force. Again, follow the instructions that came with
the heat sink. They will show you how to fit it correctly. If you are in doubt,
you can visit the manufacturer's website for more information.

4. Plug the CPU fan's power connector into the proper connector on the
motherboard.
Step 5. Install Memory (RAM Modules)
In order to install the memory modules, insert them into the proper
sockets (Figure 43) and push down firmly but evenly until the clips on both
sides of the socket pop into place. If your motherboard supports dual-channel
memory, consult the user manual to determine which pairs of RAM sockets
you should use. The motherboard and the CPU are the brain and nerve
center of your PC, so selecting these components is the most important
decision you'll make.

Source:
www.buildeasypc.com

Figure 43. Install RAM


Memory

xcviii

Step 6. Place the motherboard into the case


1. Some PC cases have a removable motherboard tray. If yours does,
remove the screws holding it in place and pull it out of the case (Figure 44).

Source: www.buildeasypc.com

Figure 44. Remove Motherboard Tray


2. Note the pattern of the holes in your motherboard (Figure 45), and screw
brass standoffs into the motherboard tray or into the PC case in the correct
locations (ALWAYS check the manual and follow their instructions to the
letter).

Source: www.buildeasypc.com

Figure 45. Screw Brass Standoffs Into the Motherboard


3. Check the layout of the sockets on the motherboard, and confirm that the
ports on your motherboard's back panel match the holes on the case's
Input/Output (I/O) shield as shown in figure 46 that is installed in your case. If
necessary, remove the old I/O shield by tapping it firmly a few times with the
xcix

butt-end of a screwdriver, and then replace it with the shield that came with
the new motherboard.
4. Carefully position the motherboard on top of the brass standoffs (Figure
47), line up all the holes, and use the screws that accompanied the case to
fasten down the motherboard. If you are using a removable tray in your
system, slide the tray and motherboard back into the case and then secure
the tray.

Source: www.buildeasypc.com

Figure 46. Cases I /O Shield

Source: www.buildeasypc.com

Figure 47. Mount the Motherboard


Step 7. Connect the Power Supply
Making the proper connections is crucial to successfully assembling
your PC system. Fortunately, manufacturers provide color-coded power
cables and unique connector shapes to make the job easy.

1. First, plug the large ATX power connector (Figure 48) from your power
supply into the matching port on your motherboard. Look Figure X for details.
2. Locate the smaller, square processor power connector (Figure 49) (you
cannot miss it - it is the one sprouting the yellow and black wires) and attach it
to the motherboard. Note: your connector is usually located near the
processor. As always, refer to your motherboard's manual for the exact
locations.
3. Use your motherboard user manual and find the description about frontpanel connectors.

Figure 53. Large ATX Connector

Source: www.buildeasypc.com

Figure 48. Connect the ATX Power in the Motherboard

Source: www.buildeasypc.com

Figure 49. Square Processor Power Connector

ci

NOTE:
You are going to be doing work that requires attention to detail and can be
quite frustrating if you do not go into it with the right attitude.
4. Attach each of the tiny leads from the power and reset switches (Figure
50), the hard-disk activity lights, the PC speaker, and any front-panel USB
and FireWire ports to the corresponding pin on your motherboard. The
needle-nose pliers are useful for manipulating small pieces.

Source: www.buildeasypc.com

Figure 50. Connect the different Leads


Step 8. Install Graphics / Video Cards
1. Begin by removing the backplane cover from the AGP or PCI Express
X16 slot (the metal piece where the monitor connector will emerge)
(Figure 51).

Source: www.buildeasypc.com

Figure 51. Remove the backplane cover

cii

2. Install the graphics board in that slot, and then secure the card with a
screw (Figure 52).

Source: www.buildeasypc.com

Figure 52. Install the Graphics Board


Step 9. Install Internal Drives
Now it is time to install your drives. This is an easy process, but it requires
attention to detail.
1. Make any necessary changes to jumpers on the drives before
mounting them in the case. A two-drive system (one or two SATA
(Serial ATA- is a standard hardware interface for connecting hard
drives and CD/DVD drives to a computer) hard drives, plus one parallel
ATA (Advanced Technology Attachment) optical drive, for example) is
easy to set up; the SATA drives are jumper less, and the optical drive
can be set as master on its own parallel ATA channel. Many cases
have removable drive rails or cages to house drives.
2. Use the included screws to attach your drives to the rails or cage, and
slide them into the case. For externally accessible drives such as a
DVD recorder, you can save time by installing one drive rail and sliding
the drive in for a test fitting to make sure that its front is flush with the
case (Figure 53).
3. When the drives are installed, connect power and data cables to each
one. Parallel ATA drives use wide, flat data cables that can be installed
only in the correct way. Floppy drives use a similar but smaller cable;
SATA drives use a thin, 1cm-wide data cable. SATA drives use a new

ciii

type of power connector that many power supplies don't come with.
Fortunately, many motherboards ship with adapters for converting a
standard four-pin power connector to a SATA power connector (Figure
54).

Source: www.buildeasypc.com

Figure 53. Attach your devices

Source: www.buildeasypc.com

Figure 54. Connect Power Connector

civ

Step 10. Install the Add- in Cards


1. For each add-in card, you must choose a free PCI slot.
1. Remove its backplane cover to allow access from the rear of the case.
3. Carefully position the card above the slot, and press down firmly to
seat the card (Figure 55).
4. Secure the card with a screw.

Source: www.buildeasypc.com

Figure 55. Add- in Cards


Many motherboards have additional sound connectors or ports housed
on small add-in boards. Some of these plug into slots on the motherboard;
others screw into the back of the case in place of slot covers. Usually the
additional ports are not essential to your PC's operation. For example, if you
install a sound card, you do not need connectors to the motherboard's built-in
sound chip. Check your motherboard manual to determine what each of these
boards does.
Connecting Peripherals of a Personal Computer
When attaching hardware and peripherals of the computer, ensure that
they are connected to the correct locations or ports. For example, some
mouse and keyboard cables use the same type of PS/2 connector. So, you
must know first the different ports that can be found in the back panel of the
computer.
Keep in mind:
1. When attaching cables, never force a connection.
2. Plug in the power cable after you have connected all other cables.
cv

Steps in Connecting Peripherals of a PC


Step 1.Attach the monitor cable to the video port.
Step 2.Secure the cable by tightening the screws on the connector.
Step 3.Plug the keyboard cable into the PS/2 keyboard port.
Step 4.Plug the mouse cable into the PS/2 mouse port.
Step 5.Plug the USB cable into a USB port.
Step 6.Plug the network cable into the network port.
Step 7.Plug the power cable into the power supply.

Source: www.geeks.com

Figure 56.Steps in Connecting Peripherals of a PC


After connecting all the cables into their proper places, figure 57 shows
the appearance of the back panel of your PC.

cvi

Source:
www.geeks.com

Figure 57. Appearance of the PCs Back Panel

Rearrange the Procedures


Direction: Rearrange the following procedures in their proper order. Use
numbers to indicate their order of precedence. The first number is done for
you.
A. Personal Computer Disassembly
__7_1. Detaching the Hard Drive
____2. Detaching the power supply
____3. Opening the outer shell / case
____4. Pull Out the Motherboard
____5. Removing the CD / DVD Drives
____6. Removing the CPU fan
____7. Removing the system fan
____8. Unplugging all the cables and wires
B. Personal Computer Assembly
__7_1. Connect the Power Supply
____2. Install Graphics / Video Cards
____3. Install Internal Drives
____4. Install Memory (RAM Modules)
cvii

____5. Install the Add- in Cards


____6. Install the CPU
____7. Install the CPU Heat Sink
____8. Place the motherboard into the case
____9. Prepare the Motherboard
____10. Prepare your workplace

Performance Test
Direction: Follow

and perform the given procedures on Activity A, B and C.


Safety precautions must be observed when working. You will be rated in
accordance with the rubrics provided after the activity:
A. PC Disassembly

cviii

B. Personal Computer Assembly

C. Connecting PC Peripherals

cix

Rubric for your performance Test


Criteria

Percentage

Accuracy

50 %

Adherence to the procedures

20%

Workmanship(applied safety
precautions)

20%

Speed

10%

Grade

Performance Rating

cx

INSTALLING OPERATING SYSTEM


Before the installation process undertake, a technician must be aware
of the minimum requirements of a computer hardware that is compatible with
the operating system to be installed. Following the systems requirements
means an efficient computer system. The list below shows the windows XP
minimum requirements for installation:
Pentium 233 Mhz or compatible processor or faster; 300MHZ or faster
recommended
64MB of RAM minimum; 128MB or more recommended
4.3GB hard hard disk space or more
CD-ROM or DVD-ROM
Super VGA (800X600) or higher-resolution monitor
Keyboard and mouse
Windows XP Installation
1.

Insert

the

Windows

XP

CD-ROM

and

reboot

the

computer

If you see a message about press any key to boot the CD, do so now.
Otherwise, you will see a message about Setup inspecting your system.

Figure 58.Boot from CD


cxi

2.

MS-DOS portion of Setup begins

In the first stage of setup; you will see a series of blue and gray MS-DOSbased screens.
In the first step, you will be asked to press F6 if you need to install any thirdparty or RAID drivers.

Figure 59.Windows Set-up


3. Welcome to Setup

Finally, Setup begins. In this step, you can set up XP, launch the Recovery
Console (another, more complicated system recovery tool), or quit.
Press ENTER to continue Setup, and it will examine your hard drives and
removable disks.

Figure 60.Welcome to Set-up


4. Read the license agreement

cxii

Next, you'll have to agree to Microsoft's complex licensing agreement. Among


the highlights: You don't actually own Windows XP and you can only install it
on one PC.
Hit F8 to continue.

Figure 61.License and Agreement


5. Choose an installation partition

This crucial step lets you choose where to install XP.


On a clean install, you will typically install to the C: drive, but you might have
other ideas, especially if you plan to dual-boot with 9x.
Setup will show you all of your available disks (in this case, just one) and let
you create and delete partitions as needed. So, for example, if you have one
disk, but would like to create two partitions, one for XP and one for your data,
you can do that here.

Figure 62.Choose an Installation Partition

cxiii

6. Select the file system

If you created a new partition, or wish to change the file system of an existing
partition, you can do so in the next step. NTFS (New Technology File
System) file system is more secured than FAT (File Allocation System).
Regardless of which file system you choose, be sure to select one of the
"quick" format options (the top two choices), if you do need to format, since
these
will
work
much
more
quickly
than
a
full
format.

Figure 63.Select the File System


7. Optionally format the partition

If you did choose to change or format the file system, this will occur next.
First, you'll be asked to verify the format. If you're installing XP on a system
with more than one partition, especially one that still holds your data on one
of the partitions, be sure you're formatting the correct partition.
Hit F to continue, and a yellow progress bar will indicate the status of the
format. When this is complete, Setup will again examine your disks, and
create a list of files to copy.

Figure 64.Optionally Format the Partition

cxiv

8. Setup folder copy phase and reboot

Setup will now copy system files to the system/boot partition(s) you just
created. This will allow the PC to boot from the C: drive and continue Setup in
GUI mode.
When the file copy is complete, Setup will initialize and save your XP
configuration.
It will then reboot your PC. When the system reboots, you will probably see
the "Press any key to boot from CD" message again. If this happens, do not
press a key: Setup will now boot from your C: drive. In the event that you
cannot prevent the CD-based Setup from reloading, eject the CD and reboot.
Setup will ask for the CD when needed.

Figure 65.Setup Folder Copy Phase

9. GUI Setup begins

Once the system reboots, you will be presented with the GUI Setup phase,
which is much more attractive than the DOS-mode phase. As you progress
through GUI Setup, you can read promotional information on the right side of
the screen about XP.
Next, your hardware devices are detected. This could take several minutes.

Figure 66.GUI Setup


cxv

10. Regional and language Options

In the first interactive portion of GUI Setup, you can choose to customize the
regional and language settings that will be used by XP, as well as the text
input language you'd like. Users in the United States will not normally need to
change anything here.
Click Next to continue.

Figure 67.Regional and Language Options


11. Personalize your software

Now,
enter
your
name
and
your
company.
The name you enter is not the same as your user name, incidentally, so you
should enter your real name here (i.e. Rosalie Lujero or whatever).
Click Next to continue.

Figure 68.Software Personalization

cxvi

12. Enter your product key

Now you must enter the 25-character product key that is located on the
orange sticker found on the back of the CD holder that came with Windows
XP. You cannot install XP without a valid product key.Later on, you will be
asked to activate and optionally register your copy of Windows XP. A product
key can be used to install XP on only one PC.
Click Next to continue.
Figure 69. Enter Product Key

13. Enter
a
computer
name and

administrator password

In the next phase of Setup, you can create a name for your computer (which
is used to identify it on a network) and, optionally in Pro Edition only, a
password for the system Administrator, the person who controls the PC (this
will generally be you, of course).

Figure 70.Enter Computer Name and Administrator Password

cxvii

14. Supply your date and time settings

Next, you can supply the date and time, which are auto-set based on
information in your BIOS, and the time zone, which is irritatingly set to PST,
which is where Microsoft is. Change these as appropriate.
Click Next to continue.

Figure 71.Enter Date and Time Settings


15. Network setup

If you have a networking card or modem, Setup now install the networking
components, which include the client for Microsoft networks, File and Print
Sharing, the Quality of Service (QoS) Packet Scheduler, and the TCP/IP
networking protocol by default.

Figure 72.Network Set-Up

cxviii

16a. Choose networking settings

In this phase, you can choose to keep the default settings (recommended) or
enter custom settings.
Note that XP doesn't include the legacy NetBEUI protocol out of the
box. If you want to use this protocol, you will need to install it later from
the XP CD-ROM.

Click Next to continue.

Figure 73.Choose Networking Settings


Windows XP Professional only:
16b. Enter workgroup or domain information

In Windows XP Professional only, you will be able to select a workgroup or


domain name next. Home Edition doesn't work with Windows domains,
however, and Setup will automatically supply the workgroup name MSHOME,
which you can change later. The default workgroup name in XP Pro is,
imaginatively, WORKGROUP.
Click Next to continue.

Figure 74.Enter Workgroup or Domain Information


cxix

17. Set-up completion

From this point on, Setup will continue to completion without any further need
for interaction. Setup will now copy files, complete installation, install your
Start Menu items, register system components, save settings, remove any
temporary files needed by Setup, and then reboot.
Again, you will probably see the "Press any key to boot from CD" message
on reboot. If this happens, do not press a key, and your new XP install will
boot up. You can remove the XP Setup CD now.

Figure 75.Set- Up Completion


18. First boot

Youll be greeted by the XP splash screen on first boot (this actually appears
briefly when you rebooted into GUI Setup as well).The splash screens for XP
Pro and Home are subtly different.

Figure 76.First Boot


cxx

19. Change display settings

Users with CRT monitors and some LCDs (such as laptops and flat panel
displays) will see a Display Settings dialog appear, which asks whether you'd
like XP to automatically set the resolution. This will generally change the
resolution from 800 x 600 to 1024 x 768 on a CRT monitor, or to the native
resolution of an LCD display.
Click OK and let XP change the resolution. Then, accept the settings if the
screen display changes and can be read. If you can't see the display, it will
time out after 30 seconds and return to the sub-optimal 800 x 600 resolution.
Click OK to accept the screen resolution change.

Figure77.Change Display Settings


20. Welcome to Microsoft Windows

Now, you are presented with XP's "Out of Box Experience," or OOBE, which
presents a silly wizard to guide you through the final set up of your PC.
Click Next to continue.

Figure 78.Welcome to Microsoft Windows

cxxi

21. Network setup

In the opening OOBE phase, you are asked to set up your network/Internet
connection, which is required for activation and registration. If you selected
the default networking configuration during Setup and know it will work
(because you're connected directly to a cable modem, perhaps, or are on a
local area network), then select Yes (the default). Otherwise, you can select
No and then Skip.
We'll assume that your network is up and running and select Yes.
Click Next to continue.

Figure 79.Network Set- up


22. Optionally activate and register Windows

If you selected Yes in the previous step, you are asked if you'd like to
activate Windows XP. This will tie your copy of XP to the current PC semipermanently. Activation requires a connection to the Internet, but you can
perform this step later if you want (and don't worry, XP will annoyingly
remind you of this fact every time you boot the machine until you do so).

Figure 80.Windows Activation

cxxii

23. Set up users

Now, you can set up the user names of the people who will be using the PC.
You will want at least one user (for you), since you shouldn't be logging on as
Administrator. Curiously, each user you do create here has administrative
privileges, however, and no password. You should set up your users correctly
with passwords as soon as possible.
This phase lets you create up to five users. You can create more later, or
manage users, using the User Accounts tool in Control Panel.
Click Finish when done creating users. At this point, OOBE ends and you're
reading to go.
Click Finish again.

Figure 81.Set-up Users


24. Logon to Windows XP for the first time
Click your name, that account will logon and you'll be presented with the XP
desktop. After you create passwords, however, you'll be asked to enter a
password before you can logon.

Figure 82. Set-up Users


cxxiii

Multiple Choice: Read each question carefully and choose the letter of the
best answer. Write your answer on a separate sheet of paper.
1. Which of the following is not a Windows XP minimum requirement?
a. 128MB RAM or higher
c. Lower resolution monitor
b. CD- ROM or DVD ROM
d. 4.3 GB hard disk space or more
2. If you see a message to press any key to boot the CD and you fail to do so,
what do you think will happen?
a. The computer will restart
b. Set up inspecting your system will appear
c. It will be prompted to BIOS setup
d. It will return to boot menu
3. What key should you press if you need to install any third- party or RAID
drivers?
a. F2
c. F2
b. F6
d. F12
4. After reading the license agreement, what function key will press in order to
start the installation?
a. F6
c. F9
b. F8
d. F12
5. Where do we typically install the operating system?
a. Drive C
c. External Drive
b. DVD
d. Floppy Drive
6. What file system is usually used during installation?
a. FAT
c. NTFS
b. FAT32
d. NTFS32
7. Suppose that you will install Windows XP on a system with more than one
partition, what important process should be done?
a. Change the file system
b. Delete the data and files on the different partition
c. Examine the partition
d. Format the correct partition
8. When the folder copy phase is complete your system will reboot, what are
you going to do if see the message Press any key to boot from CD?
a. Press any key
c. Reboot the system
b. Do not press a key
d. Eject the CD
cxxiv

9. What is the next phase after the set up folder copy phase and reboot?
a. GUI set up
c. Username setup
b. Software
d. Software personalization
10. What phase will immediately follow after the first boot phase?
a. Welcome to Windows
c. Change display setting
b. Network Setup
d. Set up users

For you to have a profound knowledge on the overview of what


windows XP is, utilize the internet and watch the following video
presentations:
1. Overview of Windows XP
http://www.professormesser.com/free-a-plus-training/220-802/anoverview-of-windows-xp/
2. Planning for installation
http://www.professormesser.com/free-a-plus-training/220802/planning-a-windows-installation-2/
3. Windows XP installation
http://www.professormesser.com/free-a-plus-training/220802/installing-windows-xp-3/

After watching the videos, have a documentation containing the


overview of Windows XP and salient procedures in planning for installation
and Windows XP installation. Use a short white bond paper and be creative
for the documentation.

cxxv

Windows XP Installation
Equipment:
Computer unit with CD or DVD drive
AVR / UPS
Materials:
Windows XP Installer
Procedure:
1. Work in triads or quartet (depending on the number of computer
available)
2. Install the Operating System (OS), Windows XP.
3.
Take turns in doing the above task.
You will be assessed using the criteria in the score card below.

PERFORMANCE SCORE CARD


Evaluation:

Percentage

Score

CRITERIA
1. Operating System is installed with no errors.

40%

2. Proper disk partitioning and partition is


performed.
3. Proper use of equipment and materials is
observed.
4. Observance of Safety Precautions.

40%
10%
10%

Performance Rating

cxxvi

Windows 7 Installation
As a technician you must be able to know the variations or options in
installing an operating system that is compatible with the hardware
requirement of a personal computer. Another operating system available in
the market now is the Windows 7 version. Now, take a tour through the
procedures in installing a Windows 7 operating system. I believe, the
procedures will be very easy for you.
1. Turn your computer on then press Del or F2 (depend on your computers
main board) to enter the system BIOS.
2. Go to Boot menu and choose Boot from CD/DVD.

Figure 83.Boot Menu


3. Press F10 to save the configuration and exit BIOS then reset your computer.

Figure 84.Save configuration settings

cxxvii

4. Insert Windows 7 DVD into your DVD drive then start up your computer,
Windows 7 will be loading files.

Figure 85.Windows 7 loading files and Start up


5. Select your language, time & currency format, keyboard or input method and
click Next.

Figure86.Language, Time and Currency Set- up


6. Click Install now.

Figure 87.Install Now

cxxviii

7. Check I accept the license terms and click Next.

Figure 88.License Terms Agreement


8. Click Upgrade if

you

already

have

previous

Windows

version

or Custom (advanced) if you dont have a previous Windows version or want


to install a fresh copy of Windows 7.

Figure 89.Windows 7 Options for Installation

cxxix

9. (Skip this step if you chose Upgrade and have only one partition) Select
the drive where you want to install Windows 7 and click Next. If you want to
make any partitions, click Drive options (advanced), make the partitions and
then click Next.

Figure 90.Drive Options


10. It will now start installing Windows 7. The first step, (i.e. Copying Windows
files) was already done when you booted the Windows 7 DVD so it will
complete instantly.

Figure 91.Windows 7 Starts Installation


cxxx

11. After completing the first step, it will expand (decompress) the files that it has
been copied.

Figure 92.Expanding Windows Files


12. The third and fourth step will also complete instantly like the first step.

Figure 93.Installing Features and Updates

cxxxi

13. After that it will automatically restart after 15 seconds and continue the setup.
You can also click Restart now to restart without any delays.

Figure 94.Restart to Continue Installation


14. After restarting for the first time, it will continue the setup. This is the last step
so it will take the most time than the previous steps.

Figure 95.Completing Installation

cxxxii

15. It will now automatically restart again and continue the setup. You can
click Restart now to restart without any delays.

Figure96.First Start Up
16. Type your desired user name in the text-box and click Next. It will
automatically fill up the computer name.

Figure97.Software Personalization
cxxxiii

17. If you want to set a password, type it in the text-boxes and click Next.

Figure98.Password Set- up
18. Type your product key in the text-box and click Next. You can also skip this
step and simply click Next if you want to type the product key later. Windows
will run only for 30 days if you do that.

Figure 99.Type Windows Product Key

cxxxiv

19. Select your desired option for Windows Updates

Figure 100. Windows Update


20. Select your time and click Next.

Figure 101. Time and Date Settings

cxxxv

21. If you are connected to any network, it will ask you to set the networks
location.

Figure 102. Windows 7 Set- up Complete

Figure 103. Preparing Desktop


cxxxvi

Hands- on Activity:
You are tasked to reformat / install an operating system particularly Windows
7, however, during the process of installation a problem occurred the machine /
computer did not boot from CD. What do you think might be the reason for this
unplanned incident? Your task now is to demonstrate the correct procedures to solve
and respond to this unplanned event in accordance to the established procedures.

You will work in quartet or triads (depending on the number of


computers) to solve this problem. Your output will be rated according to the
following criteria:
PERFORMANCE SCORE CARD
CRITERIA
Accuracy

PERCENTAGE

SCORE

50 %

(Adherence to the correct procedure)


Workmanship

30 %

(Adherence to OHS policy, neatness and


organization of materials used)
Speed

20 %
PERFORMANCE RATING

100%

Before implementing any contingency procedures in any unplanned


events you must have a deeper understanding in obtaining approval from
appropriate personnel. Your task now is to do the following:
cxxxvii

1. Watch video presentation on the said topic and have a proper documentation
of the procedures in obtaining approval from the appropriate personnel.
2. Interview a person in the field to acquire the knowledge (procedures) and
skills on the said competency.

Windows 7 Installation
Equipment:
Computer unit with CD or DVD drive
AVR / UPS
Materials:
Windows 7 Installer
Procedure:
1.
2.
3.

Work in triads or quartet (depending on the no. of computer available)


Install the Operating System (OS), Windows 7.
Take turns in doing the above task.
You will be assessed using the criteria in the score card below.
PERFORMANCE SCORE CARD
CRITERIA

Percentage

1. Operating System is installed with no errors.

40%

2. Proper disk partitioning and partition is


performed.
3. Proper use of equipment and materials is
observed.
4. Observance of Safety Precautions.

40%

Score

10%
10%

PERFORMANCE RATING

cxxxviii

BASIC COMPUTER CONFIGURATION SETUP


Configuration is the way a system is set up, or the assortment of
components that make up the system. Configuration can refer to
either hardware or software, or the combination of both.
Basic Input / Output System (BIOS)
The Basic Input Output System, usually referred to as BIOS, is
software stored on a small memory chip on the motherboard.
BIOS instruct the computer on how to perform a number of basic
functions such as booting and keyboard control. BIO is also used to identify
and configure the hardware in a computer such as the hard drive, optical
drive, CPU, memory, etc.

Figure 104.BIOS Set- up

cxxxix

The BIOS is accessed and configured through the BIOS Setup Utility.
The BIOS Setup Utility is, for all reasonable purposes, the BIOS itself. All
available options in BIOS are configurable via the BIOS Setup Utility. The
BIOS Setup Utility is accessed in various ways depending on your computer
or motherboard make and model.
BIOS access and configuration on PC systems is independent of
any operating system because the BIOS is part of the motherboard hardware.
It doesn't matter if a computer is running Windows 7, Windows Vista,
Windows XP, Linux, UNIX, or no operating system at all - BIOS functions
outside of the operating system environment and is no way dependent upon
it.
BIOS contain a number of hardware configuration options that can be
changed through the setup utility. Saving these changes and restarting the
computer applies the changes to the BIOS and alters the way BIOS instructs
the hardware to function. The following list shows the things you can do in
most BIOS systems:
Change the Boot Order
Load BIOS Setup Defaults
Remove a BIOS Password
Create a BIOS Password
Change the Date and Time
Change Floppy Drive Settings
Change Hard Drive Settings
Change CD/DVD/BD Drive Settings
View Amount of Memory Installed
Change the Boot Up NumLock Status

Enable or Disable the Computer Logo


Enable or Disable the Quick Power
On Self Test (POST)
Enable or Disable the CPU Internal
Cache
Enable or Disable the Caching of
BIOS
Change CPU Settings
Change Memory Settings
Change System Voltages

Device Drivers
Now that you successfully installed the operating system, youll need to
configure the devices such as Video Cards, Network Interface Cards, Sound
Cards, etc by installing the device drivers of each. In many cases, if Windows
recognizes the device, drivers will be installed automatically. In some cases,
generic drivers are installed so that the devices will work properly.
Drivers are small software programs that help the operating system
use or drive the device. Whenever a device doesnt work properly, ask if the
proper driver has been installed.
cxl

The procedures listed below describe how to obtain and install drivers
for hardware devices on a Microsoft Windows 2000-based computer.
Step 1: Determine the Hardware Manufacturer
If you do not know the manufacturer of the device for which you want to install
the driver, follow these steps to determine the manufacturer:
1. On the desktop, right-click My Computer, and then click Manage.

Figure 105. Manage My Computer

2. Under System
Tools,
click Device
Manager.
The devices that are installed on the computer are listed in the right
pane.

cxli

Device Manager

Figure 106. Device Manager

3. In the right pane, expand the category of the device that you want to
configure. For example, expand Display adapters.
NOTE: The device may be listed under other devices.

Expanded Device
Category

Figure 107. Expanded Device Category

cxlii

4. Right-click the device for which you want to install the driver, and then
click Properties.
NOTE: The device may appear as Unknown device or as a generic
device.

Figure 108. Device Properties

5. Click the General tab. Make a note of the manufacturer and model of
the device.

Figure 109. General Tab

cxliii

6. Click Cancel,

and

then

quit

Computer

Management.

NOTE: If the device is not displayed in Device Manager, or the


device is listed as an "Unknown device," contact the computer
or device manufacturer to obtain more information about the
device.

Step 2: Obtain the Driver


To obtain the latest driver, use the following list of possible sources for
the driver, in the order in which they are presented.
Original Computer Manufacturer

If the device was installed by your computer manufacturer, contact the


manufacturer of your computer to find out how to obtain, download, and install
the latest drivers for the device.
Device Manufacturer
Contact the manufacturer of the device to inquire about how to obtain,
download, and install the latest drivers for the device.
Chipset Manufacturer
Contact the chipset manufacturer of the device to find out how to
obtain, download, and install the latest drivers for the device. It is best to first
contact the manufacturer of the device for the drivers before you contact the
chipset manufacturer.
For example, if your display adapter uses a NVIDIA chipset, first contact the
manufacturer of the display adapter. If you cannot contact the display adapter
manufacturer or if the manufacturer does not have a driver, contact NVIDIA.
Some examples of chipset manufacturers (and their Web sites) include:
NVIDIA (display adapters)
PCTEL, Inc. (modems)

cxliv

Installation CD or Floppy Disks


If you have the original driver CD or floppy disks that were included
with the computer or device, and if no other source for the drivers is available,
use the original driver that is included with the computer or device.
NOTE: Whenever possible, try to first contact the Original Equipment
Manufacturer (OEM), device manufacturer, or chipset manufacturer to obtain
the latest version of the driver.
Step 3: Install the Driver

The driver files that you download from the OEM, device manufacturer, or
chipset manufacturer differ depending on how the driver is packaged by the
manufacturer.
If the file is an executable program, run the program to extract the files. If the
file is in .zip format, you can use a third-party utility such as WinZip to extract
the files. For more information about how to extract the driver files, see the
instructions that are provided by the manufacturer of the driver.
The driver may use a setup program. The driver package may contain raw
driver files, or it may contain only raw driver files. Some examples include .inf
files, and .sys files. To install the driver, use one of the following methods as
appropriate
to
your
situation.

Driver with a Setup or Installation Program


If the driver uses a setup or installation program, run the program to
install the driver. For more information about how to do this, see the
documentation or contact the driver manufacturer.
Device Is Displayed in Device Manager
1. On the desktop, right-click My Computer, and then click Manage.
2. Under System Tools, click Device Manager. The devices that are
installed on the computer are listed in the right pane.
3. Expand the category of the device that you want to configure. For
example, expand Modems. NOTE: The device may be listed
under other devices.
4. Right-click the device for which you want to install the driver, and then
click Properties.
NOTE: The device may be displayed as Unknown device, or as a
generic device.

cxlv

5. Click the Driver tab, and then click Update Driver. The Upgrade Device
Driver wizard starts.
6. Click Next.
7. Do one of the following:
o Click Search
for a suitable driver for my device
(recommended),
and
then
click Next.
-oro Click Display a list of the known devices for this device so
that I can choose a specific driver, and then click Next.
Click Have Disk, click Browse, locate the .inf files that you
downloaded in Step 2: Obtain the Driver, click an .inf file, and then
click Open.
8. Follow the wizard instructions to install the driver.
9. Restart the computer.
Device Is Not Displayed in Device Manager

Use the Add New Hardware wizard in Control Panel to install drivers for
non-Plug and Play devices. You may have to use this method to install certain
modems, serial ports, or printer ports.
1. Click Start, point to Settings, and then click Control Panel.
2. Double-click Add/Remove Hardware.
3. Click Next.
4. Click Add/Troubleshoot a device, and then click Next.
5. Do one of the following:
o Click Yes, search for new hardware, and then click Next.
-oro Click No, I want to select the hardware from a list, and then
click Next.
6. Follow the wizard instructions to install the driver.
7. Restart the computer.

cxlvi

Installing Device Drivers


Material: Installation CD
Direction: Given an installation CD, perform installation of a device driver.
Check the quality of your work undertaken in accordance with the established
procedures thru the Performance Score Card below.
PERFORMANCE SCORE CARD

Performance Criteria

Criteria

1. The system is correctly started.

20%

2. The Installation CD is properly inserted.

20%

3. Handling and safekeeping of installation CD is observed.

20%

4. The instructions how to install device drivers are accurately


followed.

20%

5. The device drivers are successfully installed

20%
PERFORMANCE RATING

cxlvii

Grade

Lesson3. CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM


In the previous lesson, you were introduced with all the necessary
knowledge and skills on installation of computer devices and operating
system. Now, after executing the correct procedures I am sure that
installation is a very easy task for you. Those skills will be very essential for
the next lesson.
In the next phase of your learning it will focus in conducting test on the
installed computer components. After reading all the required topics and
performing the essential skills you must be able to:
Follow OHS policies and procedures in conducting tests
Check circuits and systems being isolated using specified testing
procedures
Test devices, systems and/or installation to determine its conformity with
the requirements
Undertake final inspections on the installed devices, systems to ensure
conformity with the requirements
Accomplish technical reports on the tests conducted

Follow procedures in forwarding documentation to appropriate personnel and/or


authority on the test conducted.

TESTING INSTALLEDEQUIPMENT / DEVICES (COMPONENTS)


As computer technician you will need a good understanding of the
health and safety regulations from early on in your career, so that you
understand the good practices demanded by law. In particular, you need to:

report any accidents


take reasonable care of your own health and safety when moving
heavy components
not cause any electrical hazards
make sure that workstations meet safety requirements.
cxlviii

You need to adhere to health and safety regulations as they will help to
protect you and others and will avoid any unnecessary legal action for
reckless and unsafe working practices. If you identify any health and safety
problems, you should tell your line manager or the health and safety
representative immediately.
The most basic test is to switch the system on to check it starts without
errors. ICT professionals are also likely to use tools and utilities to check that
all is well with the system after an installation.
The Use of Diagnostic Tools in testing installed hardware components
and other peripherals
Diagnostic tools are used to test and diagnose equipment. Diagnostic
tools include the following:
Digital multimeter is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays the
information on an LCD or LED.

A loopback adapter, also called a loopback plug, tests the basic


functionality of computer ports. The adapter is specific to the port that
you want to test.

The toner probe, is a two-part tool. The toner part is connected to a


cable at one end using specific adapters, such as an RJ-45, coaxial, or
metal clips. The toner generates a tone that travels the length of the
cable. The probe part traces the cable. When the probe is in near
proximity to the cable to which the toner is attached, the tone can be
heard through a speaker in the probe.

Source: www.fluke-87.com

Figure 110. Diagnostic Tools


cxlix

Software Tools
Like hardware tools, there are a variety of software tools that can be
used to help technicians pinpoint and troubleshoot problems. Many of these
tools are free and several come with the Windows operating system.
Disk Management Tools
Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able
to use a range of software tools to diagnose problems, maintain hardware,
and protect the data stored on a computer.
You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
The following are some disk management tools:

FDISK: A command-line tool that creates and deletes partitions on a


hard drive. The FDISK tool is not available in Windows XP, Vista, or 7.
It has been replaced with the Disk Management tool.
Disk Management Tool: Initializes disks, creates partitions, and
formats partitions.
Format: Prepares a hard drive to store information.
ScanDisk or CHKDSK: Checks the integrity of files and folders on a
hard drive by scanning the file system. These tools might also check
the disk surface for physical errors.
Defrag: Optimizes space on a hard drive to allow faster access to
programs and data.
Disk Cleanup: Clears space on a hard drive by searching for files that
can be safely deleted.
System File Checker (SFC): A command-line tool that scans the
operating system critical files and replaces files that are corrupted.

Use the Windows 7 boot disk for troubleshooting and repairing


corrupted files. The Windows 7 boot disk repairs Windows system files,
restores damaged or lost files, and reinstalls the operating system.

cl

Test procedures
A test procedure is a set of steps to guide you through what needs to
be done to thoroughly test the installation. It is designed to help you work
more effectively and to make sure you test everything that needs testing.
Test procedures are created in-house and could include these steps:
1. Gathering test information. The first step is to run the tests required by
the procedure and find out what happens. You should record all the results of
your tests in a log so that you know which pass and which fail, thereby
requiring further action.
2. Validating the test information. The next step is to check the data you
gathered from the tests to make sure it is correct. This is usually done by
running the tests again.
3. Responding to test information. This step is important because you need
to be able to recognize when a test shows problems or is successful. For
example, if ping is used to test a network connection then Request timed out
shows the test was not successful.
4. Checking specification. The final step is an important end to testing. You
need to check the specification for the installation to make sure that it has
been met. For example, if a user requested an upgrade to make their display
run at 1920 x 1200, then the ICT professional should check that the graphics
card and screen can do this.
External Visual Inspection
The external visual inspection consists of a quick inspection of the
exterior of the computer, the monitor, the keyboard, any peripherals, and
cables. While performing the visual inspection, make any necessary
corrections. To perform the external visual inspection, perform the following
steps:
1. Turn off the computer, the monitor, and all peripherals.
2. Verify that all power cables are properly connected to the computer,
the monitor and peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly
attached to the proper connectors on the back of the computer.

For a PS/2-compatible mouse, the keyboard and mouse interface


cable connectors are identical except for their labels.

cli

For a serial mouse, the mouse interface cable must be firmly attached
to one of the serial port connectors, and its captive screws must be
secure enough to ensure a firm connection.

4. Verify that network cables (if present) are properly attached.


5. Verify that any devices attached to the serial and parallel port
connectors are properly connected.

Each of the serial and parallel port interface cables must be firmly
attached to an appropriate connector on the back of the computer as
well as to the interface connector on the device. The captive screws
that secure these connectors at each end of the interface cable must
be secure enough to ensure a firm connection.

6. Verify that the video interface cable is firmly attached to the video
connector on the back panel or to a video expansion card, and also to
the connector on the back of the monitor. For proper connection of the
video monitor, see the documentation for the monitor.
7. Inspect all external monitor controls for any obvious damage or
improper settings. For proper settings of the video monitor controls,
see the documentation for the monitor.
8. Inspect the keyboard to ensure that no keys are sticking. If one or
more keys are sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and
indicators, and all user-accessible data storage devices for any signs
of physical damage. Does the inspection reveal any problems?
Yes. Proceed to the appropriate procedure in "Removing and Replacing
Parts."
No. Proceed to "Observing the Boot Routine."
Observing the Boot Routine
After you have performed an external visual inspection as described in
the previous section, you should boot the system and, while the boot routine
is running, observe the system for any indications of problems.

NOTE: Most of the steps in this procedure require observation of system


functions and indications, some of which can occur simultaneously. It may be
necessary to reboot the system several times to complete all of these steps.

clii

To observe problem indications during the boot routine, perform the following
steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.
Does the fan run normally?
o
o

Yes. Proceed to step 3.


No. Troubleshoot the system power supply.

3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on
the upper-right corner of the keyboard. After all three indicators flash
momentarily, and following a long pause (approximately 30 seconds),
the Num Lock indicator should light up and remain on (unless the Num
Lock option is set to Off in the System Setup program).
Do these indicators flash on and off within approximately 10 seconds
after the boot routine starts?
o
o

Yes. Proceed to step 4.


No. Troubleshoot the system power supply. If the troubleshooting
procedure indicates that the system power supply is operational,
troubleshoot the memory.

4. During the boot routine, observe the system for any of the following
indications:
o

Beep codes A beep code is a series of beeps that indicates


an error condition.

System error messages these messages can indicate


problems or provide status information.

Diskette-drive and hard-disk drive access indicators These


indicators light up in response to data being transferred to or
from the drives. If either of these indicators fails to light up
during the boot routine, troubleshoot the diskette drive or harddisk drive subsystem, as appropriate.

5. Observe the monitor screen for the Diagnostics menu.

cliii

Internal Visual Inspection


NOTICE: Before you proceed with the internal visual inspection
described in this section, ensure that the user has saved all open files
and exited all open application programs if possible.
A simple visual inspection of a computers interior hardware can often
lead to the source of a problem, such as a loose expansion card, cable
connector, or mounting screw. To perform the internal visual inspection,
perform the following steps:
1. Turn off the system, including any attached peripherals, and
disconnect all the AC power cables from electrical outlets.
CAUTION: Before beginning to work inside the computer, disconnect
the power supply from the power source and the power supply cables
from the power supply.

2. Remove the computers right side cover.

CAUTION: The heat sink assembly can get extremely hot during
system operations. Be sure that it has had sufficient time to cool
before touching it.
CAUTION: When handling the heat sink assembly, take care to
avoid sharp edges on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink
assembly or assemblies are fully seated in their sockets or connectors.

4. To ensure that the chips are fully seated in their sockets, press firmly
on the top of each chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are
firmly attached to their appropriate connectors.
7. Reinstall the computer cover.
8. Reconnect the computer and any attached peripherals to their power
sources, and turn them on.

cliv

Suppose that you are in the workshop carrying out hardware


installations, the owner are very impressed with you. There has been a lot of
telephone time spent recently explaining to customers how to test installed
components of their computer systems. The shop has decided to create their
own video that will be uploaded to the website and YouTube. You have been
asked to create this video.
1. Create

a video to demonstrate how to install the hardware


components. Make sure you include everything you need to doto work
safely.
2. Show how to configure any device installed in the computer.
3. Create another video on the following:
a. Undertake final inspection on the assembled computer system for
functionality. This will be o test that the newly installed hardware
components work without problems;
b. Accomplish technical reports on the tests conducted; and
c. Follow procedures in forwarding documentation to appropriate
personnel or authority

clv

Test I. Identification
Direction: Identify the terms being described in the following sentences.
1. These are mobile computers that are very handy to use.
2. They are computers designed to provide services to client machines in a
computer network.
3. They are also called mid-range systems or workstations.
4. A computer with a microprocessor and its central processing unit it.
5. They fall in the category of laptops, but are inexpensive and relatively smaller in
size.
6. A type of computer which is intended be used on a single location.
7. They use digital circuits and are designed to operate on two states, namely bits
0 and 1.
8. Computers that have the capacities to host multiple operating systems and
operate as a number of virtual machines and can substitute for several small
servers.
9. It is a handheld computer and popularly known as a palmtop.
10. These computers can be worn on the body and are often used in the study of
behavior modeling and human health.
11. It is considered as the most important program that runs on a computer.
12. It is composed of a device that accepts data and instructions from the user or
from another computer system.
13. Any piece of computer hardware that displays results after the computer has
processed the input data that has been entered.
14. Any apparatus for recording computer data in a permanent or semi-permanent
form.
15. It protects a computer network from unauthorized access.
16. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
17. This is an internetworking system capable of joining together two networks that
use different base protocols.
18. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications.
19. It is a small, simple, inexpensive device that joins multiple computers together.
20. A device filters data traffic at a network boundary.

Test II. True or false


Direction: Write TRUE if the statement is correct and FALSE otherwise.
1. Always use an anti-static wrist strap when working on a computer
(except when working on monitors)
2. Always disconnect a computer from the AC power and from any
powered peripherals while you are working on it.
clvi

3. Always grasp a metal part of the computer chassis with your bare hand
before you touch anything inside. Do this even if you are wearing an
anti-static wristband.
4. Always handle electronic components by a non-conducting (nonmetallic) edge. Don't touch the pins or other connectors.
5. Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection

6. Never eat, drink, or smoke while working on a computer.


7. Whenever you purchase software or hardware for your computer, you should
first make sure your computer supports the system requirements.
8. The speed of a computer's processor chip (technically known as its "clock
speed") in measured in gigahertz (GHz).
9. A computer's graphics system determines how well it can work with visual
output.
10. Today 40GB is an absolute minimum hard drive size for a new computer
running Windows 7.
11. When attaching cables, never force a connection.
12. BIOS instruct the computer on how to perform a number of basic functions
such as booting and keyboard control.
13. The external visual inspection consists of a quick inspection of the interior of
the computer.
14. Disk management tools help detect and correct disk errors.
15. The most basic test is to switch the system on to check it starts without
errors.

Test III. Multiple Choices


Direction: Read each questions carefully and write the letter of the best
answer.
1. These are small software programs that help the operating system use the
device.
a. Installer
c. Driver
b. Application
d. BIOS
2. Which of the following is software shared on a small memory chip on the
motherboard?
a. Installer
c. driver
b. Application
d. BIOS
3. It is the way to set up a system or the assortment of components that make
up the system.
a. Configuration
c. Driver
b. Set up
d. Installation
4. Which of the following is not a Windows XP minimum requirement?
a. 128MB RAM or higher

clvii

b.
c.
d.

CD- ROM or DVD ROM


Lower resolution monitor
4.3 GB hard disk space or more

5. If you see a message to press any key to boot the CD and you fail to do so,
what do you think will happen?
a. The computer will restart
b. Set up inspecting your system will appear
c. It will be prompted to BIOS setup
d. It will return to boot menu
6. What key should you press if you need to install any third- party or RAID
drivers?
a. F2
c. F9
b. F6
d. F12
7. Where do we typically install the operating system?
a. Drive C
b. DVD
c. External Drive
d. Floppy Drive
8. Suppose that you will install Windows XP on a system with more than one
partition, what important process should be done?
a. Change the file system
b. Delete the data and files on the different partition
c. Examine the partition
d. Format the correct partition
9. What file system is usually used during installation?
a. FAT
b. FAT32
c. NTFS
d. NTFS32
10. Which of the following is a connector on the back of a computer or other
device?
a. Modem
b. Port hub
c. Router
d. Network Gateway

clviii

Test IV. Matching Type


Direction: Match column A with Column B and write your answer on a
separate sheet of paper.
11.
12.

A.

1) It serves as the brain of computer.


13.
2) Printed-circuit
boards (also called interface
cards) that enable the computer to use a
14.
peripheral
device
3) Also called read/write memory
15.
4) Small
portable disk drive usually used for
backing
up files
16.
5) Main board of a computer
6) Also
17. called diskette
7) Acts as a pointing device
8) Device
that makes sounds, clips and any audio
18.
materials be heard.
19.
9) Component
that reads and record data in CDs
and DVDs.
10) It20.
is a visual device that displays the information
11) Plug- and play portable storage device
21. text and illustrations in paper
12) Prints
13) Converts AC into DC
22.
14) Allows more than one program to run
concurrently
15) Handheld computer

a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
k)
l)
m)
n)
o)
p)
q)

B.
Adapter
CD- ROM
CPU
Flash Drive
Floppy disk
Microphone
Monitor
Motherboard
Mouse
Multitasking
Optical Discs
PDA
Power supply
Printer
RAM
Register
ROM

r) Speaker
s) Tablet
t) Zip Drive

clix

SKILLS TEST
Direction: Listed below are some of the most important skills that you must gain in order
to render quality service when you enter the real world of Computer Hardware Servicing.
Read the skills carefully. Write YES if you are familiar with the skill and NO if not. Feel
free to answer each skill. Write your answers in your notebook.
Skills in Computer Hardware Servicing

YES

NO

I can open a computer case.


I can connect the mouse.
I can connect the keyboard.
I can connect the monitor.
I can apply occupational health and safety precautions while working.
I can remove the system fan.
I can detach the power supply from the system unit.
I know how to remove the RAM from the motherboard.
I can remove the hard drive from the system unit.
I can install the power supply.
I know how to install the motherboard.
I can install the internal drives in a system unit.
I know how to attach RAM in the memory socket.
I can install CD / DVD drives.
I know how to install an operating system
I know how to configure a hardware components
I know the procedures in inspecting operating systems and software
components

clx

Books and Articles and Printed Materials:


Barry Press, Marcia Press, PC Upgrade and Repair Bible,
Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256

Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475


Crosspoint Boulevard, Indianapolis, IN 46256

Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop


Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard,
Indianapolis, IN 46256
Ronaldo V. Ramilo And Deover M. Pasco K to 12 Basic Education CurriculumTechnology and Livelihood Education Learning Module Computer Hardware
Serviciing
Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero
Technology and Livelihood Education- Information and Communications
Technology Learners Manual Grade 7 & 8

Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter Introduction to Information


Technology 3rd Edition- 2005 at Rosewood Drive, Denver, John
Wisley and Sons(Asia) Pte. Ltd

Electronic Resources:
Computer Memory Types Retrieved from
http://www.buzzle.com/articles/computer-memory-types.html
Measurements for Memory & Storage Retrieved from
http://www.athropolis.com/popup/c-comp2.htm
Fundamentals of PC repair Retrieved from http://www.ustudy.in/ce/hard/u1

clxi

Occupational Health and Safety Precautions Retrieved from


http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20%20With%20Oral%20Questioning_0.pdf
Puzzles for Activities Retrieved from
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp
Occupational Safety Precautions Retrieved from
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf
Computer Hardware Basics Retrieved from
http://www.youtube.com/watch?v=6N7bqBsFL0wHow to install Computer Hardware Retrieved from
http://www.wikihow.com/Install-Computer-HardwareHow to install Computer components Retrieved from
http://www.directron.com/howtoupsys.htmlTool Selection Retrieved from
http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopic
s/20 /10/ProperToolSelection.pdf
PC Assembly Retrieved from http://www.iml.uts.edu.au/assessmentfutures/designing/assembling.html
Computer Basics Retrieved from
http://www.instructables.com/id/Disassemble-a-Computer/PC Hardware, Networking ,Operating Systems and Troubleshooting Retrieved from
www.professormesser.com-

clxii

Adapters- These are printed-circuit boards that enables the computer to use
a peripheral device for which it does not have the necessary connections or
circuit boards.
Analog Computers- It uses continuous variables for mathematical
operations and utilizes mechanical or electrical energy.
Bridge is a device filters data traffic at a network boundary
Digital Computers- They use digital circuits and are designed to operate on
two states, namely bits 0 and 1
Digital multimeter is a device that can take many types of measurements. It
tests the integrity
Drivers- are small software programs that help the operating system use or
drive the device
Ethernet switch is a device that gathers the signals from devices that are
connected to it
Hard disk drive- Is a magnetic storage device that is installed inside the
computer.
Hardware-These are the tangible component of a computer system.
Hazard-Is a situation in the workplace that has the potential to harm the
health and safety of people or to damage plant and equipment.
Hub- is a small, simple, inexpensive device that joins multiple computers
together
Hybrid Computers- a combination of both digital and analog computers

clxiii

Loopback adapter- is also called a loopback plug, tests the basic


functionality of computer ports
Mainframe Computers- these are computers have the capacities to host
multiple operating systems and operate as a number of virtual machines and
can substitute for several small servers
Microcomputers- A computer with a microprocessor and its central
processing unit it is known as a microcomputer
Minicomputers- are also called mid-range systems or workstations
Motherboard- is the main circuit board of a computer containing all the
essential parts of a PC.
Network firewall - protects a computer network from unauthorized access
Personal Digital Assistants (PDAs)- is a handheld computer and popularly
known as a palmtop
Smart board - Type of display screen that has a touch sensitive transparent
panel covering the screen.
Static electricity - is an accumulation of electric charge on an insulated
body.
Servers- They are computers designed to provide services to client machines
in a computer network

clxiv

ATA- Advance Technology Attachment


BIOS- Basic Input Output System
CD- Compact Disc
CHS- Computer Hardware Servicing
CRT- Cathode Ray Tube
ESD- Electro Static Discharge
DVD- Digital Versatile Disc
FAT- File Allocation Table
GB- Giga Byte
HDD- Hard Disk Drive
LAN- Local Area Networking
LCD- Liquid Crystal Display
LED- Light Emitting Diode
MB- Mega Byte
NTFS- New Technology File System
OHS- Occupational Health and Safety

clxv

OS- Operating System


PDA- Personal Digital Assistant
PPE- Personal Protective Equipment
RAM- Random Access Memory
ROM- Read Only Memory
SATA- Serial Advance Technology Attachment
USB- Universal Serial Bus
WAN- Wide Area Network
VGA- Video Graphic Array

clxvi

MODULE 4:

DIAGNOSE AND
TROUBLESHOOT
COMPUTER SYSTEMS (DT)
Content Standard

Performance Standard

The
learner
demonstrates
understanding of the underlying
concepts
and
principles
on
diagnosing and troubleshooting of
computer systems.

The learner independently diagnoses


and troubleshoots computer systems
as prescribed in the TESDA Training
Regulation.

Number of Sessions (Time Allotment): 60 hrs.

clxvii

In this module, there will be four (4) major topics that you will
encounter: (1) be plan and prepare diagnosis of computer system errors;
(2) diagnose and configure computer systems and networks; (3) inspect and
test the configured computer systems and networks; and (4) test systems and
networks. The four major topics contains sub-topics which all leads to
diagnose and troubleshoot computer systems. This module contains what
to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well
as what to TRANSFER. The competencies for this module are:
LO 1. Plan and prepare for diagnosis of computer systems errors
Follow OHS procedures in planning and preparing diagnosis of computer
systems errors
Determine the computer systems errors using manual and software
diagnosis
LO 2. Diagnose and configure computer systems and networks
Follow OHS procedures in planning and preparing diagnosis of computer
systems and network errors
Identify the diagnosed computer systems and network errors based on
the job requirements
Configure computer systems and networks
LO 3. Inspect and test the configured computer systems and networks

Follow OHS procedures in inspecting and testing configured computer systems


and networks
Inspect configured computer systems and networks
Replace defective components
Reinstall defective computer systems
Identify network errors
Repair network errors based on standard procedures
Test the configured computer systems and networks

LO 4. Test Systems and Networks

Follow OHS procedures in testing systems and networks

Test computer systems and networks in accordance with the job


requirements
Accomplish technical reports on the tests conducted

clxviii

In order to master the above listed competencies, you must be


knowledgeable of the topics under what to KNOW, perform activities required
under what to PROCESS, accomplish additional meaningful tasks under what
to REFLECT and UNDERSTAND and finally show some evidences of your
learning by transferring what you have learned in a different context under
what to TRANSFER.

You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.
Instruction:

Read each of the statements in the left-hand column of the chart.


Place a check on the column that indicates your answers.

Knowledgeable

Have a
No
Little
Knowledge
Knowledge
at All

Plan and prepare work to ensure


occupational health and safety
(OHS) policies and procedures
are followed
Obtain materials, tools,
equipment and testing devices
needed to conform with job
requirements
Interpret
work
instructions
according to job requirements
Obtain computer
components/devices/systems and
determines its location prior to
installation
Install
equipment/devices/systems in
accordance with job requirements
Check/Test devices/systems
and/or installations to determine
the conformity to job
requirements.
Check computer systems and
networks for configuration in
accordance with specifications
clxix

and requirements
Diagnose fault or problem in the
computer systems and networks
in line with standard operating
procedures (SOP)
Configure the identified systems
and networks based on
specifications and job
requirements
Inspect and test configured
computer systems and networks
in conformity with manufacturer's
instructions/manual
Correct/adjust components or
parts of computer systems and
networks in accordance with job
requirements
Test computer systems and
networks to ensure safe
operation
Perform scheduled/periodic
maintenance in accordance with
manufacturer's requirements
Make needed
repairs/replacements in
accordance with established
procedures, when necessary
Document tasks undertaken in
accordance with SOP
Clean and clear worksite of all
surplus/excess materials in
accordance with company SOP

clxx

LESSON 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER


SYSTEMS ERRORS

SAFETY PRECAUTIONS
Personal Protective Equipment
Proper preparation is the key to a successful work. Before you begin,
make sure that you have the tools you will need, and secure a clear well-lit
workplace. Gather all the components youll be using and unpack them at the
same time. Always keep in mind that personal protection is one of the traits of
a good computer technician.
Types of personal protective devices
1. Anti-static devices
2. Power surge protectors
3. Personal equipment
Anti-static devices
Devices designed to protect the computer from static electricity.

Source: www.desktopreality.com

Anti-static Wrist Strap

Source: www.desktopreality.com

Anti-static Mat

clxxi

Source: www.desktopreality.com

Source: www.rapidonline.com

Anti-static Bag

Anti-static Spray

Power surge protectors


Devices designed to protect the computer from sudden power surges
from intermittent power sources.
Examples:
1. AVR (Automatic Voltage Regulator)

Source: www.neopower.com

2. UPS (Uninterrupted Power Supply)

Source: www.amazon.co.uk

clxxii

Personal Equipment

small paint brush

screw drivers

pliers and tweezers

compressed air

handheld vacuum

clxxiii

Directions: Perform the activity below.

Choose a partner
Do a simulation exercise
o One will act out the role of a computer teacher.
o The other will be the student
Situation: Computer teacher will show/demonstrate to the students the
Personal Protective Devices, what they are and how they are used.
The Student keeps on asking about the Personal Protective
Devices/Equipment and how they can be maintained in good condition
of PC.

Answer the following questions in your own


answer/test notebook.
1. What personal protective devices do people who always works (do
troubleshooting) with computers commonly use? How often do they
use them?
2. Computers should be protected from static electricity to prevent
component malfunction. What anti-static devices can you utilize to
avoid such malfunction?

clxxiv

TYPES OF COMPUTER SYSTEM ERROR


There are several errors in a computer from the point you open it upto the
point you reach the stand by window (reaching standby windows means boot
process has no error). Below is a list of computer errors.
1. No Video Output - When you open your PC, nothing shows up in your
monitor and the LED indicator of your monitor is flashing in yellow color.
2. No Video Output - Same as number one but now the LED indicator of your
monitor is in steady orange color.
3. Doesn't Boot - When you open your PC it will show the processors brand
and/or the motherboards brand but doesn't continue. Usually this error will
result to system restart over and over again.
4. Never Ending Loading of Operating system - The computer opens up then
boots but when the operating system loads it, doesn't continue and it will take
a longtime if you're going to wait for it to load.
5. Lots of pop up windows showing on standby mode - This also happens
even if you try disconnecting your computer set from the internet. This is what
we called aftershock virus which will continue to run even if internet is
disconnected.
6. Lots of hardware installation windows appear - This happens even if you try
installing the hardware. When you restart your set it will happen again.
7. Safe mode doesn't work - When you try going to safe mode, all you will see
is a list of files in Command prompt style.
8. Keyboard and mouse system restart - This will happen only in standby
mode, when you move your mouse or type something, your system will
automatically restart and the worst part is it will delete a file at random.
9. Sound on/off error - Upon loading the operating system, you will hear a
loading sound and then the sound stops, when you try running an audio file,
no sound will be heard.
clxxv

10. Application causes system to restart - Just like the mouse problem, when
you open a program that will take the whole screen like for example a game
and/or a program applications, when you close it, it will cause your system to
restart.
Aside from the common computer errors, computers also can have
different Operating System (OS) errors. OS errors can be classified into
various categories such as:
1. System errors These are moderately dangerous types of errors
among those that can pop up on your PC. System errors are caused
by malfunctioning hardware components, corrupted operating system
modules, etc.
2. Runtime errors Runtime errors are caused by corrupted or
malfunctioning system files or software executables. Most runtime
errors cause the application that caused it to shut down. However,
more serious runtime errors may cause the system to become
unstable or unresponsive, suggesting that you should restart your
computer.
3. Stop errors Stop errors are caused by corrupted hardware,
especially malfunctioning RAM modules and bad sectors on hard
disks. Stop errors can be difficult to resolve at times.
4. Device Manager Errors These are usually caused by corrupted
driver files or malfunctioning hardware components. In case of the
former cause, the problem is often solved by reinstalling or updating
the drivers. However, the latter cause can often be solved only by
replacing hardware components.
5. POST code errors POST code errors are caused by malfunctioning
hardware components, and are characterized by short beep sounds
from the tiny internal speaker of your motherboard. POST code errors
occur when you press the power button to turn on your PC.
6. Application errors These can happen at any point of time. As the
name suggests, these are caused by applications while those are
running. These are commonly caused by glitches in the program code
itself. These are normally resolved by updating the program to its latest
version.
7. Browser Status Codes These are caused by problems faced by
browsers when trying to access a website. These can be caused by
misplaced web pages in the server of the website itself, or due to

clxxvi

connection problems. For instance, a 404 error would indicate that the
browser is trying to access a webpage that does not exist in the
specified location.

DIAGNOSING COMPUTER SYSTEMS


PC Diagnosing
Probably the most frustrating problem computer users
run into are startup problems, where your computer
wont boot. Equally annoying are error messages you
constantly run into during your computers startup
process. In this module, you will be given a few tips on
how you can avoid some of the most common problems
that happen right after your computer is turned on. Here
you will learn the basic troubleshooting.

Trial and error: When you find a faulty component in your computer,
check it with the other computers so that you can make sure whether
the fault is in the component or not.
Check cables: In case of any device failure, check all the cables of
your computer such as data cables, power cable, internal circuitry
cable and make sure that all these are plugged in and working fine.
Hardware settings: Check the hardware settings in the CMOS and in
the device manager of the system and make all the device drivers up
to date and all the cards are plugged in properly.
Notice changes: When you notice a software or hardware error in
your computer, determine what was changed before the problem
occurred.
Event viewer: In the event viewer, you will find the error or warning
messages associated with any faulty hardware or software.
Make notes: Troubleshooting is a useful skill and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a
record on how a certain problem occurred and how did you solve it.

clxxvii

Common PC Problems and Solutions


You are working away at your computer when suddenly, an error
message or worse, your computer comes to a screeching halt. Here are the
common computer problems and solutions that can help you.
Steps
1. Check the POST. POST stands for Power On Self-Test. This is generally
the first or second thing that appears on a computer after turning on the
power. This appears before the operating system begins to load. The POST
will display any problem found with the hardware that makes the computer
unable to boot. POST may also display problems with hardware that allow the
computer to boot, but not operate at its full capacity during operation.
2. Notice the load time of the OS (operating system). A longer than usual
load time may indicate errors in the hard drive.
3. Notice any graphics problems once the OS has loaded. Reduced
graphics may indicate driver failures or hardware failures with graphic cards.
4. Perform an auditory test. An auditory test is a simple, but still effective
way of judging how a computer is working. With the computer on and running,
play any decent length audio file (usually above 30 sec.) If the audio is
choppy or slow, it usually means that the processor is working at an elevated
level, or there is not enough RAM to run all programs loading. Changing the
startup sound is a great way to apply this test. Another issue associated with
choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the
hard drive reads and writes data from a drive. Switching to Direct Memory
Access (DMA) allows for faster reads and writes, and can sometimes repair
choppy audio.
5. Check any newly installed hardware. Many operating systems,
especially Windows, can have conflicts with new drivers. The driver may be
badly written, or it may conflict with another process. Windows will usually
notify you about devices that can cause or have any problem. To check this
use the Device Manager, this can be accessed by entering the Control Panel,
clicking the System icon, clicking the Hardware tab, and clicking on Device
Manager. Use this to check and arrange the properties of hardware.

clxxviii

6. Check any newly installed software. Software may require more


resources than the system can provide. Chances are that if a problem begins
after software starts, the software is causing it. If the problem appears directly
upon startup, it may be caused by software that starts automatically on boot.
7. Check RAM and CPU consumption. A common problem is a choppy or
sluggish system. If a system is choppy it is good practice to see if a program
is consuming more resources than the computer can provide. An easy way to
check this is to use the Task Manager, right click on the taskbar select Task
Manager, and click the Processes tab. The CPU column contains a number
that indicates the percentage of CPU the process is consuming. The Memory
Usage column indicates how much memory a process is consuming.
8. Listen to the computer, if the hard drive is scratching or making loud
noises, shut off the computer and have a professional diagnose the
hard drive. Listen to the CPU fan, this comes on a high speed when the CPU
is working hard, and can tell you when the computer is working beyond its
capacity.
9. Run a virus and malware scan. Performance problems can be caused by
malware on the computer. Running a virus scan can find any problem. Use a
commonly updated virus scanner (such as Norton Antivirus or Avast!
Antivirus)
10. Check for the problem in safe mode. To enter safe mode, press F8
repeatedly during POST (this works on most systems). If the problem persists
in safe mode, it is a fair bet that the operating system itself is to blame.
Common Trouble shooting for Computer Units
1. Double check the power connections.
2. Voltage regulator and power supply could cause power failure in the
computer unit.
3. Check the power cords and cable connectors in your computer unit.
4. Unseated card. Loose cards could cause malfunction.
5. Check the boot sequence configuration in the advance BIOS (Basic
Input/Output Unit) setup.

clxxix

Diagnosing Network Connection


Things to look for if a PC is connected to the internet or network:
First, check the cable connecting to the network card into the network
hub.
Check the back of the computer to see if the network card light is on
Check the network cable (use cable tester)
Check the network hub (use multi-tester)

Identify the following:


1. Moderately dangerous types of errors that can pop up on your PC.
2. Caused by malfunctioning hardware components and characterized by short
beep sounds from the tiny internal speaker of your motherboard.
3. They happen at any point of time. As the name suggests, these are caused
by applications while those are running.
4. Usually caused by corrupted driver files or malfunctioning hardware
components.
5. Caused by corrupted or malfunctioning system files or software executables.
6. Caused by corrupted hardware, especially malfunctioning RAM modules and
bad sectors on hard disks.
7. Caused by problems faced by browsers when trying to access a website.

Task: Develop a Sample Diagnostic Plan


List down all possible components to be checked based on the symptoms.
Symptoms: Dead Computer
Monitor

Good Defective Remedy

AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch
Power Supply

clxxx

Diagnosing a Computer Power Supply


Create a diagnostic plan for troubleshooting a power supply with the
use of the following tools, materials and equipment.
You will be assessed using the following criteria:
CRITERIA

Passed

Failed

1. Sequence of steps in diagnosing is followed.


2. Safety precaution is observed.
3. Appropriate tools are used in diagnosing.
4. Diagnostic plan for troubleshooting is created.
PERFORMANCE RATING

LESSON2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND


NETWORKS

SAFETY PRECAUTIONS
Occupational Health and Safety (OHS) refers to the legislation,
policies, procedures and activities that aim to protect the health, safety and
welfare of all people at the workplace.
Every worker has the right to a healthy and safe work and to a work
environment that enables them to live a socially and economically productive
life. Safety practices should be learned early and must be followed when
working with any electrical device including personal computers and
peripherals.

clxxxi

Personal safety while working with PCs


The following are some safety precautions to take before working with any
computer devices:

Before doing anything, listen to your teachers instruction to prevent


accidents or any unwanted events that may occur on your workplace.
Do not work on a computer when you are wet because you might get
electrocuted.
Do not remove internal devices of the computer when it is turned on.
Avoid playing or running while inside the room.
Always wear personal protective equipments (PPE) like coverall, shoes
with rubber sole, anti-static wrist strap, etc.
Ask for assistance from your teacher when it comes dealing with
computer devices.
Applying safety measures when handling tools and equipment are
necessary to avoid certain damages.

The student is further expected to maintain good health, to be neat in


personal appearance and to practice safe working procedures at all time with
appropriate equipment.

Basic Concepts of Electricity


This lesson will introduce you to the fundamental knowledge of
electricity. It will equip the student with the basic knowledge in electricity.

Basic Electrical Terms


Electricity

Is defined as the flow of electron or electric current. It


is an invisible form of energy that can be
transformed into other forms of energy like heat light
and mechanical.

Electron

Is the negatively charged component of an atom. It


has the ability to flow.

clxxxii

Proton

Is the positively charged component of an atom. It


has the ability to attract electron.

Matter

Is anything that occupy space and has mass. It can


be a solid, liquid or gas in state.

Atom

Basic component of matter. It composes of a


nucleus which is the central part, the protons and
electrons.

Current

Same as electricity or flow of electron. The amount


of current flowing in a circuit can be measured in
ampere (I).

Voltage

The amount of pulling force that makes the electron


flow. Also known as potential difference or EMF
(electromotive force). The amount of voltage can be
measured in volt (V).

Resistance

Defined as the opposition to the flow of current. The


amount of resistance can be measure in ohms ().

Conductors and Insulators

Conductors are materials that easily allow the flow of current, or it has
a low resistance to current flow.
Examples; aluminum, gold, silver, copper, iron

Insulators are materials that do not easily allow the flow of current, or
it has a high resistance to current flow.
Examples; rubber, plastic, paper

clxxxiii

Types of Current
1. Direct Current
In direct current (DC), the flow of electric charge is only in one
direction, the type of electricity produced by batteries, static, and lightning.A
voltage is created and maybe stored until it is consumed when the current
flows directly, in one direction. In the circuit, the current flows at a specific,
constant voltage (this is oversimplified somewhat but good enough for our
needs.) When you use a flashlight, pocket radio, portable CD player or
virtually any other type of portable or battery-powered device, you are using
direct current.
Most DC circuits are relatively low in voltage; for example, your car's
battery is approximately 12V, and that's about as high a DC voltage as most
people ever use.

Source: www.electrostudy.com

Figure 1.Direct Current


Figure 1 shows an ideal 12 V DC current. The voltage is considered
positive because its potential is measured relative to ground or the zeropotential default state of the earth.
Direct currents flow in one direction only and are constant in time. Their
appearance is that of a straight line which does not vary. They are produced
from power sources such as batteries, power supplies and DC generators.
Photovoltaic devices such as solar cells also generate DC power.

clxxxiv

2. AC Alternating Current
In alternating current (AC, also ac) the movement of electric charge
periodically reverses direction. This type of electricity is produced or
generated by AC generators commonly from a hydro electric plant. It is the
commercial power that we use in homes and offices. Delivered through a
power transmission lines.AC current can be reduced through the use of
power transformer to suite for its application.It can also be converted to DC
for a specific purpose. In the Philippines AC is rated as 220V AC at 60 Hz.
Alternating currents change direction, flowing first one way and then
the other. They are sinusoidal waves, so that they change in time. They are
produced from sources such as power supplies and AC generators. In North
America, AC is 120 volts and 60 hertz or cycles per second. This means it
changes direction 60 times per second. In Europe, it is generally 50 hertz with
220 to 240 volts.

Source: www.electrostudy.com

Figure2. Alternating Current


Why does standard electricity come only in the form of alternating
current?
There are a number of reasons, but one of the most important is that a
characteristic of AC is that it is relatively easy to change voltages from one
level to another using a transformer, while transformers do not work for DC.
This capability allows the companies that generate and distribute electricity to
do it in a more efficient manner, by transmitting it at high voltage for long
lengths, which reduces energy loss due to the resistance in the transmission
wires. Another reason is that it may be easier to mechanically generate
alternating current electricity than direct current.

clxxxv

PCs use only direct current, which means that the alternating current
provided by your utility must be converted to direct current before use.
This is the primary function of your power supply.

AC POWER

PCs PSU

DC POWER

MOTHERBOARD
DRIVES
COOLING FANS

Figure 3.Simplified block diagram of a PC power supply


Electric Circuit
Electric circuit - is the pathways for electricity to flow.
Components of Circuit

Load - commonly represented by a bulb or any electrical component


that consumes electricity.

Supply - Commonly represented by a cell or a battery

Switch - an electrical device that opens or closed a circuit.

Figure4. A simple circuit

clxxxvi

Types of Circuit
1. Open Circuit - a type of circuit that has an open path for current to flow. It
means that current cannot flow in open circuit.

Supply
Load

Switch

Figure5. An open circuit


The switch is said to be OPEN the current cant flow into the circuit
and the bulb is OFF
2. Closed Circuit - a type of circuit that has a closed path for current to flow.
It means that current can flow in a closed circuit.

Load

Supply

Switch
Figure6. A closed circuit

The switch is said to be CLOSED the current cant flow into the circuit
and the bulb is ON

clxxxvii

I. Identification:
Direction: Identify the following statement.
_________1.

Defined as the flow of electron or electric current. It is an invisible


form of energy that can be transformed into other form of energy
like heat light and mechanical.

_________2.

The negatively charge component of an atom. It has the ability to


flow.

_________3.

Defined as the opposition to the flow of current. The amount of


resistance can be measured in ohms ().

_________4.

The positively charged component of an atom. It has the ability to


attract electron.

_________5.

Anything that occupy space and has mass. It can be a solid, liquid
or gas in state.

_________6.

Basic component of matter. It is composed of a nucleus which is


the central part, the protons and electrons.

_________7.

Same as electricity or flow of electron. The amount of current


flowing in a circuit can be measured in ampere (I).

_________8.

The amount of pulling force that makes the electron flow. Also
known as potential difference or EMF (electromotive force). The
amount of voltage can be measured in volt (V).

_________9.

Materials that easily allow the flow of current, or it has a low


resistance to current flow.

_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.

clxxxviii

_________11. A computer power supply converts AC to ___________________.


_________12. Define as the pathways for electricity to flow.
_________13. A component of a circuit that is commonly represented by a bulb or
any electrical component that consumes electricity.
_________14. A component of a circuit that is commonly represented by a cell or
a battery.
_________15. An electrical device that opens or closed a circuit.
_________16. A type of circuit that has a closed path for current to flow. It means
that current can flow in this circuit.
_________17. A type of circuit that has an open path for current to flow. It means
that current cannot flow in this circuit.
_________18. A circuit connection has only one path of current flow. In this circuit
connection the current remain constant.
_________19. A circuit connection that has 2 or more path of current. In this circuit
the voltage remains constant.
_________20. An invisible form of energy.

Techniques for diagnosing computer systems


Computer Diagnosis
Sometimes when the problem with a system is not totally apparent and
intermittent, using a basic common diagnostic procedure may help determine
what is wrong. This procedure has a number of steps that, if followed each
time, can be of help.

clxxxix

Rules in Diagnosing Computer System


1. Know the facts

2.
3.

4.
5.

Educate one self on all aspects and operation of computer parts.


Continuous learning on computer technology.
Use your common sense
Focus on Field Replaceable Units
Identify the different types of FRU that can be used for replacement or
subassembly.
Proper assembly and disassembly
Factors Causing Computer Failures and Defects

Peopleware
Untrained personnel could have damaged programs in PC.

Firmware
Programs or software burnt in chips may be corrupted.

Software
Corrupted operating systems would cause the system to fail.

Hardware
Defective hardware components would lead to computer malfunction.
Hardware conflicts and viruses can hinder your computers performance.

ESD (Electro Static Discharge)


Electro static discharge can easily damage sensitive components in
yourcomputer.
Electricity
Incoming supply from AC outlet must be regulated; power surges can
damage computer units.
Problem Isolation
Problem isolation is a detective work in which you need to determine
what is out of the ordinary by making detailed observation of what is not
working normally and record any information as you proceed. The information
you will be able to gather will help diagnose your computer. You need to
observe wisely. Look for any abnormalities in the unit, any change in smell or
foreign smell, listen to all the sounds, and error codes.

cxc

Component Isolation
This section will aid in determining components in your system which
are failing. First, most systems have 3 major components; monitor, system
unit, and printers. Some have multiple external devices. To troubleshoot, you
need to isolate major components which are failing to operate.
Diagnostics Procedure for ATX Power Supply Failure
1. Determine whether or not the power comes on.
2. Check the switch operation with a Digital Volt Meter on the
continuity or resistance setting.
3. Check the pins if the corresponding voltage are properly
regulated to the motherboard.
4. Replace the power supply unit if defective.

cxci

Flowchart for ATX Power Supply Repair


Warning! You must unplug your ATX power supply from the wall before
working inside the case.

cxcii

Things to Consider:
There are many devices, parts, cords, and connections on a computer,
which means that there are many possible problems that could arise. In
addition, your computer uses a variety of software, which can also cause
problems. However, no matter what the problem is, you can use the
following tips to help you find a solution:

Always check the cables: Many computer problems are related to an


issue in the cables and connections. The easiest first step you can take to
troubleshoot most problems is to check all related cables and connections.
Isolate the problem: If possible, try to isolate the problem. For example, if
you can't get the cursor to move on the screen, try to determine if the
issue is with the mouse. If you have an extra mouse, you can alternate
devices to see if the one plugged in is the issue, or use the arrow keys on
the keyboard to help determine if the mouse is the source of the problem.
When trying to isolate the problem, only make one change at a time.

Figure 7. An error message

Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If the
basic troubleshooting steps don't work, you may need the information you
have taken.
Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you
don't repeat yourself. If you can't remember it, then write it down. If you
end up asking someone for help, it will be much easier if they know
exactly which steps you've taken.

cxciii

Simple Solutions to Common Problems


Most of the time, problems can be fixed by using simple
troubleshooting techniques, such as closing and re-opening the program.
It's important to try these simple solutions before resorting to more extreme
measures. If the problem still isn't fixed, you can then try other
troubleshooting techniques, such as reinstalling the software.
Program Runs Slowly or Isn't Working Right

If a program is running slowly or otherwise isn't working right, the first thing
you should try is closing the program and re-opening it.
You can also shut down your computer, wait a few seconds, and boot it
up again. Some minor problems will work themselves out when you do
this.
Check with the company for any known problems or updates to the
software.

Figure 8.Checking for updates


Program is Completely Unresponsive

If a program has become completely unresponsive, you can press (and


hold) Control+Alt+Delete on your keyboard to open the Task Manager.
You can then select the program that isn't working and click End Task. If
you are using a Mac, you can press Option+Command+Esc to open a
similar dialog box.

cxciv

Figure 9.The Task Manager


Problems Starting or Shutting Down the Computer

10.Resetting

Figure
a surge protector

If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case and
the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often, this
will require you to plug a lamp or other electrical device into the outlet to
make sure it is receiving power.
If the computer is plugged into a surge protector, verify that it is turned
on. You may have to reset the surge protector by turning it off and then
back on. You can also plug a lamp or other device into the surge protector
to verify that it is on.
cxcv

If you are using a laptop, the battery may not be charged. Plug the AC
adapter into the wall and then try to turn on the laptop. If it still doesn't
start up, you may need to wait a few minutes and then try again.

"Non-System Disk or Disk Error" Message


If you get this message when you boot up your computer, it usually
means there is a CD, DVD, USB flash drive, or floppy disk in your
computer, which is interfering with your computer's booting process.
Remove the disk from the drive and restart the computer.

Figure 11.The Non-System Disk or Disk Error Message


Windows Shutting Down Message Will Not Disappear
Sometimes Windows will freeze during the shutdown process. If
this happens, the Windows is Shutting Down message screen will stay
active on your screen. To finish shutting down the computer, press and
hold the power button for about 10 seconds, or until the computer turns
off.

Figure12.The Windows shutdown screen

cxcvi

Computer Begins Randomly Rebooting or Crashing

Check for overheating. Make sure the vents in the case are not blocked.
Confirm that there is good air flow around the computer.
Update your antivirus software and scan for viruses.

Figure13.Virus Scanning
Problems with the Monitor and Speakers
No Picture on the Monitor

Confirm the computer is turned on.


Check the brightness control, located on your monitor or your keyboard,
and make sure it is not set too low.
Check the connections for the monitor and surge protector, and make
sure the surge protector is turned on.

Figure 14.Cable plugged into monitor


cxcvii

Monitor Goes Blank Periodically

You may have the screensaver


enabled. If the screen saver is
enabled, just move your mouse
back and forth and your original
screen will appear. You can
change the screensaver settings
by going to your Control Panel
(or your System Preferences if
you're using a Mac).

Figure 15.Opening the Control Panel


No Sound

Figure 16.Adjusting the sound volume on a Mac

Check the volume control on your computer. In Windows, the sound icon
will usually be on the taskbar, and you can also access the sound options
in the Control Panel. On Macs, the sound options are found at the top of
the screen or in System Preferences.
Most media programs (such as iTunes or Windows Media Player) have
a volume control, which will need to be turned up.
Make sure the speakers are turned on, if using external speakers.

cxcviii

Make sure external speakers are connected to the correct audio port or a
USB port. If your computer has color-coded ports, the audio output will
usually be green.
Connect headphones to the correct audio port and determine if sound is
audible from the headphones.

Searching the web for a solution


If you still haven't found a solution to your problem, you may need to
ask someone else for help. Try searching the web for the problem that
you're having, as other people may have had similar problems. Also, if you
have a friend or family member who knows a lot about computers, they may
be able to help you.
Keep in mind that most computer problems have simple solutions,
although it may take some time to find them. For very difficult problems, a
more drastic solution may be required, such as reformatting your hard
drive, reinstalling programs, or reinstalling your operating system. If you're not
a computer expert, it's possible that you could make the situation worse, so
it's best to consult a professional if you think a drastic solution is needed.

Task. Examining the Motherboard in Detail


1. Look at the back of your computer. Without opening the case, list the ports that
you believe come directly from the motherboard.
2. Remove the cover of the case. List the different expansion cards in the
expansion slots. Was your guess correct about which ports come from the
motherboard?
3. To expose the motherboard so you can identify its parts, remove all the
expansion cards.
4. Draw a diagram of the motherboard and label these parts: Processor (Include the
prominent label on the processor housing.)
a) RAM (each DIMM slot)
b) CMOS battery
c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe x16,
and AGP.) Each port coming directly from the motherboard Power supply
connections, SATA or IDE drive connectors and floppy drive connector

cxcix

5. Draw a rectangle on the diagram to represent each bank of jumpers on the


board.
6. What is the brand and model of the motherboard?
7. Locate the manufacturers Web site. If you can find the motherboard manual on
the site, download it.
8. You can complete the following activity only if you have the documentation for
the motherboard:.

What do you do if a program on


a PC is completely unresponsive? What about a program on a Mac?
What should you do if you've tried everything and the problem still isn't
fixed?

Diagnosing Power Supply Failure


Directions: Divide the class into five (5) groups. Choose a leader for each
group. The group will prepares a chart and perform the tasks required by the
Diagnostics Procedure of ATX Power Supply Failure. After the activity
they will be graded through the given Performance Score Card below:
PERFORMANCE SCORE CARD
Performance Criteria

Passed Failed

1. The students clearly identified the problem and applied


the possible solution correctly.
2. The students utilized actual tools/device in performing
the actual usage of each tools and OHS was observed.
3. The students applied safety precautions during the
Activity.
4. The activity gave students more critical thinking on the
personal protective equipment.
5. The students cooperatively performed the activity.

cc

Tools for Testing Computer System


Tools and equipment play vital roles in troubleshooting. They help the
user determine the errors found in their computer hardware and network.
Tools used to test hardware problems:
1. Screw drivers - are used for installing and removing screws in the computer
unit.

Figure 17.Screw Drivers


2. Pliers and tweezers - are used for picking small parts in the computer unit.

Figure18. Pliers and Tweezers


3. Soldering iron- is primarily used for connecting terminals in the power supply and
circuit board with the use of a soldering lead.

Figure19. Soldering iron

cci

4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic
discharge in the work area.

Figure20. Anti- static wrist strap, mat and spray


5. Lens cleaner a device used for cleaning optical media, such as DVDROMS and CD-writers.

Figure21. Lens Cleaner


6. Thermal paste-is a paste used for heat dissipation of the processor.

Figure22. Thermal Paste

ccii

Network Troubleshooting Tools


1. LAN Tester is a device used for testing the network connection.

Source: www.nudata.com

Figure23. LAN Tester


2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP
cable.

Source: www.ted-kyte.com

Figure24. Crimping Tool

Direction: Answer the following question. Write your answers on your


notebook.

Enumerate the six tools used for


troubleshooting.
1.
2.
3.
4.
5.
6.

2. Enumerate the two


network
troubleshooting
tools.
a.
b.

cciii

Troubleshooting computer system network


Causes of Network Trouble
If a computer is unable to connect to a network or see other computers
on a network, it may be necessary to troubleshoot the network. A network
may not work because of any of the reasons below.
1.
2.
3.
4.
5.

Network card not properly connected.


Bad network card drivers or software settings.
Firewall preventing computers from seeing each other.
Connection related issues.
Bad network hardware.

Solution
Because of the large variety of network configurations, operating
systems and setup, not all of the below information may apply to your network
or operating system. If your computer is connected to a company or large
network, or you are not the administrator of the network, it is recommended
that if you are unable to resolve your issues after following the below
recommendations, you should contact the network administrator or company
representative.
Verify connections / LEDs
Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable,
ensure that the LEDs on the network are properly illuminated. For example, a
network card with a solid green LED or light usually indicates that the card is
either connected or receiving a signal.
If, however, the card does not have any lights or has orange or red
lights, it is possible that the card is bad, not connected properly, or the card is
not receiving a signal from the network.

cciv

If you are on a small or local network and have the capability of


checking a hub or switch, verify that the cables are properly connected and
that the hub or switch has power.
Adapter resources
Ensure that if this is a new network card being installed into the
computer that the card's resources are properly set and not conflicting with
any hardware in the computer.
Adapter functionality
Verify that the network card is capable of detecting or seeing itself by
using the ping command. Windows / MS-DOS users ping the computer from a
MS-DOS prompt. Unix / Linux variant users ping the computer from the shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping
local host
This should show a listing of replies from the network card. If you
receive an error or if the transmission failed, it is likely that either the network
card is not physically installed into the computer correctly, or that the card is
bad.
Protocol
Verify that the correct protocols are installed on the computer. Most
networks today will utilize TCP/IP, but may also utilize or
require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other
computer assigns the IPX address, the user must specify an IP address as
well as a Subnet Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do
not click on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192
ccv

7. When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For
example, when using the above values on one computer you would want
to use an IP address of 102.55.92.2 on another computer and then specify
the same Subnet Mask.
Firewall
If your computer network utilizes a firewall, ensure that all ports required
are open. If possible, close the firewall software program or disconnect the
computer from the firewall to ensure it is not causing the problem.
Additional time
In some cases it may take a computer some additional time to detect
or see the network. If after booting the computer you are unable to see the
network, give the computer 2-3 minutes to detect the network. Windows users
may also want to try pressing the F5 (refresh) key when in Network
Neighborhood to refresh the network connections and possibly detect the
network
Additional troubleshooting
If after following or verifying the above recommendations you are still
unable to connect or see the network, attempt one or more of the below
recommendations.
If you have installed or are using TCP/IP as your protocol you can ping
another computer's IP address to verify if the computer is able to send and
receive data. To do this, Windows or MS-DOS users must be at a prompt and
Linux / Unix variant users must open or be at a shell.
Once at the prompt assuming, that the address of the computer you
wish to ping is 102.55.92.2, you would type:
ping 102.55.92.2
If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the
network. If you are still unable to connect or see the network, it is possible
that other issues may be present.
Another method of determining network issues is to use the tracert
command if you are a MS-DOS or Windows user or the trace route command

ccvi

if you are a Linux / Unix variant user. To use this command you must be at
the command prompt or shell. Ortrace route 102.55.92.2
This should begin listing the hops between the computer and network
devices. When the connection fails, determine what device is causing the
issue by reviewingthe trace route listing.

Networking with DHCP


Task: Setting up a local area network with a Dynamic Host Control
Protocol (DHCP) server is easy. The DHCP server provides all the
information your computer needs to get up and running on the network. Once
connected, you will check network connectivity with the router and at least
one other peer on the network.
Procedures:
Getting connected
1. Before connecting your PC to the network, be sure the Windows XP
operating system is running on your computer. You will use Windows XP sp2
throughout this activity.
2. Next, open a terminal window on your computer by clicking on
Applications->Accessories->Terminal.
3. In the terminal window, type ipconfig and press Enter.
a. How many network devices are listed in the output? Record their names in
your worksheet.
b. Is there an IPv4 address listed for any of the network devices? If so, record
your
IP address (es) in your worksheet.
4. Connect your computer to a network switch using a patch cable. Did you
get a light on the switch? Record the port number you connected to in your
worksheet.
5. Draw a diagram of the entire local area network in the space below,
including the
router, any switches or hubs, and all connected PCs.
ccvii

6. Run ifconfig again. Do you see an IP address? If so, record it in your


worksheet.
7. In the terminal window, type dhclient eth1 and press Enter. Describe what
happens.
Checking your connection:
1. Check connectivity with the router with the ping command. Type ping -c4
10.0.1.1 and press Enter. Record the times listed in the last column of the
output. What was the average round trip time (rtt) from your computer to the
router and back?
2. Ask another group for their IP address. Check connectivity with that group's
computer with ping. Run ping as shown above, substituting the new IP
address for the one listed in the previous item. Record the times listed in the
last column below. What was the average round trip time (rtt)?
3. When you have completed the activity, shut down your computer and
return to your seat.

Title: Networking with Static IPs


Purpose: While setting up a network with a Dynamic Host Control
Protocol (DHCP) server is very convenient, it is sometimes preferable to use
static IP addresses. In this activity, you will join the network using an IP
address and netmask provided by your instructor. Once connected, you will
check network connectivity with at least one other peer on the network.
Procedures:
Getting connected
1. Before connecting your PC to the network, be sure the windows
Operating system is running on your computer.
2. When the boot process is completed, connect your computer to the
network switch using a patch cable. Did you get a light? What port
number did you connect to on the switch?
3. Draw a diagram of the entire network in the space below.

ccviii

4. To configure your network settings, click System->Administration>Network.


5. In the Network settings window, make sure the Connections tab is
selected.
6. Click on Wired connection, and then click the Properties button.
7. In the Interface properties window, change the Configuration setting
to Static IP address.
8. Enter the IP address provided by your instructor in the IP address
field.
9. Enter 10.0.1.0 in the Gateway address field.
10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to
close the Interface properties window.
11. Click OK to close the Network settings window.
Checking your connection
1. Open a terminal window on your computer, if one is not already
open, by clicking Applications->Accessories->Terminal.
2. Type ipconfig and press Enter. Are your network setting correct? If
not, repeat the steps 411 in the previous section.
3. Ask another group for their IP address. Check connectivity with that
group's computer with ping. For example, ping -c4 10.0.1.200.
Record the times listed in the last column below. What was the
average round trip time?
4. Ask a second group for their IP address. Check connectivity to that
group's computer with ping. Record the times listed in the last
column below. What was the average round trip time?
Evaluation:
CRITERIA
Passed

Failed

1. Sequence of steps in diagnosing is followed.


2. Safety precaution are observed.
3. Appropriate tools are used in diagnosing.
4. Diagnostic plan for troubleshooting is created.
Remarks

ccix

Computer System and Network Configurations


Computer Networks
Networks are collections of computers, software, and hardware that
are all connected to help their users work together. A network connects
computers by means of cabling systems, specialized software, and devices
that manage data traffic. A network enables users to share files and
resources, such as printers, as well as send messages electronically (e-mail)
to each other.
The most common networks are Local Area Networks or LANs for
short. A LAN connects computers within a single geographical location, such
as one office building, office suite, or home. By contrast, Wide Area Networks
(WANs) span different cities or even countries, using phone lines or satellite
links.
Network System Configuration
All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.
Designing Your Network
Plan on the design phase to take anywhere from one to three working
days, depending on how much help you have ad how big your network is.
Here are the key tasks:

Settle on a peer-to-peer network or a client/server network.


Pick you network system software.
Pick a network language.
Figure out what hardware you need.
Decide on what degree of information security you need.

ccx

Choose software and


management chores.

hardware

solutions

to

handle

day-to-day

Rolling Out Your Network


Rolling out your network requires the following steps:

Run and test network cables.


Install the server or servers if youre setting up a client/server network. (If
you are setting up a peer-to-peer network, you typically dont have to
worry about any dedicated servers.)
Set up the workstation hardware.
Plug in and cable the Network Interface Cards (NICs these connect the
network to the LAN).
Install the hub or hubs (if you are using twisted-pair cable).
Install printers.
Load up the server software (the NOS, or Network Operating System) if
your network is a client/server type.
Install the workstation software.
Install modem hardware for remote dial-up (if you want the users to be
able to dial into the network).
Install the programs you want to run (application software).

Configuring Your Network


Network configuration means customizing the network for your own use.

Creating network accounts for your users (names, passwords, and


groups).
Creating areas on shared disk drives for users to share data files.
Creating areas on shared disk drives for users to share programs (unless
everyone runs programs from their own computer).
Setting up print queues (the software that lets users share networked
printers).
Installing network support on user workstations, so they can "talk" to your
network.

ccxi

Managing Your Network


The work you do right after your LAN is up and running and configured can
save you huge amounts of time in the coming months.

Mapping your network for easier management and troubleshooting.


Setting up appropriate security measures to protect against accidental and
intentional harm.
Tuning up your LAN so that you get the best possible speed from it.
Creating company standards for adding hardware and software, so you
dont have nagging compatibility problems later.
Putting backup systems in place so that you have copies of data and
programs if your hardware fails.
Installing some monitoring and diagnostic software so that you can check
on your networks health and get an early warning of impleading problems.
Figuring out how you plan to handle troubleshooting educating your LAN
administrator, setting up a support contract with a software vendor, and so
on.

Smooth Setup
One key advantage of a peer-to-peer network is that its easy to setup.
With the simplest sort of peer-to-peer network, you just use the built-in
networking that comes with your operating system (Windows 98, Windows
XP, Windows 7, Windows 8 and so on) and you have very little software to
set up even less if you have computers that have the operating system
preinstalled, as most computers do these days.
For Windows XP and Windows 7, the basic steps to setting up a peerto-peer network are as follows:
(Review for Cabling) UTP Cable
A UTP cable (category 5) is one of the most popular LAN cables. This
cable consists of 4 twisted pairs of metal wires (that means there are 8 wires
in the cable). Adding RJ45 connectors at both ends of the UTP cable it
becomes a LAN cable they usually use.

ccxii

Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Figure 25. Materials for Cabling

Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we
call this side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it
tightly.
5. Make the other side of the cable (we call this side B-side) in the same
way.
6. After you made it, you don't need to take care of the direction of the cable.
(Any cable in this page is directionless --- that means you can set either
end of the cable to either device.)

ccxiii

How to see the wire arrangement


Take the UTP cable with your left hand and a RJ45 connector with
your right hand. Hold the RJ45 connector in the way you can see the contact
metal face of the RJ45 connector.

The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white
twisted pairs.
10 Base T / 100 Base T Straight
10BaseT and 100BaseT are most common mode of LAN. You can use
UTP category-5 cable for both modes. (You can use UTP category-3 cable for
10BaseT, in which there are only 3 wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it
to connect 2 hubs in the case one of the hubs has an uplink port (and you use
normal port on the other hub).
Pin ID
1
2
3
4
5
6
7
8

side A

side B

orange-white
orange
green-white
blue
blue-white
green
brown-white
brown

orange-white
orange
green-white
blue
blue-white
green
brown-white
brown

ccxiv

10 Base T / 100 Base T Cross


A cross cable for 10BaseT and 100BaseT is used to connect 2
computers directly (with ONLY the UTP cable). It is also used when you
connect 2 hubs with a normal port on both hubs. (In other words, the cross
cable is used relatively in a rare case.)
Pin
ID
1
2

side A
orangewhite
orange

side B
greenwhite
green

3
4

greenwhite
blue

orangewhite
blue

5
6
7
8

blue-white
green
brownwhite
brown

blue-white
orange
brownwhite
brown

To create a peer network, you must have the following components:


A network interface or Local Area Network (LAN) adapter for each
computer. The same manufacturer and model of network card is preferred.
Cabling that is supported by the network cards.
Windows XP or 7 drivers for the network cards.
A common network protocol.
A unique computer name for each computer.

Task1. Creating Peer to Peer Network


To create a peer network, follow these steps for each computer connected to
the network:
1. Shut down the computer and install the network card and appropriate
cabling for each computer.
NOTE: For information about how to configure your network adapters
and physically connect your computers, consult the documentation
included with your network adapters or contact the manufacturer(s) of
ccxv
your network adapters.

2. Start Windows and install the network drivers. Windows may detect your
network card and install the drivers when you start the computer. If the
network card drivers are not included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
3. Choose a client and a common protocol for each computer. To do this,
follow these steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click Add, click Client, and then click Add.
c. In the Manufacturers box, click the appropriate manufacturer, click the
appropriate client in the Network Clients box, and then click OK.
d. Click Add, click Protocol, and then click Add.
e. In the Manufacturers box, click the appropriate manufacturer, click the
appropriate protocol in the Network Protocol box, and then click OK.
4. Configure a peer server. Each computer that is configured for File and
Printer Sharing can act as a server. To configure a computer for File and
Printer Sharing, use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. Click File and Print Sharing, click one or both options to share files and
printers, click OK, and then click OK again.
c. Click Yes when you are prompted to restart your computer.
5. Give each computer a unique computer name. To do this, use the following
steps:
a. Click Start, point to Settings, click Control Panel, and then double-click
Network.
b. On the Identification tab, type a unique name in the Computer name box.
c. Click OK, and then click Yes when you are prompted to restart your
computer.
NOTE: The computer name must be unique for each computer on the
: network and should be no more than 15 characters in length. In small
networks, the workgroup name should be the same for each computer
so that all computers are visible in the same workgroup when
browsing. You should not use spaces or the following characters in
ccxvi
computer and workgroup names

Task 2. Using the Internet for Research


In this activity, you will learn how useful the Internet can be for a PC support
technician.
1. Using your own or computer laboratory, pretend that the motherboard
manual is not available and you need to replace a faulty processor. Identify
the manufacturer and model of the motherboard by looking for the
manufacturer name and model number stamped on theboard. Research the
Web site for that manufacturer. Print the list of processors the boardcan
support.
2. Research the Web site for your motherboard and print the instructions for
flashing BIOS.
3. Research the Abit Web site (www.abit.com.tw) and print a photograph of a
motherboardthat has a riser slot. Also print the photograph of the riser card
that fits this slot. What isthe function of the riser card?

Task 1. Setting Windows Network Connection


Equipment, Tools and Materials Required:
- UTP cables
- 4 Computer units
- 1 hub

ccxvii

Given the following materials, set-up a network connection on four computers.


CRITERIA

Safety Precautions are observed.

All the UTP are properly connected to the computer


and hub.
Computers are properly connected and seen in the
network.
Proper boot-up and shutdown of the computer is
observed.

Total:
More Security for Remote Desktop
Task2. Analyze the situations below and answer the questions that
follow.
When Enzo travels on company business, he finds its a great help to be able
to access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.One way you can help Enzo to
add more security is to change the port that Remote Desktop uses.
Knowledgeable hackers know that Remote Desktop uses port 3389, but if you
change this port to a secret port, hackers are less likely to find the open port.
Search the MicrosoftKnowledge Base articles (support.microsoft.com) for a
way to change the port that RemoteDesktop uses. Practice implementing this
change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use another
computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer using
the secret port. Print a screen shot showing how you made the connection using
the secret port. Verify the session works by transferring files in both directions.
3. What secret port did you use?

ccxviii

Lesson 3.INSPECT AND TEST


SYSTEMS AND NETWORKS

THE

CONFIGURED

COMPUTER

General Safety Tips and Reminders


Observe good housekeeping in the area of the machines during and after
maintenance.
Place removed covers and other parts in a safe place, away from all
personnel, while you are servicing the machine.
Dress for the Job
Keep your tool case away from walk areas so that other people will not trip
over it.
Do not wear loose clothing that can be trapped in the moving parts of a
machine. Ensure that your sleeves are fastened or rolled up above your
elbows. If your hair is long, use hair net or hair cap.
Insert the ends of your necktie or scarf inside clothing or fasten it with a
nonconductive clip, approximately three (3) inches from the end.
Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.
Remember: Metal objects are good conductors

After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
Finally, reinstall all covers correctly before returning the unit to the
customers.

ccxix

Electrical safety
Electric current from power, telephone, and communication cables can
be hazardous. To avoid personal injury or equipment damage, disconnect the
attached power cords, telecommunications systems, networks and modems
before you open the server/workstation covers, unless instructed otherwise in
the installation and configuration procedure.
Precautions
Disconnect all power before:
Performing a mechanical inspection
Working near power supplies
Removing or installing main units
Before starting work on the machine, unplug the power cord.
Never assume that power has been disconnected from a circuit.
First, check that it has been powered-off.
Always look carefully for possible hazards in your work
Moist floors
Non-grounded power extension cables
Power surges.
If an electrical accident occurs:
Switch off power
Send another person to get medical aid
Safety Inspection Guide
These steps will help you identify potentially unsafe conditions on electrical
products:
Check exterior covers for damage (loose, broken, or sharp edges)
Power-off computer. Disconnect the power cord.
The power cord should be the appropriate type.
Insulation on the power cord must not be frayed or worn out.
Remove the cover.
Check for any obvious alteration. Use good judgment as to the
safety of any alterations.
Check for worn out, frayed or pinched cables.
Check that the power-supply cover fasteners (screws or rivets)
have not been removed or tampered with.
Accident Reporting Policy and Procedure
There must be a process put in place to report accidents, incidents or near
misses for immediate action and to help track causes. The organization needs to
ccxx

identify what needs to be reported, to whom it is to be reported, and how to report


it, then put this process into a written procedure.
For example:
Any accident, incident, or "near miss," no matter how slight the injury or
damage, must be reported to the department supervisor immediately for
appropriate action.
The supervisor is responsible for taking appropriate follow-up action,
including getting medical attention for the injured, completing an investigation
report and recommending or implementing appropriate corrective actions.
The primary purpose of the accident investigation is to identify the cause(s)
of the accident, incident or "near miss" and take action to prevent a similar
occurrence in the future. In some instances, an employee's or volunteer's failure to
follow recognized safety procedures requires disciplinary action to protect coworkers.
Remember: One person's actions can jeopardize the safety of others in the
workplace.
Accident Reporting Policy
Approved by
Chairman:
Date:
1. Purpose [complies with legislation, ensure the necessary action to
2. Prevent any recurrence and to enable the organization to maintain
proper records.
3. Scope [accident, incident, near-miss; employee, volunteer, anyone
on site or involved in organization-sponsored activities.
4. Definitions of terms.
5. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) \
OSHA, NIOSH?
6. Absence resulting from an accident [who to report to, Return-to
work.
7. Accident Investigation [who investigates what to do with resulting
recommendations.
8. Forms Names, where to find them.
9. Reportable Diseases communicable diseases listed where?

ccxxi

Accident Investigation Procedures


The senior staff member available at the accident scene or the first
member notified should complete the appropriate investigation reporting form
(accident, incident, near miss). The completed form should be given to the
organization's safety committee, which will forward a copy of the report to the
safety coordinator for review.
When an employee or volunteer is injured:
1.
2.
3.
4.
5.

Get the person professional medical attention.


Protect others.
Minimize property damage.
Stabilize the situation.
Conduct an investigation.

General guidelines for investigating accidents:

Go to the scene of the accident while the facts are fresh.


Inspect and record any changed physical characteristics or conditions of
the accident site
Preserve any physical evidence, such as potentially defective equipment.
Take photos to help preserve the scene (i.e., puddles on the floor,
overturned storage shelves and spilled contents).
Talk to the injured person, if possible.
Talk to any eyewitnesses.
Ask simple open-ended questions, one question at a time, and attempt to
have events related chronologically to ensure thorough coverage.
Distinguish a person's actual knowledge from hearsay.
Ask when, where, who, how, and what was said or done.
Avoid opinions, judgments or conclusions and be as objective as possible.
Avoid commenting on the information gathered except to confirm your
understanding or to clarify.
Stress getting the facts.
Do not comment on liability or fault during the investigation. Listen for
clues in the conversation around you.
Unsolicited comments often have merit.
Review and finalize any notes immediately upon completion of your
inspection and any interview or other communication with those involved.

ccxxii

Fill out the appropriate accident, incident or near-miss form, giving an


accurate account of the facts.
Send the form to the safety coordinator and safety committee for their
review.

Accident reports
Forms are used to give specific details with regards to the accidents
happened in the laboratory during experiments.
Accident reports contain the following details:

Name of the person injured


Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents

Task. Accomplish the sample Accident report sample form


Date:
Form No:

Accident Report Form


Rm. No:

Name:
Type of Injury

Yr/Sec:
Cause of Injury

Remedy

ccxxiii

Replacing different Components


When replacing computer parts and peripherals, you need to consider the
following factors:
1. Compatibility of the component or part
2. Consider the component specification
3. Components form factor
Compatibility of the Component
When replacing computer parts you should check if it is compatible
with your unit. Double check on your computer manual if the component you
are replacing is compatible or not with the unit because this may lead to
system crash.
Component Specification
This focuses on the specification of the component. Check if the
voltage rating, current rating, memory size and frequency matches your
computer unit.
Form factor
The components manufacturer should be considered. Check if the unit
you are trying to repair or upgrade is generic or branded units. Branded units
have their own set of components compatible only to their units, while genetic
types can be used only to generic type of units.
List of Components Commonly Replaced in a Computer System
1.
2.
3.
4.
5.
6.
7.
8.
9.

Memory
Video Cards (also referred to as a graphics accelerator)
Network Interface Card
Hard disk drive
Motherboard
Processor
CMOS Battery
CD/DVD Drive
Sound card

ccxxiv

Directions: Write your answer on your notebook


1. Give the functions of each component.
a.
b.
c.
d.
e.

Memory
Video card
NIC
Motherboard
HDD

2. Factors to consider when replacing a component.


a. _____________________
b. _____________________
c. _____________________

Upgrading Your Computer Components


To upgrade means to change some parts with faster and better
performing ones. These parts may even cost less and more powerful.
Commonly Upgraded Computer Parts
1. Monitors- replace old CRT monitors to new LCD or LED monitors.
2. Optical drives- old CD-ROMs drives are commonly replaced with DVDROM and DVD writers.
3. Hard Drives- small capacity hard drives are replaced with faster and high
capacity hard drives.
4. Keyboards and mouse- keyboards and mouse are commonly replaced with
optical mouse and wireless keyboards.
5. RAM (Random Access Memory)- upgrading the computers memory or
RAM speeds up the performance of the computer
6. Video cards- upgrade computers graphics card to improve the computer
performance in terms of graphics and games.
7. Processors- replacing the processors increase the data processing speed.

ccxxv

8. Modem- installing a modem enables your computer to connect to the


internet.
How to Speed up the Computer
1. Defragmenter utility: Automatically analyzes the empty disk space on
the hard disk and defrag all scattered files.

Figure 26. Defragmenter Utility


2. Shutdown Unnecessary programs: Close all unwanted programs at the
Windows start up and this will automatically increase the windows loading time
and speed of the computer will also be increased.

3. Increased memory: Increasing the memory in the system will result to


exceptional speed of your computer.
4. Disk Cleanup: You can delete unwanted programs and files from your
computer and this will be helpful in increasing the speed.

Figure 27. Disk Cleanup

ccxxvi

5. Empty Recycle Bin: Delete all the files and folders from the recycle bin
and you will get the space of C drive for reusability.

Figure 28. Emptying the recycle bin


Memory Upgrade
To make your computer faster, you can upgrade its memory. Here are
the steps in upgrading your computers memory
1. Remove the memory modules from the slot.

Figure 29. Removing memory module from the slot


2. In Figure 30 the notches we have marked
as A are used for the ejector clip on the
DIMM slot.
The notches we have marked as B is used
to align the memory module with the DIMM
slot key C as shown in Figure 31.
In Figure 31 you can see the ejector clips
(D), using your finger, push these into the
down position as shown in Figure 31 this
allows the memory to be inserted.

Figure 30. Notch A

Figure 31. DIMM Slot

ccxxvii

3. Now you are ready to install the module,


ensuring the notches line up with the keys
gently but firmly push the memory into the
slot until it is seated fully(see Figure 32 the
ejector clips should rise to the vertical
position as shown in Figure 33).
4. Now your memory is installed. Be sure
you have not loosened any cables while
working and also ensure that the memory
module is fully seated and the ejector clips
are in the vertical position.

Figure 32. Ejector clips

Figure 33. Ejector clips in vertical


position

Video card Upgrade


1.
Take the video card (hold it by the edges) and line it up with the slot
paying careful attention to the alignment notch. When it is aligned correctly,
press gently but firmly until the card is seated fully and evenly into the slot.
2.
When you are happy that the card is firmly in place, insert the fixing
screw and check to make sure you have not loosened anything during
installation.
3. When you reboot your machine Windows (or other OS) should find the
card automatically, it may then ask you to insert the disk/CD that came with
your video card, insert the CD and follow the on-screen instructions to install
the video card driver.
Hard Drive Upgrade
The first thing to do (after removing the case covers) is to locate the
drive bay where the hard drive will go.
The next step is to attach the IDE and power cables.
In figure 34 below you can see a standard IDE Cable, note there are
three (3) connections (notice the difference in distance between the
connectors). Connection A plugs into the motherboard and then the slave and
master connections are used for IDE devices such as hard drives, if you are

ccxxviii

only installing one drive or the new drive is to be the master then use the
master connector, if the drive is to be the slave then use the slave connector.
The IDE cable will be marked down one side with a red or black strip,
this denotes Pin 1, match this with the Pin 1 indicator on the back of the hard
drive.
The power cable you will find in your case is attached to your power
supply; you can see an example below in figure 35.

Figure
34. Standard IDE Cable

Figure 35.Power Cable

Basic Network Errors


If your network connection is not configured properly or suffers a
technical failure, you will often see some error message generated and
displayed on your screen. These messages give helpful clues to the nature of
the issue. Use this list of the common network-related error messages to help
troubleshoot and fix networking problems.

ccxxix

Network Problem error Messages


Network problem error message 1
Read the message in the box.
Box running software 14.8 and
above:

Box running software 14.7 and below:

No network adapter. (N01)

A network adapter was not


detected. (N01)

Please make sure that your network


adapter is securely plugged into a USB
port on the back of the box.

Please make sure that your network


adapter is securely plugged into a USB
port on the back of the box.

Possible solution for error message 1


Quick
Steps

1. If you have a TiVo Wireless G or N Adapter: Remove the adapter


from the TiVo box for 15 60 seconds and reconnect. Then force a
connection to the TiVo service.
2. Try another USB port (when applicable).
3. If these steps have not resolved your issue, see Detailed Steps
below for additional assistance.

Network problem error message 2


Read the message in the box.
Box running software 14.8 and
Box running software 14.7 and
above:
below:
Problem with router. (N03)
It might be temporarily out of IP
addresses. Wait a few minutes, and
then try connecting again. If the
DHCP server is part of your home
network, try increasing the number of
IP addresses it can assign.

The DHCP server was unable to


supply an IP address.(N03)
It might be temporarily out of IP
addresses. Wait a few minutes, and
then try connecting again. If the
DHCP server is part of your home
network, try increasing the number of
IP addresses it can assign.

ccxxx

Quick Steps

Possible solution for error message 2


1. Power cycle your network, then force a connection to the
TiVo service.
2. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if
you are unsure how to do this.
3. If these steps have not resolved your issue, see Detailed
Steps below for additional assistance.

Network problem error message 3


Read the message in the box:
Box running software 14.8 and
Box running software 14.7 and below:
above:
The specified IP address (<IP
Problem with network
Address>) is already in use by another
settings. (N05)
device on the network. (N05)

Quick Steps

Change your network settings to


Change your network settings to use a
use a different (and unused) IP
different (and unused) IP address.
address.
Possible solution for error message 3
1. If the box is using a static IP address, then it will need to be
changed. See How to configure network settings on your TiVo
box for instructions.
2. Power cycle your network devices, then force a connection
to the TiVo service.
3. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if
you are unsure how to do this.

Network problem error message 4


Read the message in the box:

ccxxxi

Box running software 14.8 and


above:
Wireless Network Not Found. (N06)

Box running software 14.7 and below:


Could not connect to the wireless
network (<Network Name>). (N06)

Quick Steps

Possible solution for error message 4


1. Verify your TiVo box has the latest software version to
support the encryption used by your router.
2. Make sure your wireless network is operational and you have
sufficient signal strength where the box is located. See How to
configure network settings on your TiVo box for instructions.
3. Verify you entered the correct the correct name of your
network and/or the correct encryption key or password.
4. Check for possible interference sources nearby, such as
microwave ovens, cordless phones, etc.
5. Power cycle your network devices, then force a connection to
the TiVo service.
6. Move your wireless adapter to improve signal strength.
7. Contact your router manufacturer to determine whether you
need to update your router firmware.
8. If these steps have not resolved your issue, see Detailed
Steps below for additional assistance.
Network problem error message 8
Read the message in the box:
Box running software 14.8 and
Box running software 14.7 and below:
above:
Your network adapter has not been
Adapter not set up. (N08)
set up for use with the box. (N08)
Select Change network
settings to begin setting up your
network adapter.

Select Change network settings to


begin setting up your network
adapter.

ccxxxii

Quick Steps

Possible solution for error message 8


1. TiVo Wireless N adapter: Verify that your adapter has
been set up properly. Please see TiVo Wireless N Adapter
Setup for instructions.
2. Verify you entered the correct name of your
network and/or the correct encryption key or password.
3. Verify your wireless adapter is compatible with your TiVo
box.
4. Try another USB port (when applicable).
5. If these steps have not resolved your issue, see Detailed
Steps below for additional assistance.

Common Network Errors and Solutions


Network Errors

Network problem is
not accessible
Message: "....is not
accessible. You may
not have permission to
use this network
resource. Contact the
administrator of this
server to find out if you
have access
permissions. The
semaphore timeout
period has expired."

Network problem not


available. The server is
not
configured
for

Possible Solutions
Make sure no any firewall running.
Make sure you have created the same
workgroup, and the same username for logging
on a remote computer.
3. Check user's rights.
4. You may want to enable guest account on
windows.
5. if you are using simple file sharing, you may try
to disable it and re-share the drive manually.
6. If it is mixed OS network, enable NetBIOS over
TCP/IP.
7. Make sure the Computer Browser service is
started if all computers are w2k/xp.
8. Stop Computer Browser service on wwin9x, ME
and NT if this is a mixed OS network.
9. Cache
credential
by
using
net
use \\computername\share /user:username
command (it is better to have the username
logon shared computer).
10. If you have tried enabling netbios over tcp/ip but
doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
12. Still
need
help,
contact
consultant at http://hidev.com/contactus.asp for
the tech support.
1.
2.

1. Type command "net share" on the shared


computer. If there is not a share named "IPC$" in
the share list, use the command "net share ipc$"
ccxxxiii

transactions"

to create it.

An extended error has


occurred" or "Access
Denied" Symptoms:
When
mapping
a
network drive using net
use or using the net
view command to view
a different computer in
the domain, you may
receive: "An extended
error has occurred" or
"Access Denied" error
messages.

1. This issue may occur if the workstation doesn't


synchronize the time with the server. After
verifying that basic network connectivity exists,
you can force time synchronization on the client
computer manually. To do this, run net time
/domain /set command.
2. Make sure you have granted enough licenses for
clients accessing.

Computer name is not


accessible. No
permission to access
the resources"

1. Are you sure the logon user has permission to


the shared folder?
2. Have you tried to logon using the same user
name and password of the accessed computer?
3. The last and risky one, if you enable guest
account in computer, can you access now?

"Multiple connections
to the server or shared
resource are not
allowed"

1. Try using net use /d from a command to clear


allyour mapped connections before joining the
domain. You can also disconnect the mapped
drive in Windows Explorer by right-click the
mapped drive and select disconnection.

Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all previous
connections to the
server or shared
resource and try
again."
"Network path not

1. This issue may occur if the TCP/IP NetBIOS


ccxxxiv

found" in a domain
network 1
SYMPTOMS:
When trying to join a
domain by using he
NetBIOS
domain
name,
you
are
successful but not the
FQDN and you may
receive one of the
following
error
messages:

Helper Service is not running on the client


computer. To start the TCP/IP NetBIOS Helper
Service, go to MMS>Services, double-click
TCP/IP NetBIOS Helper Service.

1) The following error


occurred attempting to
join
domain
"example.com": The
network location cannot
be
reached.
For
information
about
network
troubleshooting,
see
Windows Help.
2) Network path not
found.
"Network path not
found" in a domain
network 2

1. You can find some computer browser errors on


the DNS server. Disable one of two NICs will
work. More resolutions can be found in browser
Issue page.

"Network path not


found" in a workgroup
network - error 53

1. Make sure that File and Printer Sharing is


enabled on the shared computer.
Make sure that shared machine has something
shared.
2. Make sure that you have created the same
workgroup and logon the same username
Make sure that you have enabled NetBIOS over
TCP/IP if this is a mixed OS network.

"Not accessible. You


may not have
permission to use this
network resource"

1. Enable NetBIOS over TCP/IP on one or more


computers in the workgroup. To do that, go to
properties of Local Area Connection>properties
of Internet
Protocol
(TCP/IP)>General> Advanced>WINS, check En

ccxxxv

Symptom: Your peerto-peer network, may


receive the following
error when you doubleclick My
Network
Places/Computers
Near Me: <Workgroup
Name>
is
not
accessible. You may
not have permission to
use
this
network
resource.

able NetBIOS over TCP/IP (If you have


a DHCP-assigned IP address, select Use
NetBIOS setting from the DHCP server ).
2. Make sure the Computer Browser service is
started.

"Not enough server


storage is available to
process
this
command." error.

1. The registry value IRPstackSize may be not


explicitly present. To increase the value of the
parameter, go to the key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentCont
rolSet\Services\ LanmanServer\Parameters. If
the key is not present, choose Add Value in the
Registry Editor. The Value Name should be
IRPStackSize and the Data Type is
REG_DWORD.
2. Remove any unnecessary entries from this value
in the registry,
HKEY_LOCAL_MACHINE\System\CurrentContr
olSet\Services\LanmanServer\Parameters\NullSe
ssionPipes.
3. Disable Norton antivirus to see if that will fix the
problem.

SYMPTOMS:
When
accessing shares on a
server from a client,
you may receive "Not
enough server storage
is available to process
this command." error.
You may receive this
message and Event ID:
2011 after you install
Norton Antivirus for
Windows.

"No logon server


available"
Symptoms: you can
ping the server by ip
and name but can't
map the shared
drive by using net
use \\ip or \\servern
ame. If you try, you
may receive the "No
logon server

This sounds like cache credential issue.


1. Make sure the computers in the same network,
the same workgroup/domain and have created
the same username.
2. Use net use \\servername\sharename password
/user: username to cache the credential.

ccxxxvi

available".

Still need help, contact


consultant at http://hide
v.com/contactus.asp fo
r the tech support.
"System error 6118 has
occurred. The list of
servers for this
workgroup is not
currently
available." Symptoms:
When using the net
view
\\computername comm
and, you receive the
following error
message: System error
6118 has occurred.
The list of servers for
this workgroup is not
currently available.

1. Disable ICF if you don't need it.


2. Open port # (UDP and TCP) from 135 through
139 and/or 445. to do this, go to the properties of
the
connection>Advanced>ICF>Settings>Services.
For Microsoft file sharing SMB: add (UDP and
TCP) ports from 135 through 139. For directhosted SMB traffic without network basic
input/output system (NetBIOS) uses port (TCP
and UDP) 445. Note: the external and internal
port numbers should be identical.

"The
password
is
incorrect. Try again"

1. You need to setup every user that needs access


to the shared folder on every computer they have
to connect to. Then give the proper user proper
permission to the shared folder.
2. Logon the same user and password.
3. As always, you can try to enable a guest account
on the accessed machine.

"There are no entries


on the list"

1. If there are no file or print shares on the


computer, the net view command displays a
"There are no entries in the list" message. So,
make sure there are file or print shares on the
computer. Or to use net share command to
check sharing status.
2. Make sure no firewall running because the
firewall may block sharing.

Symptom: when using


net
view \\remotecomputer
command, you may
receive "There are no
entries on the list". And
you may have a

ccxxxvii

problem to access the


remote computer.

"Unable
to
access
Computers near Me" or
"Workgroup
is
not
accessible" errors

1. NetBIOS over TCP/IP. To do that, go to the


properties of TCP/IP>Advanced>WINS. If you
are using a static Internet Protocol (IP) address,
click
2. Enable NetBIOS over TCP/IP. If you have a
DHCP-assigned IP address, click Use NetBIOS
setting from the DHCP server.
No Master Browser or too many browsers may
cause this issue. Check Browser issue.

"Unable to Browse
Network"

1.
2.
3.
4.

Symptom: When you


attempt to browse your
network by opening
Entire Network in My
Network
Places/Network
Neighborhood, you
may receive the
following error
message: Unable to
Browse Network.

Have you loaded the NIC or is it working?


Have you loaded common protocol, TCP/IP?
Does the Computer browser work?
Have you enable file and printer sharing in the
accessed computer?
5. Is the workstation service running?

ccxxxviii

Award BIOS / CMOS Setup


This is the BIOS setup for Award BIOS v6.00PG. If you have a
different version of the Award BIOS there would be a lot of similarities. If your
BIOS are AMI or Phoenix then the common BIOS features would have some
similarities. Whatever BIOS you have, this setup guide should give you an
idea about how to setup BIOS.
Please note that setting up BIOS incorrectly could cause system
malfunction, therefore it is recommended that you also follow the BIOS guide
provided on your motherboard manual. If you decide to make changes to
certain options it is safer to make a note of what you have changed. Then
restart the system to see how it performs. If the system behaves abnormally
or becomes unstable you can revert back to your previous settings.
Softmenu III
Softmenu III is where you can setup up the CPU without setting
jumpers on the motherboard. You can setup the CPU simply by selecting the
speed i.e. Pentium III 750 from the list. This ensures that the CPU bus,
multiplier, voltage etc, is correctly set for that particular CPU. However you
can manually setup each feature if required. Once you have finished with the
setup press ESC to return the previous menu.

Figure 36. BIOS CMOS Setup Utility

ccxxxix

Standard CMOS Features


Here you can setup the basic BIOS features such as date, time, type of
floppy etc. Use the arrow keys to move around and press enter to select the
required option. You can specify what IDE devices you have such as Hard
drive, CD-ROM, ZIP drive etc. The easiest way to setup the IDE devices is by
leaving it set to auto. This allows the BIOS to detect the devices automatically
so you don't have to do it manually. At the bottom, it also displays the total
memory in your system.

Figure 37. Standard CMOS Feature


Advanced BIOS Features
As you can see from figure 3, there are numerous advance settings
which you can select if required. For most cases leaving the default setting
should be adequate. As you can see the first boot device is set to floppy. This
ensures that the floppy disk is read first when the system boots, and therefore
can boot from windows boot disk. The second boot device is the Hard disk
and third is set to LS120. If you want to boot from a bootable CD then you can
set the third boot device to CD/DVD-ROM.

ccxl

Figure 37. Advance Bios Feature


Advanced Chipset Features
Here you can setup the contents of the chipset buffers. It is closely
related to the hardware and is therefore recommended that you leave the
default setting unless you know what you are doing. Having an incorrect
setting can make your system unstable. If you know that your SDRAM can
handle CAS 2, then making changes can speed up the memory timing. If you
have 128MB SDRAM then the maximum amount of memory the AGP card
can use is 128MB.

Figure 38. Advance Bios Chipset

ccxli

Integrated Peripherals
This menu allows you to change the various I/O devices such as IDE
controllers, serial ports, parallel port, keyboard etc. You can make changes as
necessary.

Figure 39. Integrated Peripherals


Power Management Setup
The power management allows you to setup various power saving
features, when the PC is in standby or suspend mode.

Figure 40. Power Management setup

ccxlii

PnP/PCI Configurations
This menu allows you to configure your PCI slots. You can assign
IRQ's for various PCI slots. It is recommended that you leave the default
settings as it can get a bit complicated messing around with IRQ's

Figure 41. Pnp/PCI Configurations


PC Health Status
This menu displays the current CPU temperature, the fan speeds,
voltages etc. You can set the warning temperature which will trigger an alarm
if the CPU exceeds the specified temperature.

Figure 42. PC Health Status

ccxliii

Load Fail-Safe Defaults


If you made changes to the BIOS and your system becomes unstable
as a result, you can change it back to default. However if you made many
changes and don't know which one is causing the problem, your best bet is to
choose the option "Load Fail Safe Mode Defaults" from the BIOS menu. This
uses a minimal performance setting, but the system would run in a stable
way. From the dialog box Choose "Y" followed by enter to load Fail-Safe
Defaults.

Figure 43. Load fail-safe defaults

Load Optimized Defaults


Like the Fail-Safe mode above, this option loads the BIOS default
settings, but runs the system at optimal performance. From the dialog box
Choose "Y" followed by enter to load Optimized Defaults.

Figure 44. Load optimized


Set Password
To password protect your BIOS you can specify a password. Make
sure you don't forget the password or you cannot access the BIOS. The only
way you can access the BIOS is by resetting it using the reset jumper on the
motherboard.

ccxliv

Figure 45. Load optimized


Save and Exit Setup
To save any changes you made to the BIOS you must choose this
option. From the dialog box choose "Y".

Figure 46. Save to CMOS and EXIT


Exit without Saving
If you don't want to save changes made to the BIOS, choose "N" from
the dialog box.

Figure 47. Quit Without Saving

ccxlv

Task 1. The BIOS settings in the CMOS memory have become corrupted
or damaged
Task: Check the CMOS battery and replace if needed.
Procedure:
1. Power on your desktop pc and wait for the POST
2. Read the Power on self-test report and do the necessary procedure to
solve the problem.
3. Boot up your pc into BIOS setup.
4. Look for incorrect or changing time settings. A noticeable symptom is an
invalid time showing within the operating system. This symptom is confirmed
if time sets after the computer system is restarted. Under these
circumstances,
the
CMOS
battery
should
be
replaced.
Procedure: On how to replace the CMOS Battery.
1. Locate your CMOS battery
2. Obtain battery information
3. Removing the battery
4. Insert the new battery
5. Enter CMOS values
You will be assessed using the following criteria
Evaluation
CRITERIA
Passed

Failed

1. Sequence of steps in CMOS diagnosing


procedure is followed.
2. Sequence of steps for replacing CMOS battery is
followed carefully.
3. Safety precaution is observed.
Remarks

ccxlvi

Task 1. Practicing TCP/IP Networking Skills


While connected to the Internet or another TCP/IP network, answer
these questions:
1. What is your current IP address?
2. Release and renew your IP address. Now what is your IP address?
3. Are you using dynamic or static IP addressing? How do you know?
4. What is your adapter address for this connection?
5. What is your default gateway IP address?
6. What response do you get when you ping the default gateway?

Task 2. Investigating Verizon FiOS


Verizon (www.verizon.com) is currently offering an alternative to DSL
and cable modemfor broadband Internet access. FiOS is a fiber-optic Internet
service that uses fiber-opticcable all the way to your house for both your
residential telephone service and Internetaccess. Search the Web for
answers to these questions about FiOS:
1. Give a brief description of FiOS and how it is used for Internet access.
2. What downstream and upstream speeds can FiOS support?
3. When using FiOS, does your telephone voice communication share the
fiber-optic cablewith Internet data?
4. What does Verizon say about FiOS cabling used for television?
5. IsFiOS available in your area?

ccxlvii

Hardware Upgrade
Tool, Materials, and Equipment
Tools
Philip Screw Deriver
Anti-static wrist strap
Anti-static mat
Equipment
Network Card
Network Card Upgrade
Given the tools and materials, upgrade your computer by installing a
network card.

You will be assessed using the following criteria


Evaluation
CRITERIA
Passed

Failed

1. Safety precautions are observed.


2. Appropriate tools are used in upgrading

3. Necessary improvement and adjustment are


done in terms up upgrading.
Remarks

ccxlviii

LESSON 4: TEST SYSTEMS AND NETWORKS

Testing Computer System


Is your PC healthy? Don't be too sure. Think back to when you heard a
kerklunk sound coming from the hard drive. Or maybe you remember the last
time your Internet connection was down.
The best way to find out what's wrong is to take a proactive approach:
Check under your PC's hood with the following mostly free diagnostic tools,
and see if anything is amiss--before disaster strikes.
Three Major Components of Computer System:

Hardware
Software
Firmware

Test Your Hardware


Checking your computer hardware and its peripherals
1. Computer Monitor and its peripherals
Monitor and interface cables
Video card
Monitor power cable
2. Keyboard and Mouse

Keyboard connector
Mouse Connector

3. I/O port and devices

ccxlix

Connection between the I/O port and the peripheral device


A faulty cable between the I/O port and the peripheral device
A faulty peripheral device
Incorrect settings in the System Setup program
Incorrect settings in the system's configuration files
Faulty I/O port logic on the system board

4. Power supply

Power cord
Fuse

Fuse

Power cord

Testing Your Software


Check the different software installed in the computer.
1. Operating system
Run live updates for your operating systems to get the latest
patches and protection for your OS.
Run registry scanners to check the OS registry configuration

Figure 48. Operating System


2. Application Software
Check for live updates

ccl

Figure 49. Live Updates


3. Anti-virus software

Run anti-virus program


Check for virus signature updates
Check for spyware updates

Test Your Firmware


Firmware- is a combination of hardware and software integrated on a
chip.
To test the firmware
Check for the correct configuration, you can accomplish this by
configuring the BIOS in the computer

Figure 50. BIOS Configuration

ccli

Sample Accomplishment Report Form

Task to be accomplished
Hardware component testing

Status
Working
properly

Software testing

Not working
properly

Status
Working
properly

Not working
properly

cclii

Error Beep codes


When a PC is first switched on or reset it performs a special diagnostic
test called a POST (Power-On Self Test), to check all components in the PC,
the POST program sends out a signal to each device initializing each device's
built-in self test procedure.
The POST test is a two stage process:
1. First, it will check all the basic components including among other things
the system clock, the processor, RAM, the keyboard controller and the Video
2. After the video has been tested the BIOS will then indicate any errors
encountered by displaying either a numeric code or a text message on the
screen.
When a device fails the first part of the POST, the BIOS will send a
series of beeps from the PC's speaker (internal) to inform the PC user that
there is a problem these beeps are coded allowing the user to diagnose the
troublesomemcomponent.
When the POST has been completed successfully, the PC will make a
short beep to let the user know everything is as it should be.
Three (3) major brands of BIOS chip
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS

ccliii

Each type of BIOS chip has it own error code


AMI BIOS ERROR BEEP CODES
Indicator

1 Beep

Error message
Memory refresh failure
Memory parity error

Solution
Check memory

Memory read/write error

Check memory

Motherboard timer not


functioning
Processor error
Gate A20/keyboard
controller failure

Check memory

2 Beeps
3 Beeps

4Beeps
5Beeps

Processor exception
interrupt

Replace motherboard
Replace processor
Replace motherboard
Replace processor

6 Beeps
7 Beeps
8 Beeps
9 Beeps
10 Beeps

Display memory
read/write failure
ROM checksum error

Replace video card

CMOS shutdown
read/write error
Bad cache memory

Replace BIOS
chip/Motherboard
Replace BIOS
chip/Motherboard
Replace cache memory

ccliv

Phoenix BIOS ERROR BEEP CODES


Phoenix BIOS beep codes are a series of beeps separated by a
pause, for example:
beep --- beep beep --- beep --- beep beep would be 1-2-1-2

Indicator

Error message

1-1-4-1

Cache error

1-2-2-3

BIOS ROM Checksum

Solution
Check cache memory
Check BIOS ROM

DRAM test rate

Check DRAM

Keyboard controller
test
RAM failure

Check keyboard
controller
Check memory

1-3-1-1
1-3-1-3

1-3-4-1
RAM failure data bits
of low memory bus

Check memory
Check memory

1-3-4-3
RAM failure data bits
of high memory bus
1-4-1-1

Check ROM
ROM copyright notice

2-1-2-3
Test for unexpected
interrupt

cclv

AWARD BIOS ERROR BEEP CODES


Indicator

Error message

Solution

One long beep and


two short beeps

Video error

Replace video card

Two short beeps

Non-fatal error

Reset RAM, Check


other components.

Directions: Answer the following questions and place


your answers on your
answer sheet.

1. What does the acronym POST stand for?


2. What are the Three Major Brand of BIOS chips
3. Identify the following error codes:

1-2-2-3
1-3-4-1
2-1-2-3
1-1-4-1
1-3-1-1

cclvi

Directions:
Test I. Identify the tools presented below and write your answer in separate
paper.

1.

2.

3.

4.

5.

cclvii

Directions:
Test II. List down at list Five (5) common problem and solution. Use a
separate sheet of paper if needed.
Common Problem

Solution

Task 1.Understanding Hardware Documentation


Obtain the manual for the motherboard for your PC. (If you cannot find the
manual, try downloading it from the motherboard manufacturers Web site.)
Answer these questions:
1. What processors does the board support?
2. What type of RAM does the board support?
3. What is the maximum RAM the board can hold?
4. If the board has a PCIe slot, what version of PCIe does the board use?
5. What chipset does the board use?
Task 2. Teaching Yourself about Windows Meeting Space
Using the Windows Help and Support window, Search for information
on Windows MeetingSpace. Describe the tool. When would you want to use
it? What can you do with WindowsMeeting Space? Set up and test the tool
with a friend on a network connection.

cclviii

Task 1. Testing a Computer Unit


Equipment, Tools, and Materials:
Tools
Multi-tester
Screw driver
Equipment
Computer unit
Monitor
Keyboard and mouse
Power cables
Materials
Bond paper
Ruler and Pencil
Hardware Testing and Documentation
Directions: Test the following computer peripherals and equipment with the
use of the tools provider. Document your testing with the use of an
accomplishment form.

Assigned Task
Hardware component testing

Condition
Working
properly

Not working
properly

Computer monitor
Power supply
Keyboard
Mouse

cclix

You will be assessed using the following criteria

CRITERIA

Percentage

1. Sequence of steps in testing is followed.

20%

2. Safety precautions are observed.

20%

3. Appropriate tools are used in testing.

30%

4. An accomplishment report is created.

30%

Performance Rating

100%

Task 2.Identify Error codes


Equipment, Tools, and Materials:
Tools
Screw drivers
Anti-static wrist strap
Equipment
Computer unit
Memory Error Codes
Given the tools and equipment, identify the memory error code by removing
the module in the computer unit
You will be assessed using the following criteria
Evaluation:
CRITERIA

Percentage

1. Observance of safety precautions.

30%

2. Appropriate tools are used in testing.

30%

3. Identifying the error code.

40%
Performance Rating

100%

cclx

POST ASSESSMENT
Do the Activity on More Security for Remote Desktop
When Enzo travels on company business, he finds its a great help to
access his office computer from anywhere on the road using Remote
Desktop. However, he wants to make sure his office computer as well as the
entire corporate network is as safe as possible.
One way to help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop
uses port 3389, but if you change this port to a secret port, hackers are less
likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop
uses.
Practice implementing this change by doing the following:
1. Set up Remote Desktop on a computer to be the host computer. Use
another computer (the client computer) to create a Remote Desktop session
to the host computer. Verify the session works by transferring files in both
directions.
2. Next, change the port that Remote Desktop uses on the host computer to a
secret port. Print a screen shot showing how you made the change. Use the
client computer to create a Remote Desktop session to the host computer
using the secret port. Print a screen shot showing how you made the
connection using the secret port. Verify the session works by transferring files
in both directions.
3. What secret port did you use?

cclxi

Instruction:

Read each of the questions in the left-hand column of the chart.


Place a check on the columnthat indicate your answers

I Can
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to onform with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration
in accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures
(SOP)

YES

NO

Configure the identified systems and networks based on


specifications and job requirements
Inspect and test configured computer systems and
networks in conformity with manufacturer's
instructions/manual
Correct/Adjust components or parts of computer systems
and networks in accordance with job requirements
Test computer systems and networks to ensure safe
operation
Perform scheduled/periodic maintenance in accordance
with manufacturer's requirements
Make needed repairs/replacements in accordance with
established procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials in
accordance with company SOP

cclxii

I. Identify what computer error is illustrated on the following situations.


__________1. The LED indicator of your monitor is in steady orange color.
_________ 2.When you open your PC, nothing shows up in your monitor and
the LED indicator of your monitor is flashing in yellow color.
__________3. When you open your PC it will show the processor brand
and/or the motherboard brand but doesn't continue. Usually this error will
result to system restart over and over again.
__________4.This also happens even if you try disconnecting your computer
set from the internet. This is what we called aftershock virus which will
continue to run even if internet is disconnected.
__________5. The computer opens up then boots but when the operating
system loads it doesn't continue and it will take a lifetime if you're going to
wait for it to load.
__________6. This happens even if you try installing the hardware. When
you restart your set it will happen again.
__________7. When you try going to safe mode all you will see is a list of
files in Command prompt style.
__________8. Upon loading he operating system, you will hear a loading
sound and then the sound stops, when you try running an audio file, no sound
will be heard
__________9.This will happen only in standby mode, when you move your
mouse or type something, your system will automatically restart and the worst
part is it will delete a file at random.

cclxiii

__________10. Just like the mouse problem, when you open a program that
will take the whole screen like for example a game and/or a program
applications, when you close it, it will cause your system to restart.
II. Choose the letter of the best answer:
1) These are moderately dangerous types of errors among those that can
pop up on your PC. System errors are caused by malfunctioning
hardware components, corrupted operating system modules, etc.
a. System error
b. Runtime errors

c. Stop errors
d. Device managers errors

2) These are caused by corrupted or malfunctioning system files or


software executables. Most runtime errors cause the application that
caused it to shut down. However, more serious runtime errors may
cause the system to become unstable or unresponsive, leaving you
with no choice but to reach for the Reset button.
a. System error
b. Runtime errors

c. Stop errors
d. Device managers errors

3) These are caused by corrupted hardware, especially malfunctioning


RAM modules and bad sectors on hard disks. Stop errors can be
difficult to resolve at times.
a. System error
b. A Runtime errors

c. Stop errors
d. Device managers errors

4) These are usually caused by corrupted driver files or malfunctioning


hardware components. In case of the former cause, the problem is
usually solved simply by reinstalling or updating the drivers. However,
the latter cause can often be solved only by replacing hardware
components.
a. System error
b. B. Runtime errors

c. Stop errors
d. Device managers errors

5) Theseare caused by malfunctioning hardware components, and are


characterized by short beep sounds from the tiny internal speaker of
your motherboard. POST code errors occur when you press the power
button to turn on your PC..
a. System error
b. B. Runtime errors

c. Application errors
d. Post Code errors

cclxiv

6) These can be caused at any point of time. As the name suggests,


these are caused by applications while those are running. These are
usually caused by glitches in the program code itself. These are
usually resolved by updating the program to its latest version.
a. System error
c. Application errors
b. Browser status errors d. Post Code errors

7) These are caused by problems faced by browsers when trying to


access a website. These can be caused by misplaced web pages in
the server of the website itself, or due to connection problems. For
instance, a 404 error would indicate that the browser is trying to access
a webpage that does not exist in the specified location.
a. System error
c. Application errors
b. Browser status errors d. Post Code errors
8) is define as the flow of electron or electric current. It is an invisible form of
energy that can be transform into other form of energy like heat light and
mechanical.
a. electricity
c. Proton
b. atom
d. Post Code errors
9) the amount of pulling force that makes the electron flow. Also known as
potential difference or EMF(electromotive force).
a. electricity
c. Current
b. resistance
d. Voltage

10) a type of circuit that has an open path for current to flow. It means that
current cannot flow in open circuit.
a. Open circuit
b. resistance

c. Current circuit
d. close circuit

III. Match Column A with Column B


Column A
1. Used for installing and removing
screws in the computer unit.
2. Used for picking small parts in
the computer unit.
3. Used for eliminating electrostatic
discharge in the work area.
4. Primarily used for connecting
terminals in the power supply and
circuit board with the use of a
soldering lead.
5. It is a paste used for heat

Column B
A. Screw drivers
B. Pliers and tweezers
C. Soldering iron
D. Lens cleaner

E. Anti-static wrist strap, mat and


cclxv

dissipation of the processor.


6. A device used for cleaning optical
media, such as DVD-ROMS and
CD-writers.
7. A device used to crimp the RJ45
connector to the UTP cable
8. A device used for testing the
network connection

spray
F. Thermal paste

G. LAN Tester
H. Crimping tool
I.

Systems Tool Box

IV. Arrange the following steps in verifying the correct protocols are
installed on the computer.
_____Within the configuration tab double-click the TCP/IP protocol icon.
Note: Do not click on the PPP or Dial-Up adapter, click on the network card
adapter.
_____Select the option to specify an IP address
_____Click Start / Settings / Control Panel
_____Double-click the Network icon
_____In the TCP/IP properties click the IP address tab
_____When specifying these values, the computers on the network must all
have the same Subnet Mask and have a different IP Address. For example,
when using the above values on one computer you would want to use an IP
address of 102.55.92.2 on another computer and then specify the same
Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an
address could be:IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192

cclxvi

V. List down at list Five (5) common computer problems and solutions.
Common Computer Problems
1.
2.
3.
4.
5.

Solutions

cclxvii

Books and Articles and Printed Materials:


Barry Press, Marcia Press, PC Upgrade and Repair Bible,
Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256
Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475
Crosspoint Boulevard, Indianapolis, IN 46256
Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop
Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard,
Indianapolis,
IN 46256
Ronaldo V. Ramiloand Deover M. Pasco , K to 12 Basic Education
Curriculum- Technology and Livelihood EducationLearning Module
Computer Hardware Servicing
JethroCampos , et.al , Competency Based Learning Materials for
Strengthening Technical Vocational Education Program

cclxviii

Computer System - The complete computer made up of the CPU, memory


and related electronics (main cabinet), all the peripheral devices connected to
it and its operating system. Computer systems fall into two broad divisions:
clients and servers. Client machines fall into three categories from low to high
end: laptop, desktop and workstation. Servers range from small to large: lowend servers, midrange servers and mainframes.
Configuration - The makeup of a system. To "configure" is to choose options
in order to create a custom system. "Configurability" is a system's ability to be
changed or customized.
Connector - Any plug and socket that links two devices together. Although
taken for granted and rarely in the limelight, connectors are a huge industry,
and the quality of these components is more critical than most people would
imagine. When not designed or constructed properly, they often become the
weakest element in an electronic system.
Display Adapter- A plug-in card in a desktop computer that converts the
images created in the computer to the electronic signals required by the
monitor. It determines the maximum resolution, refresh rate and number of
colors that can be displayed, which the monitor must also be able to support.
On many PC motherboards, the display adapter circuits are built into the
chipset, and an AGP or PCI card is not required.
ESD (Electro Static Discharge)-A small amount of static electricity that can
destroy small parts of your computer.
Expansion Board - A printed circuit board that plugs into an expansion slot
and extends the computer's capability to control a peripheral device. All the
boards (cards) that plug into a computer's bus are expansion boards, such as
display adapters, disk controllers, network adapters and sound cards.
Expansion Bus - An input/output bus typically comprised of a series of slots
on the motherboard. Expansion boards (cards) are plugged into the bus. ISA
and PCI are the common expansion buses in a PC.
Graphical User Interface- A graphics-based user interface that incorporates
movable windows, icons and a mouse. The ability to resize application
windows and change style and size of fonts are the significant advantages of
a GUI vs. a character-based interface. GUIs have become the standard way
users interact with a computer, and the major GUIs are the Windows and Mac
interfaces along with Motif for Unix and the GNOME and KDE interfaces for
Linux.

cclxix

Motherboard - Also called the "system board," it is the main printed circuit
board in an electronic device, which contains sockets that accept additional
boards. In a desktop computer, the motherboard contains the CPU, chipset,
PCI bus slots, AGP slot, memory sockets and controller circuits for the
keyboard, mouse, disks and printer. It may also have built-in controllers for
modem, sound, display and network, obviating the need to plug in a card. A
laptop motherboard typically has all peripheral controllers built in.
Operating System - The master control program that runs the computer. The
first program loaded when the computer is turned on, its main part, the
"kernel," resides in memory at all times. The operating system sets the
standards for all application programs that run in the computer. The
applications "talk to" the operating system for all user interface and file
management operations. Also called an "executive" or "supervisor," an
operating system performs the following functions.
Peripheral -Any hardware device connected to a computer, such as a
monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick,
paddle or mouse
Server - A computer system in a network that is shared by multiple users.
Servers come in all sizes from x86-based PCs to IBM mainframes. A server
may have a keyboard, monitor and mouse directly attached, or one keyboard,
monitor and mouse may connect to any number of servers via a KVM switch.
Servers may be also be accessed only through a network connection as well.

Sound Card- Also called a "sound board" or "audio adapter," it is a computer


expansion board that records and plays back sound, providing inputs from a
microphone or other sound source and outputs to speakers or an external
amplifier. The de facto standard for sound card compatibility in PCs is
Creative Labs' Sound Blaster.
User Interface - All graphics based today, the user interface includes the
windows, menus and method of interaction between you and the computer.
Prior to the Mac, Windows and Motif (Unix) interfaces, all interaction was
based on commands entered by the user. Operating systems may support
optional interfaces and allow a new shell, or skin, to be used instead.
Virus- Software used to infect a computer. After the virus code is written, it is
buried within an existing program. Once that program is executed, the virus
code is activated and attaches copies of itself to other programs in the
system. Infected programs copy the virus to other programs.

cclxx

You might also like