Professional Documents
Culture Documents
What Is Computer Systems Servicing (CSS NCII) ?
What Is Computer Systems Servicing (CSS NCII) ?
Computer Systems Servicing (CSS NCII) is the upgraded version of what is then
called Computer Hardware Servicing (CHS NCII) qualification. During the late CHS,
the qualification was said to be of the NCII level, meaning that in a ranking basis, it
is the baseline level.
Some competencies have the NCII, NCIII and NCIV levels. CHS was given an NCII
level because, well, for a fact, it was not that difficult to pass, but still, many
students and/or even professionals fail.
When TESDA decided to upgrade the CHS competency, they forgot or maybe they
have just decided not to adjust its ranking level. Most IT professionals would
certainly agree that the CSS competency deserves to be of the NCIV level.
What are the differences between CHS NCII and CSS NCII?
The old CHS competency covered just two (2) modules and you are only expected
to perform a couple of tasks to pass the actual examination. The examination
includes a question and answer portion before proceeding with the actual hands-on
configurations and the same goes for the CSS NCII exam.
The good news is that we will tackle every important detail about this and every
module on each succeeding post on this blog. Links on the tools (software /
installers) will also be provided.
In the future post, we will configure a Virtual Lab environment for module two (2)
practice which can also be maximized for module three (2).
For personal practice, all these can be done on our Virtual Lab.
There we go! All these tasks for eight (8) hours but I assure you, you would not
need that much time.
Next, we will start with module one (1), definition of terms, the technologies, their
functions and importance before we proceed with the actual task performance.
In this blog, we will tackle these components As Fast and As Simple As Possible.
1. The CPU. The CPU - Central Processing Unit, commonly called processor is where all of
the functions, tasks, and computations occur. Although it is the powerhouse center, it
cannot do these processes alone. It needs other components to do its tasks.
You will also see the Northbridge and the Southbridge in the motherboard. The Northbridge
controls the data pathways and communication of the heavily used components of the
system; the memory, cpu, video. The Southbridge, on the other hand, controls
communication on the "not so important" and minimal components of the system; the usb,
serial ports, BIOS, audio et cetera.
3. The Memory or RAM. The memory does not control anything. It serves as the storage
of all the functions, applications, services, programs, features, instructions that are being
utilized by the CPU. It is in the memory where our Operating System is loaded.
4. The Hard Disk Drive. The HDD is our non volatile storage. Contrast to the memory
being volatile (it loses all data on power loss), the HDD retains all that is saved
permanently. When we first install our Operating System, it is saved in the HDD, a recovery
partition is also created amounting to 100 to 300MB. This allows for system recovery in case
of errors.
The HDD is also where we save our files; music, videos, documents, pictures et cetera.
When you install an application, it is also installed in the hard disk drive.
The newer version of the HDD is the SSD or Solid State Drive. They both function as storage
but instead of using disk platters, SSDs use Integrated Circuits and memory organized as
disk drives.
Now, these are only the main components of the computer system. There are still quite a
few that contributes to the total functioning of the system.
Saturday, 26 August 2017
1, The most common end points in our networks are the computers. Inside the computers
we have the Network Interface Card or NIC. This is what allows our computers to be able to
communicate in the network. We do have the wired and the wireless. It is in these NICs
where theMedia Access Control Address or MAC Address is burned to. No two NICs can have
the same MAC Address. This is for the purpose of identification.
2. The switch is most commonly what is on the other side of our cables connected to our
devices. The purpose of the switch is simple; to allow our devices to
communicate internally and to be able to connect more devices in one network. Embedded
on each switch port is the ASIC, Application Specific Integrated Circuit which allows
simultaneous data transfer as contrast to the old hubwhich only allowed one communication
at a time no matter how many ports it has.
4. The cables. In networking, you will always encounter different types of cables with
different purpose, specifications and limitations. The most widely used cables are
the Twisted Pair and Fiber Optics. These cables are very much different. The twisted pairs
have a limit of 100 meters and usepulses of electricity to transmit data while the fiber optics
use Light Emitting Diode and Lasertechnology and are used for very long distances ranging
from 2 to 100 kilometers.
So, to summarize, all we need are these four essential devices / materials to be able to
create our networks.
2. Disassemble the computer while taking notes on what peripherals you are taking out from the unit. You
will have to remove also the processor, power supply and the motherboard from the case.
a. Example, if you remove a memory card, write the quantity (1 piece), the type (DDR3), and description
(1GB). That’s why it is important that you know the parts of a computer.
b. TIP: count the cables that you disconnect from the motherboard and know to which they are attached to.
c. Pay attention also to the cables for the front panel of the PC. E.g. light indicators for HDD, reset button,
power button, usb power et cetera. One missed cable will cost you lots of time.
5. Once done, the assessor will hand you a working bootable usb which you will use in reformatting the PC.
NOTE: If the usb isn’t working, ask for another one. I had an experience wherein the one
they gave me did not work. Remember, time is limited.
6. Insert the usb, configure the BIOS to boot from the usb then restart your PC.
8. Once OS installation is finished, you will be handed a new usb containing the drivers and applications
which you will use.
a. Install the drivers first
b. Install MS Office Suite
c. Install Anti-virus
d. Pin the shortcuts to the desktop
END OF Module 1
3. Once all devices are connected, get the mac addresses of the pc, server and laptop for the
purpose of assigning them IP Addresses using DHCP reservations.
Note the mac addresses down together with the corresponding unit to avoid confusion. To
get the MAC Address, open command prompt and type “getmac” or “ipconfig”.
a. Here, although the devices are all configured to get IP addresses using DHCP, you will be
instructed to select an IP address specifically that is why DHCP Reservations should be
configured.
b. For example. Create a DHCP Pool of 192.168.1.100 to 192.168.1.200
c. From the pool, the IP 192.168.1.114 should be assigned to the pc
d. 192.168.1.117 should be assigned to the server
e. 192.168.1.155 should be assigned to the laptop
4. Configure the router using your web browser to access it's interface
a. In order to access the router’s interface, look for its IP address at the back of the device. If
it’s not there, you can ask the assessor. If the router’s address is indicated on the back of
the device but you are unable to access it using that address, reset first the router by
pressing the power button for 10 to 20 seconds. Usually, the password to access the
interface is indicated also on the device. Ask the assessor if otherwise.
b. Create the DHCP Pool as instructed; the ranges will be given by the assessor.
c. Change the SSID and configure wireless security using WPA2.
d. Configure DHCP reservations.
e. Check your work by pinging the connected devices, if task is accomplished, move on to the
access point.
7. Test interconnectivity of all the devices by using the “PING” command. Make sure the
devices got the correct IP addresses reserved to them.
8. Create folders on all the devices, share the folders and make sure everyone has read/write
permissions.
9. Show your work to the assessor, he will give you instructions to test your work.
END OF module 2
2. Virtual labs are safe for practice. Safe in a sense that if you try to
configure something that has a potential to disrupt your
configuration totally, you need not worry because if you made a
mistake you just build it again and that has no effect on your
physical system.
64-bit systems break the limit for memory usage, thus, you can
have more than 4 GB in your system. Keep in mind that when you
create one (1) virtual machine, the resources that you allocate to it
are really being taken from the physical machine.