Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Computer System

Servicing NCII
MODULE 1:
Install and Configure
Computer Systems
Table of Contents

What I Need To Know …………………………………….…….…… 1


General Instructions ………………………………………………… 1
Module Objectives ………………………………………………… 2
Module Content ………………………………………………… 2
What I Know ………………………………………………… 2

Quarter 1
Learning Outcome 1 Assemble computer hardware
Self-Scheck/ Task Sheet
Learning Outcome 2. Prepare Installer
Self-Scheck/ Task Sheet
Quarter 2
Learning Outcome 3. Install operating system and drivers for
peripherals/ devices
Self-Scheck/ Task Sheet
Learning Outcome 4. Install application software
Self-Scheck/ Task Sheet
Learning Outcome 5. Conduct testing and documentation
Self-Scheck/ Task Sheet
Post-Test ………………………………………………… 70
Key to Answers ………………………………………………… 76
References ………………………………………………… 79
TO THE STUDENT

Greetings!
This module contains training materials and activities for you to finish. You are
required to go through a series of learning activities. If you have questions, don’t
hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems
that is in line with the industry standards. You need to complete this module before
you can perform the next module.

HOW TO USE THIS MODULE

The unit of competency, “Install and Configure Computer Systems“, is one of the
competencies of Computer Systems Servicing NCII, a course which comprises
knowledge, skills and attitudes required for a trainee to possess.
In this module, you are required to go through a series of learning activities in order
to complete each learning outcome. In each learning outcome are Information Sheets,
Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities
on your own. If you have questions, do not hesitate to ask for assistance from your
teacher.
Remember to:
• Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there to
support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way, you
will improve your speed, memory and your confidence.
Introduction
This module is designed to equip you the TVL Open High School Learners with
essential Knowledge, Skills, and Attitude in performing the tasks on Computer System
Servicing which will lead you to acquire National Certificate Level II.
This module includes information and activities to develop desirable values, skills
and understanding through step-by-step procedures and helpful techniques that will guide
you on how to install and configure computer systems. Furthermore, applications to real
life situations are also included for lifelong learning.

What to Learn in this Module?


At the end of the lesson, you’re expected to:

1. Assemble computer hardware.


2. Prepare installer.
3. Install operating system and driver for peripherals/devices.
4. Install application software.
5. Conduct test and documentation.
Pre-Test
What I Know?

1. What does BIOS stand for?

a. BASIC INPUT OUTPUT SYSTEM


b. BASIC INDUCT ONLINE SYSTEM
c. BASIC INDUSTRY ONLINE STANDARDS
d. BASIC INSULATOR OPEN SOURCE

2. CPU is the _____________ of the computer.

a. mother
b. system
c. brain
d. process

3. What cable is used to connect PC to switch hub and router?

a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable

4. Is the hardware in a computing device where the operating system (OS), application
programs and data in current use are kept so they can be quickly reached by the
device's processor.

a. RAM
b. Operating system
c. CPU
d. HDD

5. What RAM stands for?

a. Random Access Memory


b. Random Autonomous Memory
c. Read Action Memory
d. Rare Ally Memory
6. Identify the malwares.
a. trojan
b. virus
c. spyware
d. all of the choices

7. An example of super computer is :


a. MP3 players
b. Desktop
c. Cell phones
d. Mainframe computers

8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent

9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard

10. USB stands for


a. Universal Serial Bus
b. University Serial Bus
c. Universal Serial Body
d. Universal Series Bus

11. What is this?


a. Mouse
b. Speakers
c. Keyboard
d. Monitor

12. What is this?


a. CPU
b. Modem
c. Internet
d. Cable
13. What is this?
a. Malware
b. Software
c. Hardware
d. People

14. OS stands for


a. Onsite Software
b. Operating System
c. Only Read Software
d. On-demand System

15. What is this?


a. CPU
b. Processor
c. System Unit
d, PC
Definition of Terms

CPU-Central processing unit; the brain of the computer; controls the other elements
of the computer

Disk Drive-A peripheral device that reads and/or writes information on a disk

Hard Drive-A device (usually within the computer case) that reads and writes
information, including the operating system, program files, and data files

Keyboard-A peripheral used to input data by pressing keys

Modem-A peripheral device used to connect one computer to another over a phone
line
Monitor-A device used to display information visually

Mouse-A peripheral device used to point to items on a monitor

Printer-A peripheral device that converts output from a computer into a printed image

Browser-A program used to view World Wide Web pages, such as Netscape
Navigator or Internet Explorer

Driver-Software program that controls a piece of hardware or a peripheral

Icon-A small picture used to represent a file or program in a GUI interface

Internet-A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols

URL-Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet

Virus-A deliberately harmful computer program designed to create annoying glitches or


destroy data

Window-A screen in a software program that permits the user to view several programs
at one time
What I Need To Know?

Read Information Sheet No 1.1-1 and find out how much you can
remember. Do Self-Check 1.1-1 to know how much you have learned.

Lesson Information 1.1-1


OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES

Learning Objectives:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing, installing and
testing of computer hardware and software.
2. Determine the effects of computers to the people, health risk, and to the environment.

During installation and initial test, careful planning and preparation are to be done.
To avoid personal injury and damages to wiring due to sharp pins on connectors and
printed circuit assemblies, rough chassis edges and corners, and hot components.

Adhere to warnings and limitations regarding accessibility into areas designated


only for authorized technical personnel.

SOME BASIC PRECAUTIONS AND PROCEDURES:

o Before starting the installation, read carefully the documentation and procedures
on any hardware and software settings that may be required.
o Failure to do the proper jumper setting may cause damage to your CPU.
o Without an effective cooling fan, the CPU can overheat and cause damage to both
CPU and the motherboard.
o Each bank must have the same size and type of memory installed in pairs.
o Before adding and removing any other system components, make sure that you
unplug your power supply. Failure to do so may cause damage to your
motherboard and in the system component.
o Test the computer, ensuring that it meets the necessary system requirements
before booting up.
o If the computer does not pass any of the power on self-test (POST), the computer
will receive an irregular power on self-test. An irregular POST is a beep code
which is different from the standard beep which can either be no beeps at all or a
combination of different beeps.

EFFECTS OF COMPUTERS

Some effects of computers relating to the violation of privacy, the impact on the
labor force, health risks, and the impact on the environment.

1. Violation of Privacy

Nearly every life event is stored in a computer somewhere--in medical records,


credit reports, tax records, etc. It is crucial that personal and confidential records be
protected properly. In many instances, where these records were not properly
protected, individuals have found their privacy violated and identities stolen.

2. Impact on Labor Force

Although computers have improved productivity in many ways and created an


entire industry with hundreds of thousands of new jobs, the skills of millions of workers
and managers have been replaced by computers. Thus, it is crucial that workers keep
their education up-to-date. A separate impact on the labor force is that some companies
are outsourcing jobs to foreign countries instead of keeping their homeland labor force
employed.

3. Health Risks

Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, necks, and back. Computer users can protect themselves from
these health risks through proper workplace design, good posture while at the computer,
and appropriately spaced work breaks. Another health risk, called computer addiction,
occurs when someone becomes obsessed with using the computer. Once recognized,
computer addiction is a treatable disorder.

4. Public Safety

Adults, teen, and children around the world are using computers to share publicly
their photos, videos, journals, music, and other personal information. Some of these
unsuspecting, innocent computer users have fallen victim to crimes committed by
dangerous strangers. Protect yourself and your dependents from these criminals by being
cautious. For example, do not share information that would allow others to identify or
locate you.

5. Impact on Environment

Computer manufacturing processes and computer waste are depleting natural


resources and polluting the environment. The amount of resources required to
manufacture a personal computer equals that of a mid-sized car. When computers are
discarded in landfills, they release toxic materials and potentially dangerous levels of
lead, mercury, and flame retardants. Strategies that can help protect the environment
include recycling, regulating manufacturing processes, extending the life of computers,
and immediately donating replaced computers.
SELF-CHECK NO. 1.1-1

A. IDENTFICATION
Direction: Identify the Precautions and Procedures write TRUE if the statement
is correct and FALSE if the statement is wrong.

1. Failure to do the proper jumper setting may cause damage to your CPU.
2. After adding and removing any other system components, make sure that
you unplug your power supply.
3. Test the computer, ensuring that it meets the necessary system
requirements before booting up.
4. With an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
5. After starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.

B. MATCHING TYPE

Direction: Select your answer on the choices below that will correspond on the
statement. Write the letter of your answer on the space provided.

A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force

1. Computer manufacturing processes and computer waste are depleting


natural resources and polluting the environment.
2. Although computers have improved productivity in many ways and
created an entire industry with hundreds of thousands of new jobs, the
skills of millions of workers and managers have been replaced by
computers.
3. It is crucial that personal and confidential records be protected properly.
4. Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal
information.
5. Prolonged or improper computer use can lead to injuries or disorders of
the hands, wrists, elbows, eyes, necks, and back.

You might also like