Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

5

WEB PROGRAMMING
Module 2 - Grade 11/ICT Quarter 2

CVE Colleges, INC.


Web Programming
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Greetings!

This module contains training materials and activities for you to finish. You are required to go through a
series of learning activities. If you have questions, don’t hesitate to ask your teacher for assistance.

This will give you the opportunity to develop your knowledge, hone your skills, behavior and
motivations required in Installing and Configuring Computer Systems that is in line with the industry
standards. You need to complete this module before you can perform the next module.

HOW TO USE THIS MODULE

The unit of competency, “Install and Configure Computer Systems“, is one of the competencies
of Computer Systems Servicing NCII, a course which comprises knowledge, skills and attitudes required
for a trainee to possess.

In this module, you are required to go through a series of learning activities in order to complete
each learning outcome. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets
and Task/Job Sheets. Follow and perform the activities on your own. If you have questions, do not
hesitate to ask for assistance from your teacher.

Remember to:

1. Work through all the information and complete the activities in each section.
2. Read information sheets and complete the self-check. Suggested references are included to
supplement the materials provided in this module.

1
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

3. Most probably, your trainer will also be your supervisor or manager. He is there to support you
and show you the correct way to do things.
4. You will be given plenty of opportunities to ask questions and practice on the job. Make sure
you practice your new skills during regular work shifts. This way, you will improve your speed,
memory and your confidence.

Introduction

This module is designed to equip you the TVL Open High School Learners with essential Knowledge,
Skills, and Attitude in performing the tasks on Computer System Servicing which will lead you to
acquire National Certificate Level II.

This module includes information and activities to develop desirable values, skills and understanding
through step-by-step procedures and helpful techniques that will guide you on how to install and
configure computer systems. Furthermore, applications to real life situations are also included for
lifelong learning.

What to Learn in this Module?


At the end of the lesson, you’re expected to:

1. Assemble computer hardware.


2. Prepare installer.
3. Install operating system and driver for peripherals/devices.
4. Install application software.
5. Conduct test and documentation.

Pre-Test
What I Know?

2
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

1. What does BIOS stand for?

a. Basic input output system


b. Basic induct online system
c. Basic industry online standards
d. Basic insulator open source

2. CPU is the _____________ of the computer.

a. mother
b. system
c. brain
d. process

3. What cable is used to connect PC to switch hub and router?

a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable

4. Is the hardware in a computing device where the operating system (OS), application programs and
data in current use are kept so they can be quickly reached by the device's processor.

a. RAM
b. Operating system
c. CPU
d. HDD

5. What RAM stands for?

a. Random Access Memory

3
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

b. Random Autonomous Memory


c. Read Action Memory
d. Rare Ally Memory

6. Identify the malwares.


a. trojan
b. virus
c. spyware
d. all of the choices

7. An example of super computer is :


a. MP3 players
b. Desktop
c. Cell phones
d. Mainframe computers

8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent

9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard

10. USB stands for

4
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

a. Universal Serial Bus


b. University Serial Bus
c. Universal Serial Body
d. Universal Series Bus

11. What is this?


a. Mouse
b. Speakers
c. Keyboard
d. Monitor
Commons.wikimedia.org

12. What is this?


a. CPU
b. Modem
c. Internet
Commons.wikimedia.org
d. Cable

13. What is this?

a. Malware
b. Software
c. Hardware
d. People

5
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

14. OS stands for

a. Onsite Software
b. Operating System
c. Only Read Software
d. On-demand System

15. What is this?


a. CPU
b. Processor
c. System Unit
d. PC

Definition of Terms

CPU-Central processing unit; the brain of the computer; controls the other elements of the computer

Disk Drive-A peripheral device that reads and/or writes information on a disk

Hard Drive-A device (usually within the computer case) that reads and writes information, including the
operating system, program files, and data files

Keyboard-A peripheral used to input data by pressing keys

Modem-A peripheral device used to connect one computer to another over a phone

line

Monitor-A device used to display information visually

Mouse-A peripheral device used to point to items on a monitor

6
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Printer-A peripheral device that converts output from a computer into a printed image

Browser-A program used to view World Wide Web pages, such as Netscape Navigator or Internet
Explorer

Driver-Software program that controls a piece of hardware or a peripheral

Icon-A small picture used to represent a file or program in a GUI interface

Internet-A network of computer networks encompassing the World Wide Web, FTP, telnet, and many
other protocols

URL-Uniform resource locator; the address of a site on the World Wide Web; a standard way of locating
objects on the Internet

Virus-A deliberately harmful computer program designed to create annoying glitches or destroy data

Window-A screen in a software program that permits the user to view several programs at one time

7
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

What I Need To Know?

Read Information Sheet No 1.1-1 and find out how much you can remember.

Do Self-Check 1.1-1 to know how much you have learned.

Lesson Information 1.1-1

OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES Learning Objectives:


After reading of this Information Sheet, you should be able to:

1. Identify the basic precautions and procedures in planning, preparing, installing and testing of
computer hardware and software.

2. Determine the effects of computers to the people, health risk, and to the environment.

During installation and initial test, careful planning and preparation are to be done. To avoid
personal injury and damages to wiring due to sharp pins on connectors and printed circuit assemblies,
rough chassis edges and corners, and hot components.

Adhere to warnings and limitations regarding accessibility into areas designated only for
authorized technical personnel.

8
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

SOME BASIC PRECAUTIONS AND PROCEDURES:

o Before starting the installation, read carefully the documentation and procedures on any
hardware and software settings that may be required.

o Failure to do the proper jumper setting may cause damage to your CPU.
o Without an effective cooling fan, the CPU can overheat and cause damage to both CPU and the
motherboard.

o Each bank must have the same size and type of memory installed in pairs.
o Before adding and removing any other system components, make sure that you unplug your
power supply. Failure to do so may cause damage to your motherboard and in the system
component.
o Test the computer, ensuring that it meets the necessary system requirements before booting
up.

o If the computer does not pass any of the power on self-test (POST), the computer will receive an
irregular power on self-test. An irregular POST is a beep code which is different from the
standard beep which can either be no beeps at all or a combination of different beeps.

EFFECTS OF COMPUTERS

Some effects of computers relating to the violation of privacy, the impact on the labor force,
health risks, and the impact on the environment.

1. Violation of Privacy

9
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Nearly every life event is stored in a computer somewhere--in medical records, credit reports,
tax records, etc. It is crucial that personal and confidential records be protected properly. In many
instances, where these records were not properly protected, individuals have found their privacy
violated and identities stolen.

2. Impact on Labor Force

Although computers have improved productivity in many ways and created an entire industry
with hundreds of thousands of new jobs, the skills of millions of workers and managers have been
replaced by computers. Thus, it is crucial that workers keep their education up-to-date. A separate
impact on the labor force is that some companies are outsourcing jobs to foreign countries instead of
keeping their homeland labor force employed.

3. Health Risks

Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists,
elbows, eyes, necks, and back. Computer users can protect themselves from these health risks through
proper workplace design, good posture while at the computer, and appropriately spaced work breaks.
Another health risk, called computer addiction, occurs when someone becomes obsessed with using the
computer. Once recognized, computer addiction is a treatable disorder.

4. Public Safety

10
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Adults, teen, and children around the world are using computers to share publicly
their photos, videos, journals, music, and other personal information. Some of these unsuspecting,
innocent computer users have fallen victim to crimes committed by dangerous strangers. Protect
yourself and your dependents from these criminals by being cautious. For example, do not share
information that would allow others to identify or locate you.

5. Impact on Environment

Computer manufacturing processes and computer waste are depleting natural resources and
polluting the environment. The amount of resources required to manufacture a personal computer
equals that of a mid-sized car. When computers are discarded in landfills, they release toxic materials
and potentially dangerous levels of lead, mercury, and flame retardants. Strategies that can help protect
the environment include recycling, regulating manufacturing processes, extending the life of computers,
and immediately donating replaced computers.

11
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

A. IDENTFICATION
Direction: Identify the Precautions and Procedures write TRUE if the statement is correct and
FALSE if the statement is wrong.

1. Failure to do the proper jumper setting may cause damage to your CPU.
2. After adding and removing any other system components, make sure that
you unplug your power supply.
3. Test the computer, ensuring that it meets the necessary system
requirements before booting up.
4. With an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
5. After starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.

B. MATCHING TYPE

Direction: Select your answer on the choices below that will correspond on the statement.
Write the letter of your answer on the space provided.

A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force

1. Computer manufacturing processes and computer waste are depleting natural


resources and polluting the environment.

12
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

2. Although computers have improved productivity in many ways and created an


entire industry with hundreds of thousands of new jobs, the skills of millions of
workers and managers have been replaced by computers.

3. It is crucial that personal and confidential records be protected properly.


4. Adults, teen, and children around the world are using computers to share publicly their
photos, videos, journals, music, and other personal information.

5. Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, necks, and back.

Lesson Information 1.1-2


LEARNING OBJECTIVES:

After reading this Information Sheet, you should be able to:

1. Prepare the required documents or forms before you do a well-planned installation

2. Identify the qualifications to be a certified hardware professional so that you could be allowed
and authorized to do a well-planned installation

REQUIRED DOCUMENTS/FORMS

A. Job Order- (sometimes job ticket or work ticket, as it often has some type of ticket attached) is an
order received by an organization from a customer or client, or an order created internally within
the organization. A work order may be for products or services.

13
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

the quantity of the product to be manufactured, built or fabricated o the amount of raw material to be
used, its price and amount the types of labor required, rate (per hour or per unit) and amount the
machine utilization for each machine during the routing process, its rate and amount

Sample Job Order Form

Computer Repair Job Order Form

Teacher Client’s Name School Alubijid NCHS


Date July 27, 2020 Computer # 001
Service Tag# 001 Model Intel i3
Serial # 4737Z
Computer Problem: (Brief Description of the Problem)

***Blue Screen Error***

For Technical Department Used Only


Fax No. (02)922-5566
Computer Fixed By: Alexis V. Larosa
Date Sent Back to School: ________________
Memory Transcend 2 GHz Processor Pentium Dual-Core 2 GHz
Hard Drive Space Hitachi Sata 80 Gig Windows Windows 7 Ultimate

14
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

B. Request Form and Report Sheet


Computer Hardware Servicing maintenance, which includes planned installation, main objective
is to keep and improve production facilities, to keep and improve production facilities stable and
efficient at the lowest life cycle cost with the active participation of all members in the company. A
Request Form is used to put this objective into action. And the Report Sheet and Request Form bring
to life this maintenance’s purposes which are:

o To increase productivity through maximum utilization and improvement of all equipment

o To develop maintenance system to reduce life cycle cost of machinery and equipment
through the involvement of everybody in the organization o To develop the operator’s
capability to be competent in maintenance activities through education, training and
motivation.

o To enhance capability for advanced and sophisticated technology that would reinforce
competitive power.
Sample Request Form

Description: Acer Aspire 4736Z Laptop Computer


UNIT NO. 5-2

Observation/s:

***Corrupted Operating System*** Date Reported: January 1,


2020

15
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Reported by:
Alexis V. Larosa
Activity: Reformat Laptop

Date Completed: July 27, 2020

Signed: ______________________

Sample Report Sheet

Repair Report Sheet

Area/Section: ANCHS Computer Laboratory

Facility Type Nature of Breakdown Recommendation

Laptop No Operating Viral Corruption Refer to the Technical


System Error Department for
Reformatting of the
Operating System

Reported by: Marybel A. Guinitaran

Date: March 27, 2020

16
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

REQUIRED QUALIFICATION FOR A COMPUTER HARDWARE PERSONNEL:

What Qualifications Do You Need to Become a PC Repair Technician?

Education

Employers prefer applicants who have completed and pass the National Certification Exam II (NC
II) from any DepEd School, vocational training institute or similar setting. Some employers require at
least a high school diploma.

Certifications

Trainees can take the TESDA NC II Computer System Servicing assessment to demonstrate their
competency for entry-level jobs to employers. The Technical Education and Skills Development
Authority or TESDA offers a variety of certification programs. In addition, technicians can achieve
certifications even for trainer ship.

Physical and Personal Traits

PC technicians must be able to squat, bend and reach to access the computer equipment
requiring repair. They should be physically able to lift computer components. Employers want
technicians who think analytically, are organized and pay attention to detail. They should feel
comfortable working under tight deadlines, and companies may expect them to work overtime or on
weekends.

Knowledge and Skills


17
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Applicants should know how to use a variety of standard office software, and some jobs also require
knowledge of networking. Companies prefer candidates with previous PC repair experience
(Immersion), and they may look for candidates with experience repairing specific brands of computers.
Technicians need strong oral communication skills and should be able to explain their findings to
customers using common terms.

SELF-CHECK NO. 1.1-2

A. TRUE OR FALSE
Direction: Precautions and Procedures. Write TRUE if the statement is correct and FALSE if the
statement is wrong.

_________ 1. Anyone can perform a planned installation as long as he knows it.

_________ 2. The Department of Education facilitates the competency assessment


for computer technicians.

__________3. Computer Technicians are given the TESDA NC II Computer Systems Servicing by TESDA
after successfully taking the Assessment.

_________ 4. Computer Technicians need not to have strong oral communication skills for they only
repair computers.

__________5. Companies prefer candidates with previous PC repair experience and they may look for
candidates with experience repairing specific brands of computers.

18
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

What I Need To Know?

Read Information Sheet No 1.1-3 and find out how much you can remember. Do Self-
Check 1.1-3 to know how much you have learned.

LEARNING OBJECTIVES:

After reading this Information Sheet, you should be able to:

1. Identify fundamentals of Operating Systems


2. Determine the different types of operating systems

FUNDAMENTALS OF OPERATING SYSTEM

An Operating System (OS) is a set of programs that manage computer hardware resources and
provide common services for application software. The operating system is a vital component of the
system software in a computer system. Application programs require an operating system which are
usually separate programs but can be combined in simple systems. Operating systems are found on
almost any device that contains a computer from cellular phones and video game consoles to
supercomputers and web servers.

19
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

TYPES OF OPERATING SYSTEMS:

Real-time
A real-time operating system is a multitasking operating system that aims at executing real-time
applications. The main objective of real-time operating systems is their quick and predictable response
to events. They have an event-driven or time-sharing design and often aspects of both.

Multi-user
A multi-user operating system allows multiple users to access a computer system concurrently.
Single-user operating systems, as opposed to a multi-user operating system, are usable by a single user
at a time. Being able to use multiple accounts on a Windows operating system does not make it a multi-
user system. Rather, only the network administrator is the real user.

Multi-tasking vs. Single-tasking


When only a single program is allowed to run at a time, the system is grouped under a single-
tasking system. However, when the operating system allows the execution of multiple tasks at one time,
it is classified as a multi-tasking operating system.

Distributed

20
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

A distributed operating system manages a group of independent computers and makes them
appear to be a single computer. The development of networked computers that could be linked and
communicate with each other gave rise to distributed computing. Distributed computations are carried
out on more than one machine. When computers in a group work in cooperation, they make a
distributed system.

Embedded
Embedded operating systems are designed to be used in embedded computer systems. They are
designed to operate on small machines like PDAs with less autonomy. They are able to operate with a
limited number of resources. They are very compact and extremely efficient by design.

EXAMPLES OF OPERATING
SYSTEMS
DOS

DOS (Disk Operating System) was the first widely


installed operating system for personal
computers. It is a master control program that is Commons.wikimedia.org
automatically run when you start your PC. DOS stays in
the computer all the time letting you run a program and manage files. It is a single-user operating
system from Microsoft for the PC.

UNIX

UNIX operating systems are used in widely-sold workstation products from Sun Microsystems,
Silicon Graphics, IBM, and a number of other companies. The UNIX environment and the
client/server program model were important elements in the development of the Internet and the
reshaping of

21
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Mac OS X

LINUX

SELF-CHECK NO. 1.1-3

A. IDENTIFICATION
Direction: Write TRUE if the statement is correct and FALSE if the statement is wrong.

________1) An operating system is a set of programs that manage computer hardware resources and
provide common services for application software.

________2) Operating system is not a vital component of the system software in a computer system.
Application programs require an operating system which are usually separate programs,
but can be combined in simple systems.

________3) Time-sharing operating systems schedule time for efficient use of the system and may also
include accounting for cost allocation of processor time, mass storage, printing, and
other resources.

________4) For software functions such as input and output and memory allocation, the operating
system acts as an intermediary between application programs and the computer
hardware.

________5) Operating systems are found on almost any device that contains a computer—from cellular
phones and video game consoles to supercomputers and web servers

What I Need To Know?

Read Information Sheet No 1.1-4 and find out how much you can remember. Do Task Sheet
1.1-4 to know how much you have learned.

22
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

LEARNING OBJECTIVES:

After reading this Information Sheet, you should be able to:

1. Classify of the hardware and software components of a computer with its corresponding
functions.
2. Determine the various computer components and peripherals
Basic Hardware Components of Computer System

A computer is an electronic machine, operating under the control of instructions stored in its
own memory, that can be programmed to accept data (input), process it into useful information
(output), and store it away in a secondary storage device (store) for safekeeping or later reuse. The
processing of input into output is directed by the software but performed by the hardware. Figure below
shows some common computer hardware components

23
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Commons.wikimedia.org

Common Computer Hardware Components

Computer system hardware components include devices that perform the functions of input,
processing, data storage; output and communication. The devices responsible for these five areas are as
follows:

Input devices. Input devices allow you to enter data or commands in a form that the computer can use;
they send the data or commands to the processing unit. Commonly used input devices include
keyboard, mouse, microphone, scanner, digital camera, and PC camera.

Output devices. Output devices show people the processed data--information --in understandable and
useful form. Four commonly used output devices are a printer, a monitor, speakers, and a portable
24
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

media player. Input/output devices are playing an increasingly significant role in our lives. The number
and variety of input/output devices are expanding.

Processing devices. Processing devices are the computer electronic circuitry housed in the system unit.
The processor, formally known as the central processing unit (CPU), has electronic circuitry that
manipulates input data into the information people want. Computer instructions are actually are
executed in the central processing unit. Memory is a series of electronic elements that temporarily holds
data and program instructions while they are being processed by the CPU. Both the processor and
memory consist of chips. A chip is an electronic device that contains many microscopic pathways
designed to carry electrical current.

Storage devices. Storage usually means secondary storage that can store data and programs outside the
computer itself. Storage devices hold data, information, and programs permanently. Common storage
devices include a hard disk, USB flash drives, CDs, DVDs, and memory cards.

Communications devices. Communications devices provide connections between the computer and
communications networks, and enable computer users to communicate and to exchange data,
information, and programs with other computers. Communications devices transmit these items over
transmission media such as cables, telephone lines, satellites, and cellular radio. A widely used
communications device is a modem.

In summary, we communicate with computers through input/output devices. Input devices


translate our data and communications into a form that the computer can understand. The computer
then processes these data, and an output device translates them back into a form we can understand.
The central processing unit manipulates data and controls the other parts of the computer system.
Memory (primary storage) temporarily stores data and program instructions during processing,
while secondary storage feeds data and instructions into the central processor and stores data for future
use.
The system unit is a box-like case that houses the processor, memory and other electronic components
of the computer that are used to process data. All other computer system devices, such as the monitor,
keyboard, and mouse, are linked either directly or indirectly into the system unit.

25
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

The central processing unit (CPU), also called processor, interprets and carries out the basic instructions
that operate a computer. The CPU significantly impacts overall computing power and manages most of a
computer's operations. The processor is the device that executes program instructions.

The memory device is a package that holds temporarily data and program instructions during
processing.

An expansion card is a circuit board that adds devices or capabilities to the computer. Finally, devices
outside the system unit, such as a keyboard, mouse, monitor, printer, or microphone, are attached by a
cable to a port or connector on the system unit.

26
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

The motherboard, a single circuit board, provides the path through which the processor communicates
with memory components, other components, and peripheral devices.

Memory and storage sizes

While performing a processing operation, a processor needs a place to temporarily store


instructions to be executed and the data to be used with those instructions. Memory is also known as
primary storage or internal storage. This role of memory to store both data and programs is known as
the stored program concept. The size of memory is measured by the number of bytes available for use.
A kilobyte of memory is equal to exactly 1,024 bytes. To make storage definitions easier to identify,
computer users often round a kilobyte down to 1,000 bytes. A megabyte (MB) is equal to approximately
1 million bytes. A gigabyte (GB) equals approximately 1 billion bytes. A terabyte (TB) is equal to
approximately 1 trillion bytes.

27
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

The system unit contains two types of memory: volatile and nonvolatile. The contents of
volatile memory are lost when the computer power is turned off. In nonvolatile memory, the
combination of circuit states is fixed, and therefore the contents of nonvolatile memory are not lost
when power is removed from the computer.

28
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

Ports and Connectors

Serial port is a type of interface that connects a device to the system unit by transmitting data one bit at
a time.

Parallel ports allow the parallel transmission of


data; that is, several bits are transmitted simultaneously.

USB (Universal Serial Bus) ports are used in high-speed


device interfaces.

FireWire ports, also called IEEE 1394 port, are similar to


the USB port and can connect multiple types of devices.

29
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: cvecolleges.official@gmail.com

30
PREPARED BY: JELLIE ANN A. DAYAWON

You might also like