Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

CSS: Computer Systems Servicing NCII

What is Computer Systems Servicing (CSS NCII)?

Computer Systems Servicing (CSS NCII) is the upgraded version of what is then
called Computer Hardware Servicing (CHS NCII) qualification. During the late CHS,
the qualification was said to be of the NCII level, meaning that in a ranking basis, it
is the baseline level.

Some competencies have the NCII, NCIII and NCIV levels. CHS was given an NCII
level because, well, for a fact, it was not that difficult to pass, but still, many
students and/or even professionals fail.

When TESDA decided to upgrade the CHS competency, they forgot or maybe they
have just decided not to adjust its ranking level. Most IT professionals would
certainly agree that the CSS competency deserves to be of the NCIV level.

What are the differences between CHS NCII and CSS NCII?

The old CHS competency covered just two (2) modules and you are only expected
to perform a couple of tasks to pass the actual examination. The examination
includes a question and answer portion before proceeding with the actual hands-on
configurations and the same goes for the CSS NCII exam.

To cope up with the hastened trend of technology advancement, CSS was


introduced, and instead of having just two (2) modules, this new competency has
four (4). This seems to be a great move to ensure that we are not left behind on
what is the new global standard in technology.

What are the four (4) modules of Computer Systems


Servicing?

Install and Configure Computer Systems


This module expects that you can do the following:
1. Disassemble a computer system
2. Take inventory of everything that you remove from the system until the case
is empty
3. Assemble the computer
4. Create a bootable USB  using Rufus application or DISKPART command
5. Configure Basic Input Output (BIOS) setup
6. Install an Operating System
7. Create multiple partitions (three (3) partitions) with corresponding
percentages
8. Install the drivers
9. Install the applications (MS Office, Anti Virus) and pin them on the desktop
For personal practice, you will need the following:
1. 1 computer set
2. 1 screw driver
3. 1 USB
4. Rufus Application
5. Microsoft Office (any version) installer
6. Anti-virus software
7. Computer drivers (Driver Pack Solution)
8. Microsoft Operating System ISO image
The tasks are fairly easy to perform. The catch though is that you should be familiar
about the different hardware components of the system, their versions, functions
and importance.

The good news is that we will tackle every important detail about this and every
module on each succeeding post on this blog. Links on the tools (software /
installers) will also be provided.

Setup Computer Networks

This module expects that you can do the following:

1. Create cables – crossover, straight-through, patch panel


2. Configure a wireless router
3. Configure an access point
4. Connect the devices – one (1) laptop, one (1) desktop client, one (1) desktop
server
5. Test connectivity
6. Create folders and configure shares
For personal practice, you will need the following:

1. One (1) laptop


2. Two (2) desktops
3. Unshielded Twisted Pair (UTP) cables
4. Registered Jack #45 (RJ45) 
5. Crimper
6. Cable Tester
7. One (1) router
8. One (1) wireless access point (WAP)
9. One (1) patch panel with modular box
10. One (1) Screw driver
11. One (1) switch
If these items are not available, you can just create your Virtual Lab for
configuration practice. But the making of the cables should be practiced separately.

In the future post, we will configure a Virtual Lab environment for module two (2)
practice which can also be maximized for module three (2).

Setup Computer Servers

This module expects that you can do the following:

1. Install and configure a Windows Server 2008/2012 OS


2. Promote the server to a Domain Controller
3. Configure the Domain Name Service (DNS) role on the server
4. Configure the Dynamic Host Configuration Protocol (DHCP) role on the server
5. Create an Organizational Unit (OU) and create two (2) user accounts
6. Join the clients (laptop and desktop) to the domain
7. Install the File and Storage role on the server
8. Create a share in the server and map it on the clients
9. Create a folder in the server; share it (read/write) for FOLDER redirection.
10. Redirect documents and desktop of the clients
11. Configure remote desktop on all the machines
12. Install Print Management
13. Install a printer in the server, install the driver
14. Configure printer deployment

For personal practice, all these can be done on our Virtual Lab.

Maintain Computer Systems

This module expects that you can do the following:

1. Create a system restore point


2. Create a system backup image
3. Use the created restore point to restore the system
4. Use the created backup image
5. Use disk defragmenter
6. Use disk cleanup
7. Scan the system for viruses
For personal practice, all these can be done on our Virtual
Lab.

There we go! All these tasks for eight (8) hours but I assure you, you would not
need that much time.

Next, we will start with module one (1), definition of terms, the technologies, their
functions and importance before we proceed with the actual task performance.

CSS: Computer Hardware Components


In order to pass the CSS Exam from TESDA, we should be knowledgeable about
the components of a computer system and their functions.

In this blog, we will tackle these components As Fast and As Simple As Possible.

1. The CPU. The CPU - Central Processing Unit, commonly called processor is where all of
the functions, tasks, and computations occur. Although it is the powerhouse center, it
cannot do these processes alone. It needs other components to do its tasks. 

The two prominent manufacturers of CPUs are Intel and AMD.


2. The Motherboard. The motherboard is the framework of the computer system. It is the
component in which all of the other components are connected and inserted. In the
motherboard also resides the data busses. Data busses are pathways on the motherboard
that allows the transfer of instructions from one component to another. External
components such as monitors, speakers, microphones and USBs also connect to the
motherboard.

You will also see the Northbridge and the Southbridge in the motherboard. The Northbridge
controls the data pathways and communication of the heavily used components of the
system; the memory, cpu, video. The Southbridge, on the other hand, controls
communication on the "not so important" and minimal components of the system; the usb,
serial ports, BIOS, audio et cetera.

3. The Memory or RAM. The memory does not control anything. It serves as the storage
of all the functions, applications, services, programs, features, instructions that are being
utilized by the CPU. It is in the memory where our Operating System is loaded. 

To have an idea of the memory's function, imagine this scenario.

Your computer has 1 gigabyte of memory. When the Operating System is loaded, it


occupies let's say, about 100 Megabytes. You then opened a few web browsers, lots of
websites (YouTube, Facebook, Twitter), and you also opened PC applications such as
Microsoft Word, Powerpoint, Photoshop et cetera. You will then notice slowness on your
computer depending on how occupied your memory is. If you've reached the maximum of 1
Gigabyte, some systems tend to see the BSOD - Blue Screen of Death error. This is the
result of memory overload wherein the memory has to offload a few programs or functions
to accommodate to the ones being currently used by the processor.

4. The Hard Disk Drive. The HDD is our non volatile storage. Contrast to the memory
being volatile (it loses all data on power loss), the HDD retains all that is saved
permanently. When we first install our Operating System, it is saved in the HDD, a  recovery
partition is also created amounting to 100 to 300MB. This allows for system recovery in case
of errors. 

The HDD is also where we save our files; music, videos, documents, pictures et cetera.
When you install an application, it is also installed in the hard disk drive.

The newer version of the HDD is the SSD or Solid State Drive. They both function as storage
but instead of using disk platters, SSDs use Integrated Circuits and memory organized as
disk drives.
Now, these are only the main components of the computer system. There are still quite a
few that contributes to the total functioning of the system.
Saturday, 26 August 2017

Common Networking Devices and their Functions


This is a very brief article about the different devices used in a network and their particular
purpose.

1, The most common end points in our networks are the computers. Inside the computers
we have the Network Interface Card or NIC. This is what allows our computers to be able to
communicate in the network. We do have the wired and the wireless. It is in these NICs
where theMedia Access Control Address or MAC Address is burned to. No two NICs can have
the same MAC Address. This is for the purpose of identification.

2. The switch is most commonly what is on the other side of our cables connected to our
devices. The purpose of the switch is simple; to allow our devices to
communicate internally and to be able to connect more devices in one network. Embedded
on each switch port is the ASIC, Application Specific Integrated Circuit which allows
simultaneous data transfer as contrast to the old hubwhich only allowed one communication
at a time no matter how many ports it has.

3. The router. I have written a more detailed article about a router here. But, mainly, a


router's role is to allow our devices to communicate to other networks.  It serves as the
receiving point in and out of the internet which the switch is not capable of doing.

4. The cables.  In networking, you will always encounter different types of cables with
different purpose, specifications and limitations. The most widely used cables are
the Twisted Pair and Fiber Optics. These cables are very much different. The twisted pairs
have a limit of 100 meters and usepulses of electricity to transmit data while the fiber optics
use Light Emitting Diode and Lasertechnology and are used for very long distances ranging
from 2 to 100 kilometers.

So, to summarize, all we need are these four essential devices / materials to be able to
create our networks. 

CSS: COC1 - Install and Configure Computer Systems


                   

                                                  STEPS and INSTRUCTIONS


1.    Remove all jewelries, watches, and static. Or at least show the assessor you are doing so.

2.    Disassemble the computer while taking notes on what peripherals you are taking out from the unit. You
will have to remove also the processor, power supply and the motherboard from the case.
a.  Example, if you remove a memory card, write the quantity (1 piece), the type (DDR3), and description
(1GB). That’s why it is important that you know the parts of a computer.
b.  TIP: count the cables that you disconnect from the motherboard and know to which they are attached to.
c.  Pay attention also to the cables for the front panel of the PC. E.g. light indicators for HDD, reset button,
power button, usb power et cetera. One missed cable will cost you lots of time.

3.    Assemble the computer.


a.    Now this is fairly simple. Last out should be first in. Use the list of the items that you removed as
reference.
b.   Once done. Turn on the PC. If it’s working, good for you. If not, troubleshoot as fast as you can and do not
be disheartened. There’s a lot of time!

4.  Create a bootable USB. 


You have to know how to create a bootable usb using the DISKPART command in the
command prompt and/or how to make a bootable usb using RUFUS. Search the net, it’s
simple. The assessor will not really make you create the bootable usb, he/she will just check
if you know the process.

5.   Once done, the assessor will hand you a working bootable usb which you will use in reformatting the PC. 
NOTE: If the usb isn’t working, ask for another one. I had an experience wherein the one
they gave me did not work. Remember, time is limited.

6.    Insert the usb, configure the BIOS to boot from the usb then restart your PC.

7.    Go on with the formatting process.


a.    You will be asked to create three partitions with specific disk space, know how to.

8.    Once OS installation is finished, you will be handed a new usb containing the drivers and applications
which you will use.
a.    Install the drivers first
b.    Install MS Office Suite
c.    Install Anti-virus
d.    Pin the shortcuts to the desktop

9.    Have the assessor check your work.

                                                                                                END OF Module 1

CSS: COC2 - Setup Computer Networks


                                                 
                                          
                                              STEPS and INSTRUCTIONS

1.    Create 1 cross-over cable, 1 straight-through cable and patch panel cable.


a.    I consumed lots of time on this simple task due to the dullness of the crimping tools. Bring
your own if you can.
b.    Obviously, you’ll have to know the wiring standards of T568A and T568B to create the
cables.
c.    Every patch panel is different, so before taking the exam, visit the assessment center and
check the patch panel type and color coding. The one I used had no color coding on it.
d.    You must have every cable checked when finished at once by the assessor in order to move
on.

2.    Connect all the devices together using the cables.


 2 desktops
 1 switch 
 1 patch panel 
 1 wireless router 
 1 access point 
 1 laptop which will be connected wirelessly after configuring the router and the access
point.

a.    Drawing included in the reviewers.

** Additional cables will be provided

3.   Once all devices are connected, get the mac addresses of the pc, server and laptop for the
purpose of assigning them IP Addresses using DHCP reservations. 

    Note the mac addresses down together with the corresponding unit to avoid confusion. To
get the MAC Address, open command prompt and type “getmac” or “ipconfig”.

a.    Here, although the devices are all configured to get IP addresses using DHCP, you will be
instructed to select an IP address specifically that is why DHCP Reservations should be
configured.
b.    For example. Create a DHCP Pool of 192.168.1.100 to 192.168.1.200
c.    From the pool, the IP 192.168.1.114 should be assigned to the pc
d.    192.168.1.117 should be assigned to the server
e.    192.168.1.155 should be assigned to the laptop

4.    Configure the router using your web browser to access it's interface
a.    In order to access the router’s interface, look for its IP address at the back of the device. If
it’s not there, you can ask the assessor. If the router’s address is indicated on the back of
the device but you are unable to access it using that address, reset first the router by
pressing the power button for 10 to 20 seconds. Usually, the password to access the
interface is indicated also on the device. Ask the assessor if otherwise.
b.    Create the DHCP Pool as instructed; the ranges will be given by the assessor.
c.    Change the SSID and configure wireless security using WPA2.
d.    Configure DHCP reservations.
e.    Check your work by pinging the connected devices, if task is accomplished, move on to the
access point.

5.    Configure the Access Point


a.    Same steps as the router, you just have to change its SSID and IP configuration that
corresponds with the IP subnet you are using.

6.    Now, connect the laptop to the access point.

7.   Test interconnectivity of all the devices by using the “PING” command. Make sure the
devices got the correct IP addresses reserved to them.
8.    Create folders on all the devices, share the folders and make sure everyone has read/write
permissions.

9.    Show your work to the assessor, he will give you instructions to test your work. 

END OF module 2

CSS: Creating our CSS NCII Virtual Lab Part 1

Nothing can replace hands-on experience, it's


true. A study was conducted and it proved that you are more likely
to remember something if you actually have done it. That's why a
virtual lab is important. I, for one, have had a few labs of my own. I
started when I practiced for my CompTIA A+ exams, I also had a
lab for when I was studying for CISCO, I had one when I did a self
study on Computer Systems Servicing NCII and I have one now
while I'm on track for my Windows Server certification. I always did
remember a lot through the use of these labs wherein a did tasks
one after another more than once. And whatever configurations I
did, did not affect my physical device's setup.

Virtual labs are made possible by the technology known


as virtualization. It literally has broken the barrier to lots of things.
Let's enumerate and explain some.
1. Before, in order to do a practice using two (2) computers, you
really would need to have two (2) computers. But now, not
anymore. With virtualization, you can build another computer or
even more on top of the existing system that you have.

2. Virtual labs are safe for practice. Safe in a sense that if you try to
configure something that has a potential to disrupt your
configuration totally, you need not worry because if you made a
mistake you just build it again and that has no effect on your
physical system.

3. In a business perspective, companies don't need to have


hundreds of bulky heavy machines in their environment.
Nowadays, they maximize the use of virtualization by building all of
their servers in just one, two or three physical machines. This has
greatly reduced the cost for purchase and maintenance.

Virtualization does have tons of benefits but for our purpose, we


only need to learn a few - the basics. It does have, as most things
do, some catch. The first concern is the ability of your device
(desktop / laptop) to support virtualization. If it does, how many
machines can  it support? Typically, the ideal machine to build a
virtual lab on is one that has is a 64-bit architecture.

64-bit systems break the limit for memory usage, thus, you can
have more than 4 GB in your system. Keep in mind that when you
create one (1) virtual machine, the resources that you allocate to it
are really being taken from the physical machine.

For instance, consider the following specifications:

This machine only has 3 GB of memory. It's possible to create a


virtual machine on top of this device but it will greatly strain the
physical machine. If I gave the virtual machine 1 GB of RAM, the
physical machine is left with 2 GB which is not enough to carry out
multiple processes at one time. Can't we add some memory then?
Yes, we can. But since it's a 32-bit Operating System on a 32-bit
machine, we can't exceed more than 4 GB.

If your machine is virtualization capable, we can create our virtual


environment. Please download the following installers that we will
use.

1. Oracle Virtual Box


2. Windows Server 2012 R2 Evaluation
3. Windows 8.1 Evaluation

Note that you need to register before you can download.

You might also like