COMPETENCY-BASED LEARNING MATERIALS
Sector: Electronics
Qualification Title: Computer System Servicing NC II
Unit of Competency: Install and Configure Computer Systems
Module Title: Installing and Configuring Computer Systems
Developed by: ICGI Trainer
Technical Education & Skills Development Authority
I Connect Global Institute, Inc.
Ocampo, Camarines Sur
HOW TO USE THIS COMPETENCY-BASED LEARNING
MATERIALS
Welcome to the module “Installing and Configuring Computer
Systems”. This module contains training materials and activities for you to
complete.
The unit of competency “Install and Configure Computer Systems”
contains the knowledge, skills and attitudes required for Computer System
Servicing required to obtain the National Certificate (NC) level II.
You are required to go through a series of learning activities in order to
complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets. Do these activities on your own and
answer the self-checks at the end of each Information Sheet. You also have
to perform the Operation/Task/Job Sheets and afterwards, you have to
evaluate your own performance using the performance criteria checklists.
If you have questions, don‟t hesitate to ask your Trainer for assistance.
Recognition of Prior Learning (RPL)
If you have already some knowledge and skills covered in this module
because you have been working for some time; or already completed training
in this area; or if you can demonstrate competence to your Trainer in a
particular skill, talk to your Trainer so you don‟t have to undergo the same
training again. If you have a qualification or Certificate of Competency from
previous trainings show it to him/her. If the skills you acquired are
consistent with and relevant to this module, they become part of the
evidence. You can present these for RPL. If you are not sure about your
competence skills, discuss this with your Trainer.
After completing this module, ask your Trainer to assess your
competence. Result of your assessment will be recorded in the Achievement
Chart/Progress Chart. All the learning activities are designed for you to
complete at your own pace.
In this module, you will find the activities for you to complete and
relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.
This module is prepared to help you achieve the required competency, in
receiving and relaying information. This will be the source of information
that will enable you to acquire the knowledge and skills in Installing and
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Configuring Computer Systems independently at your own pace with
minimum supervision from your Trainer.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Computer Hardware Servicing NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Competency Module Title Code
Installing and
Install and Configure ELC724331
1. Configuring Computer
Computer Systems
Systems
Set-up Computer Setting-Up Computer ELC724332
2.
Networks Networks
Set-up Computer Setting-Up Computer ELC724333
3.
Servers Servers
Maintain and Repair Maintaining and
ELC724334
4. Computer Systems and Repairing Computer
Networks Systems and Networks
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
MODULE CONTENT
UNIT OF COMPETENCY: Install and Configure Computer Systems
MODULE TITLE: Installing and Configuring Computer
Systems
MODULE DESCRIPTOR: This unit covers the outcomes required in
installing and configuring desktop and
workstation computers systems. It
consists of competencies to assemble
computer hardware, install operating
system and drivers for
peripherals/devices, and install
application software as well as to conduct
testing and documentation.
NOMINAL DURATION: 40 Hours
LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able
to:
LO1. Assemble computer hardware
LO2. Prepare installer
LO3. Install operating system and drivers for peripherals/ devices
LO4 Install application software
LO5 Conduct testing and documentation
LEARNING OUTCOME NO. 1
Assemble Computer Hardware
ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies
and procedures are followed in accordance with systems
requirements
2. Materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
4. Computer hardware is assembled in accordance with established
procedures and systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in
accordance with hardware requirements
Contents:
1. Environmental and Safety procedures
2. Basic terms, concepts, functions and characteristics of PC
hardware components
3. Familiarization with the various computer systems‟ components
and peripherals
4. Identification of required materials
5. Tools, equipment and testing devices
6. Computer assembly procedures
7. POST and BIOS configuration/ settings of computer systems and
devices
Conditions
The students/trainees must be provided with the following:
1. Personal Protective eyewear
2. Computer hardware
3. Wire stripper with bolt cutter
4. Assorted Pliers
5. Assorted Screw drivers
6. Soldering iron
7. Desoldering tool
8. Allen wrench (0.5-0.25 inch)
9. IC insertion/ extraction tool
10. RS 232 pin insertion/extraction tool
11. LAN tester
12. Crimping Tool
13. Sharp pointed tweezers
14. Antistatic Wrist strap
15. Flashlights
16. Mirror (inspection)
17. Hand-outs
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.1-1
OCCUPATIONAL HEALTH AND SAFETY (OHS)
Learning Objective: after reading this information sheet, you must be able to:
1.) Explain the Occupational Health and Safety in your computer related
works including dealing with electrical components of a computer.
INTRODUCTION:
Occupational Safety and Health (OSH) also commonly referred to as
Occupational Health and Safety (OHS) or Workplace Health and Safety
(WHS) is an area concerned with the safety, health and welfare of people
engaged in work or employment. The goals of occupational safety and health
programs include to foster a safe and healthy work environment. OHS may also
protect co-workers, family members, employers, customers, and many others
who might be affected by the workplace environment. In the United States the
term occupational health and safety is referred to as occupational health and
occupational and non-occupational safety and includes safety for activities
outside of work.
Occupational Health and Safety can be important for moral, legal, and
financial reasons because Good OHS practices can also reduce worker injury
and illness related costs, including medical care, sick leave and disability
benefit costs.
What is OHS and why is it necessary?
OHS or OH&S stands for Occupational Health and Safety, it is a cross-
disciplinary area concerned with protecting the safety, health and welfare of
people engaged in work or employment.
OHS relating to Installing computer systems and networks:
1. Safety on handling computer components and devices
2. Safety on connecting power connectors
3. Check the proper voltage for every device.
4. Check the electrical connection for faulty wirings.
5. Use power surge protector or suppressor.
6. Use proper screw and screwdrivers for each component.
7. Hold CPU components and CD‟s/DVD‟s on its edges or in its bracket.
8. Put extra care in dismantling and returning the IO shield.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Safety Precautions Dealing with Electrical Components of Computer
1.) Disconnect all power before:
Performing a hardware inspections
Attempt directly to internal and external computer components
Working power supply
Removing or installing main units
2.) Before starting work, unplug the power cord.
3.) Never assume that power has been disconnected from a circuit. First,
check that it has been powered-off.
4.) Always look carefully for possible hazards in your work
Moist floors
Non-grounded power extension cables
Power surges
5.) Discharge static electricity
6.) If an electrical accident occurs:
Use caution
Switch off power
Send another person to get medical aid
Safety Inspection Guide
These steps will help you to identify potentially unsafe conditions of the
hardware components:
Check exterior covers for damage (loose, broken, or sharp edges)
Power-off computer. Disconnect the power cord.
The power cord should be the appropriate type.
Insulation on the power cord must not be frayed or worn out.
Remove the cover.
Check for any obvious alteration. Use good judgment as to the safety
of any alterations.
Check for worn out, frayed or pinched cables.
Check that the power-supply cover fasteners (screws or rivets) have
not been removed or tampered with.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
OHS for effective computer troubleshooting
Follow the three most important things below:
1. What you wear might save you!
2. Electro-Static Discharge (ESD) is not your best friend!
3. Working Safely with Electricity!
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.1-2
HAND TOOLS
Side Cutter Pliers – a tool used for cutting or trimming of
connecting wires or terminal leads in the circuit board
Long nose Pliers – Used for holding, bending and stretching
the lead of electronics component or connecting wire.
Crimping Tool- a tool made of metal with plastic-rubber
handle, to press into small folds, to frill, to corrugate.
Tweezers- a tool use to hold small sensitive part of a
computer.
Cutter- a tool used in cutting wires.
Flat Screw Driver – a tool used to drive or
fasten negative slotted screws
Philips Screw Driver- a tool used to drive or
fasten positive slotted screws.
Flashlight- a small electric light, a flash of
electric light used to give light in dark
conditions.
Paint Brush- a device made of bristles set in
handle, use for cleaning sensitive parts of a
computer.
Magnifying glass- a device made in glass with
handle, to exaggerate or to increase the apparent
size of an object.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Volt-Ohms-Millimeter (VOM) - A measuring instrument
used by technician for measuring: current, voltage,
resistance
LAN Tester- is a device used to test the network connection.
Anti--Static Wrist wrap- is a device used to
eliminate electrostatic discharge in your work area.
Soldering Pencil – a tool used to join two or more
metal conductors with the support of soldering lead
melted around it.
Desoldering Tool – a tool used to unsoldered
unwanted parts or component in the circuit
with the support of soldering pencil
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.1-3
PERSONAL PROTECTIVE EQUIPMENT
Learning Objective: after reading this information sheet, you must be able to:
1.) Discuss and explain the Personal Protective Equipment in your computer
related works.
INTRODUCTION:
Personal protective equipment (PPE) refers to protective clothing, helmets,
goggles, or other garment designed to protect the wearer's body from injury by
blunt impacts, electrical hazards, heat, chemicals, and infection, for job-related
occupational safety and health purposes, and in sports, martial arts, combat,
etc.
To protect anyone from danger by working any electrical activities, protective
equipment such as safety shoes, goggles, hard hats, and gloves are issued. The
use of this equipment is mandatory on certain activity. Their use is a MUST,
and there is no question about that. Be sure to USE THEM on any designated
activity WHERE they are REQUIRED. They can protect you from a lot of harm.
Importance of Personal Protective Equipment‟s:
The type of personal protective equipment (PPE) needed when using hand
tools depends on the nature of the task. At a minimum, eye protection
should always be worn.
The use of hand protection may also be appropriate to provide protection
against cuts, abrasion, and repeated impact.
The purpose of personal protective equipment is to reduce exposure to hazards
in a workplace. PPE is needed when there are hazards present.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Categories of Personal Protective Equipment
Eye and Face Protection –This will be used to avoid being exposed to a large
number of hazards that pose danger to their eyes and face. Then to ensure that
workers have appropriate eye or face protection if they are exposed to eye or
face hazards from flying particles, molten metal, liquid chemicals, acids or
caustic liquids, chemical gases or vapors, potentially infected material or
potentially harmful light radiation.
Safety spectacles. These protective eyeglasses have safety frames
constructed of metal or plastic and impact-resistant lenses. Side shields
are available on some models.
Goggles. These are tight-fitting eye protection that completely cover the
eyes, eye sockets and the facial area immediately surrounding the eyes
and provide protection from impact, dust and splashes. Some goggles will
fit over corrective lenses.
Face shields. These shields protect against nuisance dusts and potential
splashes or sprays of hazardous liquids but will not provide adequate
protection against impact hazards. Face shields used in combination
with goggles or safety spectacles will provide additional protection against
impact hazards.
Foot and Leg Protection Used for possible foot or leg injuries from the Moist
floors, Non-grounded Power Extension cables and Power Surge that you might
get a serious injuries.
Safety shoes Safety shoes to be used electrically conductive to prevent
the buildup of static electricity in areas with the potential for explosive
atmospheres or nonconductive to protect workers from workplace
electrical hazards.
Hand and Arm Protection - If a workplace hazard assessment reveals that
workers face potential injury to hands and arms that cannot be eliminated
through work activity and practice controls. Working Gloves with a plastic
rubber is one of the examples of Hand and Arm Protection Equipment‟s that
usually used in any electrical working activities.
Body Protection – This is used to protect possible bodily injury in the work
place, workers must wear appropriate body protection while performing their
jobs. In addition to cuts and radiation and avoid some electrical charges leaks
that cannot be eliminated.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Personal Protective Equipment includes:
1. Safety Precautions
2. Preventive Maintenance
3. Protective Devices
4. Accident Reports
Safety precautions
Proper preparation is the key to a successful built. Before you begin, make sure
that you have the tool you will need, and secure a clear well-lit workplace.
Gather all the components you‟ll be using and unpack them at the same time.
Find a dry, well-ventilated place to do your work, you should choose an area
without carpets, because it tends to create static electricity. Always keep in
mind that personal protection is one of the traits of a good technician.
Preventive Maintenance
Maintenance is keeping something in working order. It includes repair, testing,
adjusting, and replacing parts of a computer or a peripheral.
Types of Maintenance
Active
Passive
Accident reports
Forms used to give specific details with regards to the accidents happed in the
laboratory during experiments.
Accident reports contain the following details:
Name of the person injured
Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents
Other Personal Protective Devices
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
1. Anti-Static Devices
2. Power Surge Protector Devices
Anti-Static devices - These are the devices used to protect computer units
from electro static discharge.
Anti-static Wrist Strap – or ESD wrist strap,
or ground bracelet is an antistatic device used
to safely ground a person working on very
sensitive electronic equipment, to prevent the
buildup of static electricity on their body, which
can result in electrostatic discharge (ESD).
Anti-static Mat - An antistatic floor mat or
ground mat is one of a number of antistatic
devices designed to help eliminate static
electricity. It does this by having a controlled
low resistance: a metal mat would keep parts
grounded but would short out exposed parts;
an insulating mat would provide no ground
reference and so would not provide grounding.
Anti-static Bag - is a bag used for shipping
(usually electronic) components, which are prone
to damage caused by electrostatic discharge.
An electrostatic-sensitive device (ESD) is any component which can be
damaged by common static charges which build up on people, tools, and other
non-conductors or semiconductors. ESD commonly also stands for
electrostatic discharge.
As electronic parts like computer central processing units (CPUs) become
packed more and more densely with transistors the transistors shrink and
become more and more vulnerable to ESD.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Power Surge Protector Devices - is designed to protect electrical devices from
voltage spikes. A surge protector attempts to limit the voltage supplied to an
electric device by either blocking or by shorting to ground any unwanted
voltages above a safe threshold.
Automatic Voltage Regulators (AVR) - is
designed to automatically maintain a
constant voltage level. A voltage regulator
may be a simple "feed-forward" design or may
include negative feedback control loops. It
may use an electromechanical mechanism, or
electronic components. Depending on the
design, it may be used to regulate one or
more AC or DC voltages.
Uninterruptible Power Supply (UPS) - is an
electrical apparatus that provides emergency
power to a load when the input power source,
typically mains power, fails. A UPS differs
from an auxiliary or emergency power system
or standby generator in that it will provide
near-instantaneous protection from input
power interruptions, by supplying energy
stored in batteries, super capacitors, or
flywheels. The on-battery runtime of most
uninterruptible power sources is relatively
short (only a few minutes) but sufficient to
start a standby power source or properly shut
down the protected equipment.
A UPS is typically used to protect hardware such as computers, data
centers, telecommunication equipment or other electrical equipment
where an unexpected power disruption could cause injuries, fatalities,
serious business disruption or data loss.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.1-4
COMPONENTS OF A COMPUTER SYSTEM AND PERIPHERAL
DEVICES
Learning Objectives: After reading this information you must be able to
identify the different components of a computer system and its peripheral
devices.
Computer System
refers to a computer and all of the input, output, (peripherals) and
storage devices that are connected to it.
Personal Computer System or simply a Personal Computer (PC) is a type of
computer that is designed to be used by a single person at a time. This type of
computer is also known as Desktop Computer.
Classification of System Components:
Input Device:
Usually a keyboard and mouse, the input device is the device through
which data and instructions are entered.
Output Device:
A monitor, printer, or other device that lets you see what the computer
has accomplished.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
This section briefly examines all the components in a modern PC system
unit.
Here are the most important components needed to assemble
a basic modern PC system and make it
functional:
Monitor (display)
o In most systems, the monitor is
housed in its own protective
case, separate from the system
case and chassis. Monitors are
generally classified by three major criteria: diagonal size in inches,
resolution in pixels, and refresh rate in hertz (Hz). Desktop
monitors usually range from 14” to 21” diagonal measure.
1. CRT (Cathode Ray Tube)
2. LCD (Liquid Crystal Display)
Keyboard: The keyboard is the primary device on a
PC that is used by a human being to communicate
with and control a system.
Mouse a device that enabled a user to
point at or select items that were
shown on the screen.
The following are the additional components of a PC system. This means
that an already fully-functional PC system can stand on its own even without
these components.
CD-ROM, CD-R, or DVD-ROM drive
a. CD- (Compact Disc) and
DVD- (Digital Versatile
Disc) ROM (Read Only
Memory) drives are
relatively high capacity
removable media optical
drives. They are primarily a
read-only medium, which
means the drives can only
read information, and the
data on the discs cannot be altered or rewritten. There are
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
writable or rewritable versions of the discs and drives
available, but they are much more expensive than their read-
only counterparts, and therefore are not included
standard in most PCs. CD-ROM and DVD-ROM are the
most popular media for distributing software or large
amounts of data because they are very inexpensive when
produced in quantity and they can hold a great deal of
information.
Floppy drive
b. The floppy drive is a simple,
inexpensive, low capacity
removable media magnetic storage
device. For many years floppy
disks were the primary medium for
software distribution and system
backup. However, with the advent
of CD-ROM and DVD-ROM discs
as the primary method of installing or loading new
software in a system, and with inexpensive high capacity
tape drives for backup, the floppy drive is not used very
often in most modern systems, except perhaps by a
system builder, installer, or technician. Because the
floppy drive is the first device from which a PC attempts to
boot, it is still the primary method that is used for loading
initial operating systems‟ startup software and core
hardware diagnostics. Recent advancements in technology
have created new types of floppy drives with up to 120MB
or more of storage, making the drive much more usable
for temporary backups or for moving files from system to
system.
Sound card
c. Today‟s PC audio hardware
usually takes the form of an
audio adapter on an expansion
card that you install into a bus
slot in the computer. As with
video adapters, some systems
today include the audio hardware directly on the
motherboard. The adapter provides jacks for speakers, a
microphone, and sometimes other devices such as
joysticks and MIDI hardware. On the software side, the
audio adapter requires the support of a driver that you
install either directly from an application or in your
computer‟s operating system.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
MICROPROCESSOR AND ITS PROCESSES
Fetch - retrieves an instruction from program memory.
Decode - CPU fetches from memory is used to determine
what the CPU will be doing. In the decode step, the
instruction is broken up into parts for processing.
Execute - various portions of the CPU are connected so they
can perform the desired operation.
Writeback, returns the results of the execute step to memory. Very often the
results are written to some internal CPU register for quick access by
subsequent instructions. In other cases results may be written to slower, but
cheaper and larger, main memory.
Peripherals Devices
A peripheral is a type of computer hardware that is added to a host
computer, in order to expand its abilities. More specifically the term is
used to describe those devices that are optional in nature, as opposed to
hardware that is either demanded, or always required in principle.
The term also tends to be applied to devices that are hooked up
externally, typically though some form of computer bus like USB. Typical
examples include joysticks, printers and scanners. Devices such as
monitors and disk drives are not considered peripherals because they are
not truly optional, and video capture cards are typically not referred to as
peripheral because they are internal devices
Printers
A computer printer is a computer peripheral device that produces a hard copy
(permanent human-readable text and/or graphics, usually on paper) from data
stored in a computer connected to it.
Methods of image creation
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
The media for most printers is paper, so they are usually classified according to
the method of image creation:
Non-impact printing
Toner-based printers - Laser printers refer to the method used to adhere
toner to the media. The advent of cost-effective, precision lasers has made them
the dominant toner-based monochrome printer type for home and office
applications.
Ink jet printers - Ink jet printers spray very small, precise amounts
(usually a few picolitres) of ink onto the media. For color applications including
photo printing, ink jet methods are dominant.
Impact printers
Impact printers rely on a forcible impact to transfer ink to the media, similar to
typewriters, that are typically limited to reproducing text. A daisy wheel printer
is a specific type of impact printer where the type is carried on a wheel.
Dot-matrix printers - in the Dot
general sense many printers
rely on a matrix of pixels, or matri
dots, that together form the Laser x
larger image. However, the
term dot matrix printer is
printe printe
specifically used for impact r r
printers that use a matrix of Inkjet
small pins to create precise
dots. The advantage of dot- printe
matrix over other impact r
printers is that they can produce graphical images in addition to text; however
the text is generally of poorer quality than type-based impact printers. Dot
matrix printers are still commonly used in low-cost, low-quality applications
like cash registers. The fact that they use an impact printing method allows
them to be used to print multi-part documents using carbonless copy paper
(like sales invoices and credit card receipts), whereas other printing methods
are unusable with paper of this type. Dot-matrix printers have been superseded
for general computing use.
Scanners
A scanner is a device which analyzes a physical image (such as a photograph,
printed text, or handwriting) or an object (such as ornament) and converts it to
a digital image.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Most scanners today are variations on the desktop (or flatbed) scanner. Hand-
held scanners, where the device is moved by hand, were briefly popular but are
now not used due to the impossibility of obtaining a high-quality image. Both
these types of scanners use a CCD as the image sensor, whereas a drum
scanner uses a photomultiplier tube (PMT) as the image sensor.
Early scanners had parallel connections that could not go faster than 70
kilobytes/second. Professional models adopted the SCSI-II connection, which
was much faster (a few megabytes per second) albeit expensive, and frequently
requiring a dedicated expansion card to be put inside the host computer.
Recent economic models come equipped with USB connections. In its first
version, USB was capable of roughly 1 megabyte per second. Recent models
use USB 2.0 connections that can transfer about 40 megabytes per second,
eliminating the bottleneck.
Flatbed
Handheld scanner
image
scanners
Speakers
d. A computer speaker, also known as
multimedia speaker, is an external speaker
connected to a PC with built-in low power
amplifier for volume regulation. Basically, a
speaker is an electronic component that
converts electrical signal into actual sound.
Although PCs are originally released with an
external speaker capable of producing beeps
and tones it is still dependent on the external
speaker for quality sound output.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Parts and Functions of Computer System
Hardware
1. Casing - A computer case contains the
framework to support a computer‟s internal
components while providing an enclosure
for added protection. The size and layout of
a case is called a form factor.
types of cases
1. Desktop- slim line or full-size
2. Tower - mini or full-sized
Computer cases are referred to in a number of ways:
Computer chassis
Cabinet
Tower
Box
Housing
When choosing a computer case, consider the following:
Model type: There are two main case models. One type is for
desktop PCs, and the other is for tower computers. The type
of motherboard you choose determines the type of case that
can be used. The size and shape must match exactly.
Size: If a computer has many components, it needs more
room for airflow to keep the system cool.
Available space: Desktop cases allow space conservation in
tight areas, because the monitor can be placed on top of the
unit. The design of the desktop case may limit the number
and size of the components that can be added.
Power supply: You must match the power rating and
connection type of the power supply to the type of
motherboard you have chosen.
Appearance: Some people don‟t care how the case looks.
Others do. You have many case designs to choose from if you
want an attractive case.
Status display: What is going on inside the case can be very
important. LED indicators that are mounted on the front of
the case can tell you if the system is receiving power, when
the hard drive is being used, and when the computer is on
standby or sleeping.
The number of external or internal drive locations, called
bays
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Vents: All cases have a vent on the power supply, and some
have another vent on the back to help draw air into or out of
the system. Some cases are designed with more vents in the
event that the system needs a way to dissipate an unusual
amount of heat. This situation may occur when many
devices are installed close together in the case.
2. Power Supply - The power supply, shown in the
Figure below, converts alternating-current (AC)
power coming from a wall outlet into direct-
current (DC) power, which is a lower voltage. DC
power is required for all the components inside
the computer. It converts the 220v AC wall
current into the 3.3v, 5v, or 12v power that the
system requires for operation.
Connectors
Most connectors today are keyed connectors. Keyed connectors are
designed to be inserted in only one direction. Each part of the connector
has a colored wire with a different voltage running through it.
Note:
Different power supply form factors provide different power output connections,
depending on system requirements. AT form factors have been slowly phased out by
ATX form factor power supplies because of the different case sizes and advanced
features. ATXv12 was created to add power support for the motherboard by adding
another four-pin power connector.
Different connectors are used to connect specific components and
various locations on the motherboard:
A Molex connector is a keyed connector used to connect to an
optical drive or hard drive.
A Berg connector is a keyed connector used to connect to a floppy
drive. A Berg connector is smaller than a Molex connector.
A 20-pin or 24-pin slotted connector is used to connect to the
motherboard. The 24-pin slotted connector has two rows of 12 pins
each, and the 20-pin slotted connector has two rows of 10 pins
each.
A four-pin-to-eight-pin auxiliary power connector has two rows of
two to four pins and supplies power to all areas of the
motherboard. The four-pin-to-eight-pin auxiliary power connector
is the same shape as the main power connector, but smaller.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Older standard power supplies used two connectors called P8 and
P9 to connect to the motherboard. P8 and P9 were unkeyed
connectors. They could be installed backwards, potentially
damaging the motherboard or power supply. The installation
required that the connectors were lined up with the black wires
together in the middle.
3. Mother Board – The motherboard is the main printed circuit board. It
contains the buses, or electrical pathways, found in a computer. These
buses allow data to travel between the various components that
comprise a computer. A motherboard is also known as the system
board, backplane, or main board.
The motherboard accommodates the central processing unit (CPU),
RAM, expansion slots, heat sink/fan assembly, BIOS chip, chip set, and
the embedded wires that interconnect the motherboard components.
Sockets, internal and external connectors, and various ports are also
placed on the motherboard
The form factor of motherboards pertains to the board‟s size and shape.
It also describes the physical layout of the different components and
devices on the motherboard. Motherboards have various form factors:
Advanced Technology (AT)
Advanced Technology Extended (ATX)
Smaller footprint than Advanced Technology Extended (Mini-ATX)
Smaller footprint than Advanced Technology Extended (Micro-ATX)
Low-Profile Extended (LPX)
New Low-Profile Extended (NLX)
Balanced technology Extended (BTX)
An important set of components on the motherboard is the chip set.
The chip set is composed of various integrated circuits attached to the
motherboard that control how system hardware interacts with the
CPU and motherboard. The CPU is installed into a slot or socket on
the motherboard. The socket on the motherboard determines the type
of CPU that can be installed.
The chip set of a motherboard allows the CPU to communicate and
interact with the computer‟s other components and to exchange data
with system memory (RAM), hard-disk drives, video cards, and other
output devices. The chip set establishes how much memory can be
added to a motherboard. The chip set also determines the type of
connectors on the motherboard.
Most chip sets are divided into two distinct components, Northbridge
and Southbridge. What each component does varies from
manufacturer to manufacturer, but in general the Northbridge
controls access to the RAM, video card, and the speeds at which the
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
CPU can communicate with them. The video card is sometimes
integrated into the Northbridge. The Southbridge, in most cases,
allows the CPU to communicate with the hard drives, sound card,
USB ports, and other input/output (I/O) ports.
Parts of Motherboard
Motherboard Back Panel
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
4. Central Processing Unit - The central processing unit (CPU) is
considered the computer‟s brain. It is sometimes called the processor.
Most calculations take place in the CPU. In terms of computing power,
the CPU is the most important element of a computer system. CPUs come
in different form factors, each style requiring a particular slot or socket
on the motherboard. Common CPU manufacturers include Intel and
AMD.
The CPU socket or slot is the connector that is the interface between the
motherboard and the processor. Most CPU sockets and processors in use
today are built around the pin grid array (PGA) architecture, in which the
pins on the underside of the processor are inserted into the socket,
usually with zero insertion force (ZIF). ZIF refers to the amount of force
needed to install a CPU into the motherboard socket or slot. Slot-based
processors are cartridge- shaped and fit into a slot that looks similar to
an expansion slot.
The CPU executes a program, which is a sequence of stored instructions.
Each model of processor has an instruction set, which it executes. The
CPU executes the program by processing each piece of data as directed
by the program and the instruction set. While the CPU is executing one
step of the program, the remaining instructions and the data are stored
nearby in a special memory called cache. Two major CPU architectures
are related to instruction sets:
Reduced Instruction Set Computer (RISC): Architectures
use a relatively small set of instructions, and RISC chips are
designed to execute these instructions very rapidly.
Complex Instruction Set Computer (CISC): Architectures
use a broad set of instructions, resulting in fewer steps per
operation.
Some CPUs incorporate hyper threading to enhance the CPU‟s
performance. With hyper threading, the CPU has multiple pieces of
code being executed simultaneously on each pipeline. To an operating
system, a single CPU with hyper threading appears to be two CPUs.
A CPU‟s power is measured by its speed and the amount of data it can
process. A CPU‟s speed is rated in cycles per second. The speed of
current CPUs is measured in millions of cycles per second, called
megahertz (MHz), or billions of cycles per second, called gigahertz
(GHz). The amount of data that a CPU can process at the one time
depends on the size of the processor data bus. This is also called the CPU
bus or the front-side bus (FSB). The wider the processor data bus, the
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
more powerful the processor. Current processors have a 32-bit or 64-
bit processor data bus.
Over clocking is a technique used to make a processor work at a faster
speed than its original specification. Over clocking is an unreliable way to
improve computer performance and can damage the CPU.
MMX is a set of multimedia instructions built into Intel processors.
MMX-enabled microprocessors can handle many common multimedia
operations that normally are handled by a separate sound or video card.
However, only software specially written to call MMX instructions can
take advantage of the MMX instruction set.
The latest processor technology has caused CPU manufacturers to find
ways to incorporate more than one CPU core into a single chip. Many
CPUs can process multiple instructions concurrently:
Single-core CPU: One core inside a single CPU chip that
handles all the processing capability. A motherboard
manufacturer may provide sockets for more than a single
processor, providing the ability to build a powerful
multiprocessor computer.
Dual-core CPU: Two cores inside a single CPU chip, in which
both cores can process information at the same time.
5. Cooling System – Electronic components generate heat. Heat is caused by
the flow of current within the components. Computer components
perform better when kept cool. If the heat is not removed, the computer
may run slower. If too much heat builds up, computer components can
be damaged. Increasing the air flow in the computer case allows more
heat to be removed. A case fan is installed in the computer case to make
the cooling process more efficient.
Case Fan
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
In addition to case fans, a heat sink draws heat away from the core of the
CPU. A fan on top of the heat sink moves the heat away from the CPU
Other components are also susceptible to heat damage and sometimes
are equipped with fans. Video adapter cards produce a great deal of heat.
Fans are dedicated to cooling the graphics-processing unit (GPU).
Computers with extremely fast CPUs and GPUs may use a water-cooling
system. A metal plate is placed over the processor, and water is pumped
over the top to collect the heat that the CPU creates. The water is
pumped to a radiator to be cooled by the air and then is re-circulated.
6. ROM and RAM – ROM and RAM provide memory for a vast amount of
computer equipment. They come in different memory sizes and module
sizes and have different features.
ROM (Read only Memory) - chips are located on the motherboard.
ROM chips contain instructions that the CPU can access directly.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
ROM stores basic instructions for booting the computer and
loading the operating system. ROM chips retain their contents even
when the computer is powered down. The contents cannot be
erased, changed, or rewritten by normal means.
Types of ROM
Programmable read-only memory (PROM): Information is
written to a PROM chip after it is manufactured. A PROM chip
cannot be erased or rewritten.
Erasable programmable read-only memory (EPROM):
Information is written to an EPROM chip after it is
manufactured. An EPROM chip can be erased with exposure to
UV light. Special equipment is required.
Electrically erasable programmable read-only memory
(EEPROM): Information is written to an EEPROM chip after it is
manufactured. EEPROM chips are also called flash ROMs. An
EEPROM chip can be erased and rewritten without removing
the chip from the computer
RAM (Random Access Memory) - is
the temporary storage for data and
programs that are being accessed by
the CPU. RAM is volatile memory, which
means that the contents are erased
when the computer is powered off. The
more RAM in a computer, the more
capacity the computer has to hold and
process large programs and files, as
well as enhance system performance.
Types of RAM
Dynamic RAM (DRAM) is a memory chip that is used as main
memory. DRAM must be constantly refreshed with pulses of
electricity to maintain the data stored in the chip.
Static RAM (SRAM) is a memory chip that is used as cache
memory. SRAM is much faster than DRAM and does not have to
be refreshed as often.
Fast Page Mode (FPM) DRAM is memory that supports paging.
Paging enables faster access to the data than regular DRAM.
Most 486 and Pentium systems from 1995 and earlier use FPM
memory.
Extended Data out (EDO) RAM is memory that overlaps
consecutive data accesses. This speeds up the access time to
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
retrieve data from memory, because the CPU does not have to
wait for one data access cycle to end before another data access
cycle begins.
Synchronous DRAM (SDRAM) is DRAM that operates in
synchronization with the memory bus. The memory bus is the
data path between the CPU and the main memory.
Double Data Rate (DDR) SDRAM is memory that transfers data
twice as fast as SDRAM. DDR SDRAM increases performance by
transferring data twice per cycle.
Double Data Rate 2 (DDR2) SDRAM is faster than DDR-SDRAM
memory. DDR2 SDRAM improves performance over DDR
SDRAM by decreasing noise and crosstalk between the signal
wires.
RAM Bus DRAM (RDRAM) is a memory chip that was developed
to communicate at very high rates of speed. RDRAM chips are
not commonly used
Memory Modules
Early computers had RAM installed on the motherboard as
individual chips. These individual memory chips, called dual
inline package (DIP) chips, were difficult to install and often
became loose on the motherboard. To solve this problem,
designers soldered the memory chips on a special circuit board
called a memory module.
The different types of memory modules
Dual Inline Package (DIP) is an individual memory chip. A DIP
had dual rows of pins used to attach it to the motherboard.
Single Inline Memory Module (SIMM) is a small circuit board
that holds several memory chips. SIMMs has 30-pin and 72-pin
configurations.
Dual Inline Memory Module (DIMM) is a circuit board that
holds SDRAM, DDR SDRAM, and DDR2 SDRAM chips. There
are 168-pin SDRAM DIMMs, 184-pin DDR DIMMs, and 240-pin
DDR2 DIMMs.
RAM Bus Inline Memory Module (RIMM) is a circuit board
that holds RDRAM chips. A typical RIMM has a 184-pin
configuration.
Cache Memory
SRAM is used as cache memory to store the most frequently
used data. SRAM gives the processor faster access to the data
than retrieving it from the slower DRAM, or main memory.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
The three types of cache memory are as follows:
L1 is internal cache integrated into the CPU.
L2 is external cache originally mounted on the motherboard
near the CPU.
L2 cache is now integrated into the CPU.
L3 is used on some high-end workstations and server CPUs.
Error Checking
Memory errors occur when the data is stored incorrectly in the
RAM chips. The computer uses different methods to detect and
correct data errors in memory. Three different methods of memory
error checking are as follows:
Non-parity does not check for errors in memory.
Parity contains 8 bits for data and 1 bit for error checking. The
error-checking bit is called a parity bit.
Error Correction Code (ECC) can detect multiple bit errors in
memory and correct single bit errors in memory.
7. Adapter Cards - Adapter cards are used to expand and customize the
computer‟s capability
NIC connects a computer to a network using a network cable.
Wireless NIC connects a computer to a network using radio
frequencies.
Sound adapter provides audio capability.
Video adapter provides graphic capability.
Modem adapter connects a computer to
the Internet using a phone line.
SCSI adapter connects SCSI devices, such as hard drives or
tape drives, to a computer.
RAID adapter connects multiple hard drives to a computer to
provide redundancy and to improve performance.
USB port connects a computer to peripheral devices.
Parallel port connects a computer to peripheral devices.
Serial port connects a computer to peripheral devices.
The different types of expansion slots
Industry Standard Architecture (ISA) is an 8-bit or 16-bit
expansion slot. This is older technology and is seldom used.
Extended Industry Standard Architecture (EISA) is a 32-bit
expansion slot. This is older technology and is seldom used.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Micro channel Architecture (MCA) is an IBM-proprietary 32-
bit expansion slot. This is older technology and is seldom used.
Peripheral Component Interconnect (PCI) is a 32-bit or 64-bit
expansion slot. PCI is the standard slot currently used in most
computers.
Advanced Graphics Port (AGP) is a 32-bit expansion slot. AGP
is designed for video adapters.
PCI-Express is a serial bus expansion slot. PCI-Express is
backward-compatible with PCI slots. PCI-Express has x1, x4,
x8, x16 slots.
8. Storage Drive – A storage drive reads or writes information to magnetic or
optical storage media. It can be used to store data permanently or to
retrieve information from a media disk. Storage drives can be installed
inside the computer case, such as a hard drive. For portability, some
storage drives can connect to the computer using a USB port, a FireWire
port, or a SCSI port.
Common types of storage drives
Floppy drive - A floppy drive, or floppy disk drive, is a storage
device that uses removable 3.5-inch floppy disks. These
magnetic floppy disks can store 720 KB or 1.44 MB of data.
In a computer, the floppy drive is usually configured as the
A: drive. The floppy drive can be used to boot the computer if
it contains a bootable floppy disk. A 5.25-inch floppy drive is
older technology and is seldom used.
The floppy drive is slowly being replaced by cheaper, faster,
and larger-capacity storage such as writable CDs, DVDs, and
flash drive media.
Hard drive - A hard drive, or hard-
disk drive, is a magnetic storage
device that is installed inside the
computer. The hard drive is used as
permanent storage for data. In a
computer, the hard drive is usually
configured as the C: drive and
contains the operating system and applications. The hard
drive is usually configured as the first drive in the boot
sequence. The storage capacity of a hard drive is measured
in billions of bytes, or gigabytes (GB). The speed of a hard
drive is measured in revolutions per minute (rpm). Multiple
hard drives can be added to increase storage capacity.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Optical drive - An optical drive is a
storage device that uses lasers to read
data on the optical media. Two types
of optical drives exist:
o Compact disc (CD)
o Digital versatile disc (DVD)
CD and DVD media can be prerecorded (read-only),
recordable (write once), or rerecord able (read and write
multiple times). CDs have a data storage capacity of
approximately 700 MB. DVDs have a data storage capacity of
approximately 8.5 GB on one side of the disc.
Several types of optical media exist:
o CD-ROM is CD read-only memory media that is
prerecorded.
o CD-R is CD recordable media that can be
recorded once.
o CD-RW is CD rewritable media that can be
recorded, erased, and rerecorded.
o DVD-ROM is DVD read-only memory media that
is prerecorded.
o DVD-RAM is DVD random-access memory media
that can be recorded, erased, and rerecorded.
o DVD+/-R is DVD recordable media that can be
recorded once.
o DVD+/-RW is DVD rewritable media that can be
recorded, erased, and rerecorded.
Flash drive - A flash drive, also known as a thumb drive, is a
removable storage device that connects to a USB port. A
flash drive uses a special type of memory that requires no
power to maintain the data. These drives can be accessed by
the operating system in the same way other types of drives
are accessed.
The storage capacity of a flash drive varies from a couple of
megabytes to 16 gigabytes.
Types of Drive Interfaces
Hard drives and optical drives are manufactured with
different interfaces that are used to connect the drive to the
computer. When you install a storage drive in a computer,
the connection interface on the drive must be the same as
the controller on the motherboard. Some common drive
interfaces are as follows:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
o Integrated Drive Electronics (IDE), also called
Advanced Technology Attachment (ATA), is an
early drive controller interface that connects
computers and hard-disk drives. An IDE
interface uses a 40-pin connector.
o Enhanced Integrated Drive Electronics
(EIDE), also called ATA-2, is an updated version
of the IDE drive controller interface. EIDE
supports hard drives larger than 512 MB,
enables Direct Memory Access (DMA) for speed,
and uses the AT Attachment Packet Interface
(ATAPI) to accommodate optical drives and tape
drives on the EIDE bus. An EIDE interface uses
a 40-pin connector.
o Parallel ATA (PATA) refers to the parallel
version of the ATA drive controller interface.
o Serial ATA (SATA) refers to the serial version of
the ATA drive controller interface. A SATA
interface uses a seven-pin connector.
o Small Computer System Interface (SCSI) is a
drive controller interface that can connect up to
15 drives. SCSI can connect both internal and
external drives. A SCSI interface uses a 50-pin,
68-pin, or 80-pin connector.
9. I/O ports – I/O ports on a computer connect peripheral devices, such as
printers, scanners, and portable drives.
Serial - A serial port can be either a DB-9 or a DB-25 male
connector. Serial ports transmit 1 bit of data at a time. To
connect a serial device, such as a modem or printer, a serial
cable must be used.
USB – The Universal Serial Bus (USB) is a standard interface
that connects peripheral devices to a computer. It was
originally designed to replace serial and parallel connections.
USB devices are hot-swappable, which means that users can
connect and disconnect the devices while the computer is
powered on.
FireWire – FireWire is a high-speed, hot-swappable
interface that connects peripheral devices to a computer. A
single FireWire port in a computer can support up to 63
devices. Some devices can also be powered through the
FireWire port, eliminating the need for an external power
source. FireWire uses the IEEE 1394 standard and is also
known as i.Link.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Parallel - A parallel port on a computer is a standard Type A
DB-25 female connector. The parallel connector on a printer
is a standard Type B 36-pin Centronics connector. Some
newer printers may use a Type C high-density 36-pin
connector. Parallel ports can transmit 8 bits of data at a time
and use the IEEE 1284 standard.
SCSI - A SCSI port can transmit data at rates in excess of
320 Mbps and can support up to 15 devices. If a single SCSI
device is connected to a SCSI port, the cable can be up to 80
feet (24.4 m) in length. If multiple SCSI devices are
connected to a SCSI port, the cable can be up to 40 (12.2 m)
feet in length.
DB-25 Female Connector
High Density 50-pin female
connector
High Density 68-pin female
connector
Network - A network port, also called an RJ-45 port,
connects a computer to a network. The connection speed
depends on the type of network port. Standard Ethernet can
transmit up to 10 Mbps, Fast Ethernet can transmit up to
100 Mbps, and Gigabit Ethernet can transmit up to1000
Mbps. The maximum length of network cable is 328 feet (100
m).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
PS/2 - A PS/2 port connects a keyboard or mouse to a
computer. The PS/2 port is a six-pin mini- DIN female
connector. The connectors for the keyboard and mouse are
often colored differently
Audio
An audio port connects audio devices to the computer.
The following audio ports are commonly used.
Line In connects to an external source, such as a stereo
system.
Microphone In connects to a microphone.
Line Out connects to speakers or headphones.
Auxiliary In is an additional line in.
Game port/MIDI connects to a joystick or MIDI-
interfaced device.
Video
A video port connects a monitor cable to a computer.
Several video port and connector types exist:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Video Graphics Array (VGA) has a three-row 15-pin
female connector and provides analog output to a
monitor.
Digital Visual Interface (DVI) has a 24-pin female
connector or a 29-pin female connector and provides
compressed digital output to a monitor. DVI-I provides
both analog and digital signals. DVI-D provides digital
signals only.
High-Definition Multimedia Interface (HDMI) has a 19-
pin connector and provides digital video and digital audio
signals.
S-Video has a four-pin connector and provides analog
video signals.
Component/RGB has three shielded cables (red, green,
and blue) with RCA jacks and provides analog video
signals.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.1-5
PROCEDURE IN ASSEMBLY AND DISASSEMBLY COMPUTER
SYSTEMS
Disassembly Procedure for a Desktop Computer System
Depending on the model or architectural design of a desktop computer,
there is a thin line between the differences of disassembling one from another.
To disassemble a desktop computer system, follow the steps below:
1. Prepare the hand tools needed to disassemble a computer system
such as screw drivers, pliers, rubber mat, etc.
2. Wear personal protective equipment such as goggles, gloves, face
mask and anti-static wrist strap.
3. Unplug the main power cord from the outlet, AVR or UPS.
4. Remove the main power cord from the power supply unit‟s power
connector at the back panel.
5. Remove the keyboard and the mouse cable connector at back panel
I/O ports.
6. Remove the VGA Cable connector from the VGA ports.
7. Remove the LAN Cable connector (RJ 45) from its LAN port, if present.
8. Remove the Audio Jack connectors from is audio jack or port, if
present.
9. If the system unit is a tower type chassis, flip it so it appears in
flatbed position.
10. Remove the cover.
11. Ground yourself, observe the ESD process, touch any unpainted
part of the system to unleash electric charges in your body.
12. Remove the SATA/IDE cables or Molex or SATA power cables,
whichever is convenient, for the disk drives (DVD or CD Drive and
Hard Disk Drive (HDD))
13. Remove the DVD Drive and the HDD from the case.
14. Remove the Front Panel connections, remember how it is
connected, you can illustrate or draw the exact positioning of the
connections for references later in assembling the panel.
15. Remove the 4-pin power connector.
16. Remove the 24-pin power connector.
17. Remove the power supply unit.
18. Remove the mainboard or the motherboard from the case.
19. Remove the memory module.
20. Remove the heat sink and fan.
21. Remove the processor from its socket.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Assembly Procedure for a Desktop Computer Systems
Prepare the Computer Case
Prepare the case from the box and
examine it for dents or any other visible
damage. Ensure that all relevant
hardware is present.
Note: Ensure that the case
came with the computer front
panel switches, LEDs and
speaker; otherwise, replace
case.
If everything is O.K., remove the case cover.
If the case comes with a power supply, thoroughly inspect power supply
and power supply cables. Clean case to remove any dust; preferably with
compressed air. Install legs and all necessary hardware.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Examine Computer Motherboard
Check to see that system board is intact and that there are no damaged
components.
Ensure that the mainboard manual is present and also all mounting
hardware.
I recommend an ATX Mainboard because it is the standard being used
now by most (if not all) computer manufacturers.
Matching Holes
The motherboard is installed in the computer case. The first step is to
open the case and locate the metallic plate where the motherboard is
screwed to. Normally this plate can be removed from the case by
unscrewing it from the back end of the case and sliding it. You must
remove it from the case to install the motherboard on it. This plate has
several holes, as you can see on Figure 1.
Metallic plate where the motherboard will be screwed to
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Figure 1
The motherboard has also several holes, as you can see on Figure 2
(we‟ve drawn red arrows to point you where the holes are located).
Figure 2
You should lay down the motherboard on the metallic plate and check
which holes from the metallic plate match the holes on the motherboard,
as we show on Figure 3. As you can see by comparing Figures 1 and 2,
the metallic plate has more holes than needed. On the holes on the
metallic.
Matching the holes on the metallic plate with the holes on the
motherboard.
Together with the case come a lot of small pieces. From these pieces you
will need screws and screw nuts to install the motherboard. For now,
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
take the screw nuts and install them on all the plate holes that matched
a hole on the motherboard. They can be easily installed by turning them
clock wise using your thumb and index finger.
Screw nuts, screws and washers that come with the case.
Figure 5: Metallic plate after installing the screw nuts.
Installing the Motherboard to the Metallic Plate
Now you should lay down the motherboard on the metallic plate again,
placing a screw on every motherboard hole that matches a nut that
you‟ve installed. There is a very important detail that a lot of people don‟t
know, however. If you pay close attention to the motherboard‟s holes, you
will find two kinds of holes: metalized and non-metalized. As the name
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
implies, the metalized holes have a metallic contact around them. Pay
close attention on Figure 6 to see the difference between these two kinds
of holes.
Metalized versus non-metalized hole.
Metalized holes are meant to be directly screwed. So, on these holes go
ahead and placea screw on them. But the non-metalized holes you
cannot screw them directly. You need to place a cardboard washer
between them and the screws. Actually, two washers are needed per hole,
one between the nut and the motherboard and another between the
motherboard and the screw, like a sandwich where the motherboard is
the stuffing.
One of the most common mistakes while installing a motherboard is
using these washers on all holes. This cannot be done. The metalized
holes were metalized to make the proper grounding with the system case.
Actually, you probably won‟t find any non-metalized holes on
motherboards nowadays. And if you do, almost always they don‟t match
any hole on the chassis anyway. So, just leave these cartoon board
washers behind! Don‟t use them!
Another very common – and dangerous-mistake is to use a foam sheet
(which is usually pink) that some motherboards come with between the
motherboard and the metallic plate. Some people believe that this foam
will prevent the motherboard form touching the metallic plate, avoiding a
short-circuit. This way thinking is completely wrong. First, if you install
all the nuts correctly and install a screw on all motherboard holes
possible, the motherboard will never touch the case‟s metallic plate. In
second place, if you install this foam sheet you will simply cut the
motherboard ventilation, which will lead to an overheating condition. The
space between the motherboard and the metallic plate is used to
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
dissipate the heat generated by the motherboard and nothing should be
put there.
After these explanations, let‟s go ahead. On you see the motherboard
correctly installed to the case‟s metallic plate.
Motherboard correctly installed to the metallic plate.
You may think that the next step is to install the metallic plate back to
the case, now with the motherboard attached to it. But it is not. Before
doing that, we still need to do several things.
Install Computer Processor (CPU):
Processors (CPUs) are delicate components so handle them gently.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
To install the CPU, lift the lever on the socket straight up to 90 degree
position. There are some pins missing from two corners of the Athlon
processor while only one corner is missing pins on the Pentium 4. The
notched corners should match the notch corners of the socket.
Install the computer processor (CPU) inot the socket, taking care not to
bend any pins.
The CPU should just drop into the socket without any resistance. This
socket is called a Zero Insertion Force (ZIF) socket.
Diagram A below displays the computer processor (CPU) and socket.
Ensure that the CPU is sitting properly in the socket and then lock the
lever back down. (See Diagram B below). Diagram B also shows the ZIF
socket lever being lowered.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Installing the CPU Fan
Position the
heatsink onto the
retention
mechanism
Mount the fan on
the top heatsink.
Press down the fan
until its four clips
get wedge in the
hole of the retention
mechanism.
Flip the lever over to
lock heatsink in
place and coonect
the CPU cooling FAN
connectors.
Read and follow the instruction shown on the sticker on the CPU cap.
CPU 775
Installatio
n
Procedure
s
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Open the load plate
Use the thumb & forefinger to hold the hook of the lever, pushing down
and pulling aside unlock
Lift up the lever
Use thumb to open the load plate. Be care not touch the contact
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install the CPU on the socket
Orientate CPU package to the socket make sure you match triangle
marker to pin 1 location
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Use the thumb & forefinger to hold the lifting tab of the cap.
Lift the cap up and remove the cap completely from the socket.
Slightly push down the load palate onto the tongue side and hook the
lever
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
CPU is locked completely
Apply thermal grease on the CPU
Fasten the cooling fan supporting base onto the CPU socket on the
motherboard
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Make sure the CPU Fan is plugged to the CPU connector.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install Computer Memory
It is now time to install your cheap computer memory (RAM)
Memory modules come in different types such as 168-pin SDRAM. There
are now newer types of Computer Memory modules such as 184-pin DDR
which have faster access times.
The SDRAM have two notches which makes installation „fool proof‟. The
DDR and have one notch so extreme care has to be taken when installing
these modules.
Insert the module into an available expansion socket. Note how the
module is keyed to the socket. This ensures the module can be plugged
into the socket one way only. Firmly press the module is completely
seated in the socket. The ejector tabs at each of the socket will
automatically snap into the locked position. Repeat this procedure for
any additional modules you are installing.
Carefully press the memory into the slot until it is securely locked in
place with the clips. (See diagram A below).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Installing the Front Panel Wires
Locate on your motherboard the front panel connectors. You will install
the corresponding wires that come from the case‟s front panel to these
connectors.
Front panel connectors from the motherboard Wires from the case‟s front
panel.
You will find the following wires:
Reset switch (no polarity required)
Power switch (no polarity required), sometimes also called Standby
switch
Power LED (polarity required), sometimes also called message LED
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
HD LED (polarity required)
Speaker (polarity required)
Just install these wires to the connector with the same name on the
motherboard. On the wires we marked “polarity required” you will need to
match the positive (+) and negative (-) markings on the motherboard. The
white (or black) wire should be installed to the pin marked as negative (-) on
the board.
Also, sometimes the connectors are colored, as it occurs in our example
on Figure 15, but the colors on the connectors rarely match the colors of the
wires. So, don‟t follow the color scheme from the motherboard for installing
the front panel wires.
Wires from the front panel correctly installed on the motherboard.
Installing the I/O shield
First, you need to prepare the case. If you pay
attention, the case has a rectangular opening
measuring 6.250 in x 1.750 in (15.87 cm x 4.44
cm) to accommodate the plugs available on the
back of the motherboard. This hole is covered
with a finishing that has smaller holes matching
the plugs available on the motherboard. You
need to check if the plugs on your motherboard
match the holes on this finishing.
Not all motherboards will match the I/O shiled
that comes with your case. Luckily, most
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
motherboards will come with their own, and it‟s very easy to replace the
shield. Normally you just need to push in on the I/O shield until it pops
out and replace it with the new one. In some cases, you may need to pop
out a few covers that are still in the shield to accommodate your board.
Figure 1: I/O shield there are several plugs on the back of the motherboard.
Check/replace the I/O shield
Figure 2: I/O shield that came with our case from factory.
In our case, the holes on the case didn‟t match the pattern of the plugs
available on our motherboard. So we needed to remove the finishing that
came with our case using a pliers and install a finishing that matched
our motherboard. Motherboards usually come with a case finishing that
match the pattern of its plugs. Cases usually come with a set of most
common finishing.
Figure 3: We had to remove the I/O shield that came with the case.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Figure 4: Finishing that came with our motherboard.
Figure 5: Case with the new finishing installed.
Installing the Motherboard to the Case
The next step is finally placing the motherboard in the case. Fit it on its
correct place and then slide it on the direction of the back of the case.
After the motherboard is in the correct place, screw the metallic plate
where the motherboard is installed back to the case.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Installing the motherboard to the case.
Install Computer Internal Drives (Hard Drive, Floppy Drive, CD-ROM
Drive/DVD_ROM Drive)
When installing these computer internal drives, never use a magnetized
screwdriver.
You should install your boot hard drive on the primary IDE channel and
set it as „Master‟.
There is a jumper located on the rear of the drive showing the different
positions such as „Master‟, „Slave‟ and „Cable Select‟. Install the jumper
on the pins marked „Master‟. (See diagram A below).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Master or single drive. If you are installing your Seagate hard drive as the only
drive in the system or if it will be the primary boot drive for the system, the
jumper should be set on pins 7 and 8.
Drive as slave. If you are installing the drive as an additional drive in your
system, the drive shold be set as slave by removing all jumpers. Remember to
confirm that the original drive is set to a mater position (if the limit capacity
jumper is required for your installation it will need to remain in place).
When installing this computer internal drive, always use the screws
provided with the drive since other screws could be too long and damage
the internal components.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install hard drive in internal 3.5 inch drive bay and install all four
retaining screws securely to prevent vibration of drive. Check to see that
drive is secure.
After securing hard drive, it is now time to connect your IDE cable to
your hard drive. This cable is indexed and can only fit one way into the
drive and the motherboard.
The cable used to connect the hard drive is an 80-conductor cable. This
cable is distinguishable from the 40-conductor cable because the 80-
conductor cable uses very fine wires and the 40-conductor cable uses
relatively thick wires.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Below: IDE1 is the Primary IDE plug
Note the number 1 below the bottom left corner of IDE1 that should coincide
with where the red wire on the IDE cable goes.
Below: The same concept but slightly different
Notice the white corner on the bottom left of each plug. This signifies Pin 1.
If it is impossible to see where the cable is indexed, remember that the
red stripe on the IDE cable corresponds with Pin 1 on the IDE drive and
Pin 1 is the closest to the drive‟s power connector.
Connect the IDE cable into the Primary IDE channel connector on the
motherboard and the other end into the connector on the drive.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Finally, plug power cable to drive ensuring that it has the correct orientation.
(See diagram C below).
Installing Serial ATA Hard Disk
To install the Serial ATA (SATA) hard drives, use the SATA cable that
support the Serial ATA protocol. This SATA cable comes with an SATA
power cable. You can connect either end of the SATA cable to the SATA
hard drive or the connector on the motherboard.
SATA power cable SATA cable
Attach either cable end to the connector of the
motherboard.
Attach the other cable end to the SATA hard
drive.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Attach the SATA Power
cable to the SATA hard
drive and connect the
other end to the power
supply.
Another one of the computer
internal drives is the floppy
drive.
Check floppy drive to
ensure no visible damage
and install drive in
external 3.5 inch drive
bay.
When securing your drive
with screws, I recommend
that you do so on both
sides of the drive in which
case you have to remove the
left side case cover.
Out of all the computer
internal drives, the floppy
drive is the slowest and
stores the smallest amount
of data.
Align floppy so it sits flush
with the front case bezel.
Push the floppy drive power
cable to the power connector. This will only go in on
way.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install CD-ROM Drive / DVD-ROM Drive:
Here are some other Computer
Internal Drives. The CD-ROM
drive and the DVD-ROM drive.
Having installed the hard drive
as „MASTER‟ on the primary
IDE channel, you should now
install the DVD-ROM drive as
„SLAVE‟ on the same IDE
channel.
Install your CD-ROM
drive/DVD-ROM drive in an
available 5.25 inch drive bay
and properly secure screws on
both sides to prevent vibration.
Vibration can damage internal
components of drives.
Whichever drive you choose, align this drive so that it is flush with the
front case bezel.
Note: Follow the same installation procedure as the hard drive to install IDE
and power cables.
Connect the power cable from the power supply to the drive.
Connect the remaining end of the primary IDE cable to the drive ensuring
that the red line on the cable aligns with Pin 1 on the drive connector.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Connect ATX 20-24 Pin Computer Power Supply Cable to Motherboard
Align the clip of the ATX 20-24 pin connector with the notch in the plug
and firmly clip it in place. The motherboard recommended in this tutorial
is an Athlon motherboard and only uses the 20-pin connector.
The Pentium 4 computer motherboard uses an extra small 4-pin 12V
connector for extra power needed by the CPU. It will, therefore, be
necessary to also attach that connector if you are building a Pentium 4
system.
Note: An incorrectly installed plug will „burn‟ your computer.
(See diagram below).
Installation of ATX 20-24 Pin Connector
Installing the ATX 12V connector (only if your motherboard has it).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install cheap Computer Video Card
Before installing Computer Video Card, ground yourself to prevent static
electricity damage to the Video Card components by wearing an antistatic
wrist strap.
Note: NEVER use a magnetized screwdriver during installation.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Remove the expansion slot cover from the computer case. (See diagram B
below).
Removal of Expansion Slot Cover from the Computer Case
The Video/graphics Card is installed in the AGP slot. On most motherboards,
the AGP slot is usually brown in color and it is always situated further in than
the PCI slots from the edge of the Motherboard.
The Card and the slot are keyed so it is almost impossible to insert the card
incorrectly.
Install Video Card in the AGP slot. Press down firmly and evenly across the top
of the Card until it is securely seated in the AGP slot taking care not to damage
the card or the slot. (See diagram C below).
Video Card Insertion
Secure the card to the computer case using a small screw. (See diagram D
below).
Securing Video Card to Computer Case
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install Cheap Computer Sound Card
Before installing computer sound card, ground yourself to prevent static
electricity damage to the sound card components by wearing an anti-static
wrist strap.
Note: NEVER use a magnetized screwdriver during installation.
Remove the expansion slot cover from the computer case. (See diagram A
below).
Expansion Slot Cover Removal
The sound card is installed in the PCI slot. On most motherboards, the
PCO slots are usually white in color.
Due to the heat generated by the video card, place the sound card in a
PCI slot away from the video card.
The card and the slot are keyed so it is almost impossible to insert the
card incorrectly.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Install the card in the PCI slot. Press down firmly and evenly across the
top of the card until it is securely seated in the PCI slot taking care not to
damage the card or the slot. (See diagram B below).
Sound Card Insertion
Secure the sound card to the computer case using a small screw. (See diagram
C below).
Secure Sound Card to Computer Case
Finally, connect the
audio cable to the DVD-
ROM drive and the
sound card.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Connect Computer Peripheral to Back Panel
You have followed the Build Your
Own Cheap Computer tutorial and
you have installed the internal
components. You are now ready to
install the external peripherals.
A Power
Connector –
The power
connector is a
3-prong male
connector
which enables
you to connect
a power cable
to the
computer Port
A to obtain power from an electrical outlet. (See diagram above).
B Power Supply Fan – The power supply fan provides adequate
ventilation for the power supply by exhausting hot air from it.
C Mouse Port – The mouse is a pointing device
that enables you to move and select items on the
screen. It is the most commonly used pointing
device. The mouse is connected to Port C. This
port is also called a mini-DIN or PS/2 connector.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
D Keyboard Port – The keyboard is one of the
input devices that allows you to enter
instructions and information into a
computer. The keyboard is connected to Port
D. This port is also known as the mini-DIN
or PS/2 connector. The older computers
came with a larger port known as a DIN
connector.
E USB Port – (USB) Acronym for
Universal Serial Bus. This port is an
external bus that supports data transfer
rates of up to 12 Mbps. This port can
connect up to 127 peripherals (such as
mice, modems, keyboard, etc.) all at
once. It also enables hot-swapping
which is being able to connect and
disconnect peripherals without
powering down the PC.
F Parallel Port (Printer Port) – The
parallel port is a 25-pin female
connector (DB-25). It is an interface for
connecting external devices such as a
printers and computers that require
relatively high bandwidth. It supports
bi-directional communications.
G Serial Port (COM Port) – This port
is an interface for serial
communication being transmitted at
1 bit at a time. This port can be used
to connect a computer peripheral
such as a modem, mouse, etc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
H Game Port – The game port is
a 15-pin female analog port used
to connect game controllers such
as joysticks. It can also be used
as a Musical Instrument Digital
Interface (MIDI) port for
connecting a computer
peripheral such as a synthesizer
and is located on the sound card.
I Monitor Port – The monitor is very
important computer peripherals that
display images and text generated by
the computer. The monitor is
connected to port 1 which is a 15-pin
female connector.
J Ethernet Port – The Ethernet port accepts
an Ethernet cable which allows you to
communicate on a network that runs
Transmission Control Protocol/Internet
Protocol (TCP/IP). This port resembles a
regular phone jack but is slightly wider and
is generally located on the Network Interface
Card (NIC) or integrated on the
motherboard.
K Modem – Two words „Modem‟ is
a contraction of the words
Modulator-Demodulator. It is
typically used to send digital data
over a phone line. If you want to
be able to surf the Internet or
send or receive email, your
computer system will need one.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
LEARNING OUTCOME NO. 2
Prepare Installer
ASSESSMENT CRITERIA:
1. Portable bootable devices are created in accordance with software
manufacturer instruction
2. Customized installers are prepared in accordance with software
utilization guide and end user agreement.
3. Installation of portable applications are carried out in accordance
with software user guide and software license
Contents:
1. Safety procedures
2. Types of Operating System
3. Create and customize portable and bootable devices
Conditions
The students/trainees must be provided with the following:
1. Operating System
2. Third party software
3. Client /Server Computer
4. USB
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.2-1
PREPARE USB INSTALLER USING COMMAND PROMPT
1. Insert the DVD Installer (windows 2008 sever or Windows 7)
Go to Command prompt (CMD)
DISKPART
LIST DISK
SELECT DISK ? (the usb letter)
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
ASSIGN
EXIT
2. Go to your installer DVD and find for the folder ( BOOT)
G:\>CD BOOT
G:BOOT:\>BOOTSECT /NT60 E:(the e: is your USB letter with a : )
3. Then it will say successfully updated NTFS file system boot code and
so on. Complete now copy the files from you install disk to the USB.
XCOPY G:\*.* E:\ /E /H /F (G: is your source drive E: is your target
drive)
PREPARE INSTALLER USING RUFUS
Add the ISO files and follow the instruction. Make
sure the Flash Drive is connected. All files in flash
drive will be deleted.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
LEARNING OUTCOME NO. 3
Install operating system and drivers for peripherals/ devices
ASSESSMENT CRITERIA:
1. Operating system (OS) is installed in accordance with established
installation procedures and to comply with end-user requirements
2. Peripherals/devices drivers are installed and configured in
accordance with manufacturer‟s instructions and/or OS
installation procedures.
3. OS and drivers updates/patches are accessed and installed in
accordance with manufacturer‟s recommendations and
requirements
4. On-going checks of the quality of the work are undertaken in
accordance with established procedures
Contents:
1. Safety procedures
2. Installing Operating System
3. Installing peripherals, network devices and other I/O devices
4. Updating peripherals, network devices and other I/O devices
Conditions
The students/trainees must be provided with the following:
1. Client /Server computer
2. USB OS installers
3. Peripherals/network devices
4. I/O devices
5. Drivers
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.3-1
INSTALLING OPERATING SYSTEMS
INSTALL WINDOWS 2008 SERVER
Note: Windows Server 2008 can also be installed as a Server Core
installation, which is a cut-down version of Windows without the Windows
Explorer GUI. Because you don‟t have the Windows Explorer to provide the
GUI interface that you are used to, you configure everything through the
command line interface or remotely using a Microsoft Management Console
(MMC). The Server Core can be used for dedicated machines with basic roles
such as Domain controller/Active Directory Domain Services, DNS Server,
DHCP Server, file server, print server, Windows Media Server, IIS 7 web
server and Windows Server Virtualization virtual server. For Server Core
installations please see my “Installing Windows Server 2008 Core” article.
To use Windows Server 2008 you need to meet the following hardware
requirements:
Component Requirement
• Minimum: 1GHz (x86 processor) or 1.4GHz (x64
processor) • Recommended: 2GHz or faster Note: An Intel
Itanium 2 processor is required for Windows Server 2008
Processor for Itanium-based Systems
• Minimum: 512MB RAM • Recommended: 2GB RAM or
greater • Maximum (32-bit systems): 4GB (Standard) or
64GB (Enterprise and Datacenter) • Maximum (64-bit
systems): 32GB (Standard) or 2TB (Enterprise,
Memory Datacenter and Itanium-based Systems)
• Minimum: 10GB • Recommended: 40GB or greater
Note: Computers with more than 16GB of RAM will
Available Disk require more disk space for paging, hibernation, and
Space dump files
Drive DVD-ROM drive
Display and • Super VGA (800 x 600) or higher-resolution monitor •
Peripherals Keyboard • Microsoft Mouse or compatible pointing device
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Upgrade notes:
I will not discuss the upgrade process in this article, but for your general
knowledge, the upgrade paths available for Windows Server 2008 shown in
the table below:
If you are currently running: You can upgrade to:
Full Installation of Windows Server 2008
Standard Edition
Windows Server 2003 Standard Full Installation of Windows Server 2008
Edition (R2, Service Pack 1 or Enterprise Edition
Service Pack 2)
Windows Server 2003 Enterprise
Edition (R2, Service Pack 1 or Full Installation of Windows Server 2008
Service Pack 2) Enterprise Edition
Windows Server 2003 Datacenter
Edition (R2, Service Pack 1 or Full Installation of Windows Server 2008
Service Pack 2) Datacenter Edition
Follow this procedure to install Windows Server 2008:
1. Insert the appropriate Windows Server 2008 installation media into
your DVD drive. If you don‟t have an installation DVD for Windows
Server 2008, you can download one for free from Microsoft‟s Windows
2008 Server Trial website.
2. Reboot the computer.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
3. When prompted for an installation language and other regional options,
make your selection and press Next.
1. Next, press Install Now to begin the installation process.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
2. Product activation is now also identical with that found in Windows
Vista. Enter your Product ID in the next window, and if you want to
automatically activate Windows the moment the installation finishes,
click Next.
If you do not have the Product ID available right now, you can leave the box
empty, and click Next. You will need to provide the Product ID later, after
the server installation is over. Press No.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
3. Because you did not provide the correct ID, the installation process
cannot determine what kind of Windows Server 2008 license you own,
and therefore you will be prompted to select your correct version in
the next screen, assuming you are telling the truth and will provide
the correct ID to prove your selection later on.
4. If you did provide the right Product ID, select the Full version of the
right Windows version you‟re prompted, and click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
5. Read and accept the license terms by clicking to select the checkbox
and pressing Next.
6. In the “Which type of installation do you want?” window, click the only
available option –Custom (Advanced).
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
7. In the “Where do you want to install Windows?”, if you‟re installing the
server on a regular IDE hard disk, click to select the first disk, usually
Disk 0, and click Next.
If you‟re installing on a hard disk that‟s connected to a SCSI
controller, click Load Driver and insert the media provided by the
controller‟s manufacturer.
If you‟re installing in a Virtual Machine environment, make sure you
read the “Installing the Virtual SCSI Controller Driver for Virtual
Server 2005 on Windows Server 2008”
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
If you must, you can also click Drive Options and manually create a
partition on the destination hard disk.
8. The installation now begins, and you can go and have lunch. Copying
the setup files from the DVD to the hard drive only takes about one
minute. However, extracting and uncompressing the files takes a good
deal longer. After 20 minutes, the operating system is installed. The
exact time it takes to install server core depends upon your hardware
specifications. Faster disks will perform much faster installs…
Windows Server 2008 takes up approximately 10 GB of hard drive
space.
The installation process will reboot your computer, so, if in step #10
you inserted a floppy disk (either real or virtual), make sure you
remove it before going to lunch, as you‟ll find the server hanged
without the ability to boot (you can bypass this by configuring the
server to boot from a CD/DVD and then from the hard disk in the
booting order on the server‟s BIOS)
9. Then the server reboots you‟ll be prompted with the new Windows
Server 2008 type of login screen. Press CTRL+ALT+DEL to log in.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
10. Click on Other User.
14. The default Administrator is blank, so just type Administrator and press
Enter.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
11. You will be prompted to change the user‟s password. You have no
choice but to press Ok.
12. In the password changing dialog box, leave the default password
blank (duh, read step #15…), and enter a new, complex, at-least-7-
characters-long new password twice. A password like “topsecret” is
not valid (it‟s not complex), but one like “T0pSecreT!” sure is. Make
sure you remember it.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
13. Someone thought it would be cool to nag you once more, so now
you‟ll be prompted to accept the fact that the password had been
changed. Press Ok
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
18. Finally, the desktop appears and that‟s it, you‟re logged on and can
begin working. You will be greeted by an assistant for the initial server
configuration, and after performing some initial configuration tasks, you will
be able to start working.
Next, for the initial configuration tasks please follow my other Windows
Server 2008 articles found on the Related Windows Server 2008 Articles
section below.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
INSTALL LINUX KERNEL OPERATING SYSTEM
Make USB installer using DVD or ISO and save it to your USB flash drive
using RUFUS
Add the openSUSE-13.2-DVD-x86_64.ISO and save it to USB Flash
Disk and Click Start.
Setup the bios to boot in u in boot menu
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Follow the on-screen instruction
Click next Click next
In partitioning the hard disk select manual partition and make two
partition 10% for SWAP files and 60% for EXT4 partition under
SYSTEM FILES. Click next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
In Clock time zone select
ASIA and manila
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Use KDE as Desktop In Installation setting Select SOFTWARE
Go to server function and choose
File Server, Printer Server DHCP
Server, and DNS Server, in
included also select SAMBA
Server.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Click Install Click Install
Installing services
Follow the Onscreen procedures
Use your name as user and use
Css2015 as your password in
“root” use and “your name”
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
LEARNING OUTCOME NO. 4
Install application software
ASSESSMENT CRITERIA:
1. Application software are installed based on software installation
guides, end-user requirements and software license agreement
2. Variation to application software installation is carried out in
accordance to customer/client requirements
3. Software updates are accessed and installed in accordance with
manufacturer‟s recommendations and requirements
Contents:
1. Installing Application Software
2. Updating installed application software
Conditions
The students/trainees must be provided with the following:
1.
Computer
2.
USB/CD installer
3.
Productivity tools
4.
Utilities
a. Anti-virus
b. Virtualization software
c. Disk management software
d. Optical disk burning tool
e. Games
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.4-1
INSTALL ANTIVIRUS PROGRAM
These directions are for installing Norton Anti-Virus Corporate Edition
from http://studentav.hartford.edu.
Printed copies of these instructions are available in the Computer Support
Center that is located in the Computer Center, room CC113. If you have trouble
with this procedure, or need advice, call the Computer Support Center at (860)
768-5999.
Step 1: Click the "Install Now" button
This should be located in the lower left hand corner of the web site. Clicking
this button begins the process.
Step 2: Download the required files
After you click the "Install Now" button, the required files will automatically
download to your computer. This may take a while.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Step 3: The Installation
When the Welcome to the
InstallShield Wizard window
opens, click the "Next" button.
The next step in the installer
is the license agreement.
Choose the radio button that
says that you agree with the
license terms, and then click
the "Next" button.
For the Mail Snap-In
Selection, remove the check
from the Microsoft
Exchange/Outlook option,
and then click the "Next"
button.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
The default location for the
Destination Folder Selection is
correct, so click the "Next"
button.
How to Install, Configure, and use Avast Antivirus
Introduction
An essential piece of software for every computer is an Anti-Virus. An Anti-
Virus protects your computer from many common viruses and trojans which
can be deadly for you system. Avast Anti-Virus Free Edition is very good and
effective FREE Anti-Virus.
Downloading/Installation
Please visit this link: http://www.avast.com/eng/down_home.html and
download the version that matches your language.
Once you have downloaded it locate the file that you just downloaded. The icon
should appear like the image below:
Now double-click on the file to launch the installation of Avast!
Next you'll see this screen:
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Click next.
You will get another window with the ReadMe File, just click Next, again.
Now you get the beloved Legal Agreement, just click I agree, and then
click Next to continue. You will now see an image similar to the one below:
I would recommend using the "Typical" installation. Make sure Typical is
selected then click Next.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Now if you selected "Minimal" you won't see "skins" here. After reviewing this
for a second and confirming that what you have on your screen is similar to
mine, click the Next button. (Note: the "Free Space" will vary from computer to
computer. Since I have about 170 Gigabytes free that is why my Free Space is
so large.)
After pressing Next, you will get the above message. Basically if you
select Yes it will do a quick scan of your hard drive upon boot-up. This scan
will start before you log-in into Windows. I recommend you select No, because
even though this scan will only happen once, this scan can take quiet a while.
It took almost an hour for my hard drive.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
If you have Microsoft Anti-Spyware, or other similar program installed you may
be prompted with a similar message. Click the Allow button to allow this
change to take affect.
Now you have to restart your machine. I highly advise you to
select Restart and then click Finish.
After you restart you will get a message about Avast! it will give you the general
"Hello and Thank you for choosing our Product." Also after you restart you will
notice 2 new icons in the bottom right corner of the screen.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
The icon with the I is for the "Virus Recovery Database" (VRDB). What this does
is virtually makes copies of the program you have installed and if one of them
gets infected with a virus this will replace the files infected so the program
function like before. The A is the On-Access Protection.
Very Important - after restarting, right click on the A in the taskbar and
select Updating, the highlight Program.
You will get this popup after its done updating. If Avast! had to download
anything for your computer you may get a message asking you to restart.
Configuring
Now right click on the A in taskbar and click Start Avast! AntiVirus.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Click Program Registration and you will be taken to their website. Fill out the
form and then check you e-mail. Once you get an e-mail from them (usualy
about 1 minute after submitting the form) copy and paste the serial they
provided into the highlighted box. Then click ok.
Now you will see this screen. Click the little hard drive like icon in the top right
corner, below the X.
Click each icon on the right once until the options in the center read:
Scan local drives: ON
Scan removeable media: ON
Scan selected folders: ON
C:\
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Also adjust the slider at the top from Standard Scan to Thorough Scan, and
make sure to check "Scan Archive Files."
Now click on the A on the middle left side and adjust the Resident Protection
from Standard to High.
Ok now to set-up and configure the On-Access Protection.
Right click on the A on the taskbar
Click On-Access Protection Control
I recomend changing the default slide from Normal to High, depending on how
fast your system is.
What makes Avast! unique is that it scans many parts of the system. It scans
Instant Messenging, Internet Mail, Network Shield, Outlook/Exchange, P2P
Shield, Standard Shield and Web Shield. So regardless of what you do on the
computer you will be protected no matter what.
Scheduling a Scan
To schedule a scan:
(from: http://forum.avast.com/index.php?board=2;action=display;threadid
=3796)
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Go to Start > Programs > Accessories > System Tools > Scheduled
Tasks
Click (or double-click) on Add Scheduled Task
In the wizard that appears click Next - a list of programs will appear
Click Browse and navigate to C:\Program Files\Alwil
Software\Avast4 (or whatever folder in which you installed avast!)
Click (or double-click) on the file ashQuick.exe
On the next screen give the task a name of your choice and choose how
often you want it to run and click on Next
On the next screen choose the appropriate scheduling options and click
on Next
On the next screen enter the user name and password for the Windows
user you want the task to run as, then click on Next
On the next screen check the box for the option "Open advanced
properties for this task when I click Finish" , and then clickFinish
On the next screen, in the "Run" field you will see the path for the
ashQuick.exe program. After the closing quote enter a space and type in
the path(s) that
you want scanned. Multiple paths must be separated by a space and any
paths that include a space in the path name must be in quotes. Here are
a couple of examples:
"C:\Program Files\Alwil Software\Avast4\ashQuick.exe" C: E: - this
will scan the entire contents of the C: and E: drives
" C:\Program Files\Alwil Software\Avast4\ashQuick.exe" "C:Program
Files" E:Downloads - this will scan the contents of the Program Files
folder on the C: drive and the Downloads folder on the E: drive, including
all subfolders (Note the first path is in quotes due to the space in the
folder name "Program Files")
Click OK
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
In the Scheduled Tasks window, from the menu, click on Advanced and
choose "Start Using Task Scheduler"
To test your newly created task, from the Scheduled Tasks window, right-
click on the task's icon and choose "Run" from the popup menu. If the
scan doesn't begin correctly you'll get an error message. The problem is
most likely in the scan path (missing quotes or something like that.)
Close the Scheduled Tasks window
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.4-2
INSTALLING COMPUTER DRIVERS
Driver Pack Solution 13
1st Step: Run the driver pack application
2nd Step: Update and Install all missing Drivers or install other application
programs. Click Update all or Install specific drivers
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
3rd Step: Check and review the status list of all successfully installed Drivers.
Note: After this installation process, restart the Computer System to take effect
those processes.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Information Sheet 1.4-3
INSTALLING APPLICATION SOFTWARE
Computers are increasingly being used in almost every activity- business,
industry, commerce, health, education, entertainment, sports, etc.
Application programs is the catch-all name for all programs that are used
for carrying out specific tasks - office document creation, pay roll
processing, and etc.
INSTALL MICROSOFT OFFICE 2007
How to install Office 2007
Step 1: Insert the Microsoft Office 2007 Enterprise CD. If the Setup
Wizard does not automatically begin, then click Start > Run >
D:\setup.exe
Step 2: Enter the Product Key from the back of the CD jacket. Note: This
is a unique code. Please keep in a safe place!
Click Continue.
Step 3: Check the box "I accept the terms of this agreement" and click
the Continue button.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Step 4: Choose an installation option, Upgrade (removes Office 2003)
or Customize (keeps Office 2003 installed and adds Office 2007, allowing
you to use them both).
Note: Outlook 2003 will be uninstalled in either option. Outlook will be
updated and your user settings and mail will migrate to the new version.
If you click Upgrade, go on to Step 5.
If you click Customize, go on to Step 4a.
Step 4a: Click the radio button for "Keep all previous versions."
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Click the Installation Options tab, left-click the first drop down box and
click Run all from My Computer
Click Install Now.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Step 5: Installation will begin. It may take 15-30 minutes to finish.
Step 6: Click Close to complete the installation.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Step 7: The first time you launch any Office program, you will be
prompted to activate the software. As long as you have an active Internet
connection, choose the default option and click Next.
Step 8: When the activation finishes, click Close.
Step 9: Click OK to finish.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
INSTALL MICROSOFT OFFICE 2010
Installing Office 2010 is simple and is pretty much similar to Office
2007 installation procedure. Users who are switching from Office 2007
will definitely enjoy the improved UI and added features in the latest
version of Office. Here are the install screenshots of Office Professional
Plus 2010:
Click the check check box to accept the license agreement and click
Continue button.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Click Install Now…
Wait until the progress reaches its full length process…
Click Close to finally end the installation. That‟s it, you have just
installed the Microsoft Office 2010 application programs.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
LEARNING OUTCOME NO. 5
Conduct testing and documentation
ASSESSMENT CRITERIA:
1. Devices / systems and/or installation is tested to determine
whether it conforms to requirements
2. Stress test is conducted to ensure reliability of equipment in
accordance with manufacturer‟s instructions and system
requirements
3. 5S and 3Rs are followed according to environmental policies
4. Documentation in relation to the test is forwarded to appropriate
personnel and/or authority in accordance with requirements
Contents:
1. Safety procedures
2. Testing Procedures
3. Testing Stress
Conditions
The students/trainees must be provided with the following:
1. Computer
2. Testing Device
3. Processor
4. Video Card
5. Memory
6. Hard Disk
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Post Assembly Check
After you Build Your Own Cheap Computer, you need to make a comprehensive
Post Assembly Check. You should check the following:
All drive cables and power cables are properly connected.
The CPU heat sink/fan is properly attached and connected to the
motherboard.
Check to see that the memory modules are firmly seated in their sockets.
The Power Supply is properly connected to Motherboard.
The 110/220V switch is set to the proper voltage for your country.
Ensure that Video Card and Sound Card are properly installed in slots.
No wires or cables are pinched between components.
Ensure that there are no screws or metal parts stuck on the Motherboard
to cause a short-circuit.
Ensure that the peripherals such as keyboard, mouse and monitor are
properly connected to computer and power source.
First Time System Boot Up:
First Time System Boot Up:
It is now the moment of truth! You are now ready to power up your
computer.
Plug you‟re A/C power cord into a Surge Suppressor or, better yet, a UPS
backup system. A surge protector will protect your computer from power
surges.
A UPS (Uninterrupted Power Supply) is a backup system which will
constantly provide power to your computer system and will also protect it
against surges, spikes and brown-outs. If you have a UPS, you do not
need a surge protector.
1,2,3 …… Go! The power to your computer
is now on… You hear whirring sounds of
fans and see the blinking lights of the drives.
After all this, you also hear a single beep
and you should see a BIOS screen on the
Monitor.
The term BIOS means Basic Input Output
System and is the software that has all the
instructions on how the operating system
should communicate with the hardware.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.
Date Developed: Document No.
April 17, 2015 Issued by:
CBLM on Computer
Date Revised:
System Servicing
NCII Developed by:
Page __ of __
Install and Configure ICGI Trainer Revision #
iConnect Global Computer Systems
Institute, Inc.