0% found this document useful (0 votes)
11 views227 pages

Module 1 CSS Installing and Configuring Computer System G11 1ST SEM

This document is a training module for Grade 11 students on installing and configuring computer systems, designed to meet K to 12 Curriculum standards. It includes learning outcomes, assessment criteria, and a series of activities for students to complete at their own pace, emphasizing the development of 21st-century skills. The module also outlines the roles of facilitators and provides guidelines for recognizing prior learning and assessing competency.

Uploaded by

jeancarlaolaso28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views227 pages

Module 1 CSS Installing and Configuring Computer System G11 1ST SEM

This document is a training module for Grade 11 students on installing and configuring computer systems, designed to meet K to 12 Curriculum standards. It includes learning outcomes, assessment criteria, and a series of activities for students to complete at their own pace, emphasizing the development of 21st-century skills. The module also outlines the roles of facilitators and provides guidelines for recognizing prior learning and assessing competency.

Uploaded by

jeancarlaolaso28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 227

Computer System Servicing – Grade 11

Alternative Delivery Mode


Quarter 2 – Module 1: Install and Configure Computer Systems

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this module are owned by their respective copyright holders. Every effort has
been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over them.

Published by the Tagbilaran City Division


Schools Division Superintendent: Joseph Irwin A. Lagura
Assistant Schools Division Superintendent: Marcelo K. Palispis

Development Team of the Module


Writers: Floridel C. Pelin
Editors: Floridel C. Pelin
Reviewers: Neolita S. Sarabia. Joseph C. Barette
Illustrator:
Layout Artist:
Management Team: CID Chief: Beatriz C. Luga
Division EPS In Charge of LRMS: Neolita S. Sarabia
Division ADM Coordinator: Elizabeth R. Escolano

Printed in the Philippines by ________________________

Department of Education – Region VII

Office Address: Rajah Sikatuna Avenue, Dampas, Tagbilaran City


Telefax: (038)544-2147, 427-1702
E-mail Address: [email protected]
Introductory Message
For the facilitator:
Welcome to the Computer System Servicing – Grade 11 Alternative Delivery Mode
(ADM) Module on Quarter 2 – Module 1: Install and Configure Computer Systems!
This module was collaboratively designed, developed and reviewed by educators both
from public and private institutions to assist you, the teacher or facilitator in helping
the learners meet the standards set by the K to 12 Curriculum while overcoming their
personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration their
needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the
module:

Notes to the Teacher


This contains helpful tips or strategies that
will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this module. You
also need to keep track of the learners' progress while allowing them to manage their
own learning. Furthermore, you are expected to encourage and assist the learners as
they do the tasks included in the module.
SUMMARY OF COMPETENCY-BASED LEARNING MATERIALS

Install and configure computer


1. Installing and configuring ELC724331
systems computer systems

Computer
2. Set-up Computer Networks Setting-up ELC724332
Networks

Setting-up Computer
3. ELC724333
Set-up Computer Servers Servers

Maintain and Repair Computer Maintaining and


4. Repairing Computer ELC724334
Systems and Networks Systems and Networks

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 1
DR. CECILIO PUTONG NATIONAL HIGH SCH.
HOW TO USE THIS MODULE?

Welcome to the Module “Installing and Configuring Computer System”. This module
contains training materials and activities for you to complete.
The unit of competency “Install of and Configure Computer System” contains
knowledge, skills and attitudes required for a Computer Hardware Servicing NC II
course.
You are required to go through a series of learning activities in order to complete
each of the learning outcomes of the module. In each learning outcome there are
Information Sheets, Operation Sheets, and Activity Sheets. Follow these activities on
your own and answer the Self-Check at the end of each learning activity.
If you have questions, don’t hesitate to ask your teacher for assistance.
Recognition of Prior Learning (RPL)
You may already have some of the knowledge and skills covered in this module because
you have:
• been working for some time
• Already have completed training in this area.
If you can demonstrate to your teacher that you are competent in a particular
skill or skills, talk to him/her about having them formally recognized so you don’t have
to do the same training again. If you have a qualification or Certificate of
Competency from previous trainings show it to your teacher. If the skills you acquired
are still current and relevant to this module, they may become part of the evidence
you can present for RPL. If you are not sure about the currency of your skills, discuss it
with your teacher.
After completing this module ask your teacher to assess your competency.
Result of your assessment will be recorded in your competency profile. All the learning
activities are designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.

In this module, you are required to go through a series of learning activities in order to
complete each learning outcome. In each learning outcome are Information Sheets,
Self-Checks, Task Sheets and Job Sheets. Follow and perform the activities on your
own. If you have questions, do not hesitate to ask for assistance from your facilitator.
Remember to:
• Read information sheets and complete the self-checks. Suggested references
are included to supplement the materials provided in this module.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 2
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Perform the Task Sheets and Job Sheets until you are confident that your outputs
conform to the Performance Criteria Checklist that follows the sheets.
• Submit outputs of the Task Sheets and Job Sheets to your facilitator for evaluation
and recording in the Accomplishment Chart. Outputs shall serve as your portfolio
during the Institutional Competency Evaluation. When you feel confident that
you have had enough practice, ask your trainer to evaluate you.
The results of your assessment will be recorded in your Progress Chart and
Accomplishment Chart and Class Record.
• You must pass the Institutional Competency Evaluation/Summative Test for this
competency before moving to another competency. A Certificate of
Achievement will be awarded to you after passing the evaluation. You need to
complete this module before you can perform the module on Setting-up
Network.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 3
DR. CECILIO PUTONG NATIONAL HIGH SCH.
MODULE CONTENT

QUALIFICATION COMPUTER SYSTEM SERVICING NC II


UNIT OF COMPETENCY Install and Configure Computer System
MODULE TITLE Installing of and Configure Computer System
INTRODUCTION:
This unit covers the outcomes required in installing and configuring desktop and
workstation computers systems. It consists of competencies to assemble computer
hardware, install operating system and drivers for peripherals/devices, and install
application software as well as to conduct testing and documentation.

LEARNING OUTCOMES:
1. Assemble computer hardware
2. Prepare installer
3. Install operating system and drivers for peripherals/ devices
4. Install application software
5. Conduct testing and documentation

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 4
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ASSESSMENT CRITERIA:
1. Plan and prepare Installation to ensure that safety measures, policies and
procedures followed, and that work is appropriately sequenced in accordance
with the industry standards
2. Consult Technical personnel to ensure that the work coordinated effectively with
others involved on the worksite
3. Obtain Computer systems and network devices in accordance with the
established procedures and to comply with requirements
4. Install Location where devices and systems to be is determined from job
requirements
5. Obtain Materials necessary to complete the work in accordance with established
procedures and checked against job requirements
6. Obtain Tools, equipment and testing devices needed to carry out the installation
work in accordance with established procedures and checked for correct
operation and safety
7. Check Preparatory work to ensure that no unnecessary damage has occurred,
and that work complies with requirements
8. Follow Standard procedures for OHS in installing devices/systems.
9. Install Operating systems/ devices according to workplace standards.
10. Do Modification and innovation of devices/systems during installation with the
consent of the client.
11. Carry out Installation of the devices/systems in consonance with the unit of
specification
12. Carry out Unplanned events or conditions following the unit of specification and
procedure.
13. Implement Approval obtained before any contingencies based on established
procedure.
14. Follow Standard testing procedures strictly for the newly installed device/system.
15. Follow OH&S policies strictly resulting to no lost time injury.
16. Carry out Specified testing procedures for circuit and system.
17. Installed devices/systems are protected against loss/damage in accordance with
established standard
18. Obtain Approval before any validation or testing is employed.
19. Conform Installation proceedings, devices/systems test with
specified requirements.
20. Notice Every device system to cause malfunction of the system is removed, tested
and returned to pretest condition in accordance with the established procedures.
21. Undertake Final inspection, testing and validation to ensure quality performance
of the system.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 5
DR. CECILIO PUTONG NATIONAL HIGH SCH.
22. Submit Documentation of the performed job to a laboratory teacher following
the format given.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 6
DR. CECILIO PUTONG NATIONAL HIGH SCH.
LEARNING OUTCOME SUMMARY

LEARNING OUTCOME #1: ASSEMBLE COMPUTER HARDWARE

CONTENTS:
1. OHS Policies and Procedures
2. Types and parts of computers
3. Peripheral devices
4. Computer Systems design
5. Motherboards
6. Multimedia storage devices
7. CMOS and Basic-Input-Output-System (BIOS)

ASSESSMENT CRITERIA:

1. Plan and prepare Unit assembly to ensure OHS policies and procedures are followed
in accordance with systems requirements.
2. Prepare unit assembly to ensure OHS policies and procedures are followed in
accordance with system requirements.
3. Identify and obtain materials necessary to complete the work in accordance with
established procedures and checked against systems requirements
4. Obtain Tools, equipment and testing devices needed to carry out the installation
work in accordance with established procedures and check for correct operation
and safety.
5. Assemble Computer hardware in accordance with established procedures and
systems requirements
6. Perform Basic-input-output-system (BIOS) configuration in accordance with
hardware requirements.

CONDITION:
Students/trainees must be provided with the following:
• Personal Protective equipment ( ex. protective eyewear, anti-static wrist wrap)
• Electronic laboratory hand tools (assorted pliers, assorted screw drivers,
soldering iron & desoldering tool)
• Flashlights
• Mirror (inspection)
• Hand-outs
• PC System
EVALUATION METHOD:
1. Written Test
2. Demonstration with oral questioning
3. Observation with oral questioning
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 4
DR. CECILIO PUTONG NATIONAL HIGH SCH.
LEARNING EXPERIENCE Learning Outcome No. 1: Assemble Computer Hardware

Learning Activities Special Instructions


1. Read information sheet 1.1-1 If you have some problem on the content of the
” OHS Policies and Procedures” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
2. Answer self-check 1.1-1 Compare your answer to the answer key 1.1-1. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not
review the information sheet and go over the
selfcheck again.

3. Read information sheet 1.1-2 If you have some problem on the content of the
“Types and Parts of the information sheet don’t hesitate to approach your
Computer System” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
4. Answer self-check 1.1-2 Compare your answer to the answer key 1.1-2. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not
review the information sheet and go over the
selfcheck again.

5. Read information sheet 1.1-3 If you have some problem on the content of the
information sheet don’t hesitate to approach your
“Computer System Design”
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
6. Answer self-check 1.1-3 Compare your answer to the answer key 1.1-3. If you
got 100% correct answer in this self-check, you can
now move to the next task sheet. If not review the
information sheet and go over the self-check again.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 5
DR. CECILIO PUTONG NATIONAL HIGH SCH.
7. Read information sheet 1.1-4 If you have some problem on the content of the
information sheet don’t hesitate to approach your
“Peripheral Devices” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
8. Answer self-check 1.1-4 Compare your answer to the answer key 1.1-4. If you
got 100% correct answer in this self-check, you can
now move to the next Learning Outcome. If not
review the information sheet and go over the
selfcheck again.
9. information sheet 1.1-5 If you have some problem on the content of the
“Motherboards” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
10. information sheet 1.1-6 If you have some problem on the content of the
“Multimedia storage devices” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.

11. information sheet 1.1-7 If you have some problem on the content of the
information sheet don’t hesitate to approach your
“CMOS and Basic-Input-Output-
facilitator.
System (BIOS) Configuration”
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 6
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-1

OHS POLICIES AND PROCEDURES

Learning Objective:

1. Define OHS
2. Apply OHS policies and procedures in a workplace.
3. Value the importance of Occupational health and safety.
4. Understand and appreciate the importance of safety in dealing with
computers.

Introduction
OCCUPATIONAL HEALTH AND SAFETY
Control aspects of work production that involve
any degree of risk or danger that may cause
injury or harm.
 This process eliminates such elements to
ensure employee safety & health.

OHS Policies and Procedures

OHS Policies and Procedures are a major part of protecting the safety, health and
welfare of people engaged in work or employment. Having a clear set of OHS Policies
and Procedures will make it clear to all concerned where the guidelines and
boundaries are in relation to the operation of the business.

Most OHS Policies and Procedures follow a similar format, the generally include:

• AIM: The main goal that the policy intends to achieve


• POLICY: This would be the actual working document. This is the specifics of what
needs to be done and how the company will achieve its goal.
• PROCEDURES: This would explain a step by step process on how a task should be
done safely.

The Reasons for OH & S:

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 7
DR. CECILIO PUTONG NATIONAL HIGH SCH.
 Eliminates possible danger.
 Safeguard employee productivity.
 Means to promote
workplace processes.
 Protect employee rights.
 Maintain worker health.

Prevention (The Best Cure) The


4 Step System:
SAFE
Spot the Hazard
Assess the Risk
Fix the Problem
Evaluate Result
Personal Safety While Working Along with PC’s

1. Turn off the computer and all peripherals.

2. Touch an unpainted metal surface on the computer chassis, such as the metal
around the card-slot openings at the back of your computer, before touching
anything inside your computer.
3. Do not work alone so that there's someone who can take care of you in case of
emergency
4. Always power off the computer and unplug the computer before working on it.
5. Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.
6. Be careful with tools that may cause short circuit.
7. Always ground or discharge yourself before touching any part of the computer.
8. Do not use excessive force if things don't quite slip into place.
9. Clean the area before and after using it to maintain sanitation and prevent
accidents.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 8
DR. CECILIO PUTONG NATIONAL HIGH SCH.
10. Hold the components on the edges and do not touch the Integrated Circuit
(IC) parts.
11. Always wear personal protective equipment (PPE) in accordance with the
organization's OHS procedures and practices.
12. Make sure that the pins are properly aligned when connecting a cable
connector.
13. Contingency measures during workplace accidents, fire and other
emergencies are recognized.
14. Use brush, compressed air or blower in cleaning the computer system

NOTE: Before disconnecting a peripheral from the system or removing a


component from the system board, verify that the standby power light-emitting diode
(LED) on the system board has turned off.

COMMON HAZARDS

A hazard is a situation in the workplace that has the potential to harm the health and
safety of people or to damage plant and equipment. The situation could involve a
task, chemical or equipment used. Hazard management is a continuous process that
can be used to improve the health and safety of all workplaces.

• Chemical hazards: Toxins, corrosives, flammables, and reactive


• Biological hazards: Microbes, animals, plants, and genetically modified agents
• Radiation hazards: Ionizing and nonionizing radiation
• Physical hazards: Heating devices, noise, projectiles, fire, cold, etc.
• Electrical hazards: Fire and shock
• Mechanical hazards: Moving machinery
• Airborne hazardous materials: Vapors, dust, etc. • Ergonomic factors: Standing,
repetitive motion

THE WORKPLACE SHOULD HAVE SAFETY

GUIDELINES TO FOLLOW TO:

 Protect people from injury


 Protect equipment from damage
 Protect the environment from contamination

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 9
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.1-1

A. True or False: Read the statements carefully. Write True if the statement is correct
and False if it is incorrect.

1. Hold the components on the edges and do not touch the Integrated Circuit
(IC) parts.
2. Touch directly any part of the computer when performing repairs.
3. A hazard is anything that could hurt you or someone else.
4. DO NOT Use brush, compressed air or blower in cleaning the computer system.
5. Leave the area without cleaning.

B. Essay:
A. What are the reasons of OH & S?
B. Why do we need to follow OHS?

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 10
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.1-1
A.

1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. FALSE
B.
1. The Reasons for OH & S:
• Eliminates possible danger.
• Safeguard employee productivity.
• Means to promote workplace processes.
• Protect employee rights.

2. To protect the safety, health and welfare of people engaged in work or


employment. Having a clear set of OHS Policies and Procedures will make it clear
to all concerned where the guidelines and boundaries are in relation to the
operation of the business.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 11
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-2

TYPES AND PARTS OF THE COMPUTER SYSTEM

Learning Objective:
1. Identify the different parts of the computer systems.
2. Familiarize each part and functions of the computer system.
3. Assemble and Disassemble Computer Hardware.
4. Follow the safety procedures in handling PC components.

Introduction

A computer is a machine that can be programmed to manipulate symbols.

Principal characteristics of a computer

• It responds to a specific set of instructions in a


welldefined manner.
• It can execute a pre-recorded list of instructions (a
program).
• It can quickly store and retrieve large amounts of
data.

A computer is not an acronym and sometimes abbreviated as comp or 'puter. The


term "computer" was originally given to humans (human computers) who performed
numerical calculations using mechanical calculators, such as the abacus and slide
rule. The term was later given to a mechanical device as they began replacing the
human computers. Today's computers are electronic devices that accept data
(input), process that data, produce output, and then store (storage) the results.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 12
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TYPES OF COMPUTER

Workstation

A workstation is a high-end personal computer


designed for technical or scientific applications. Used
by one person at a time, they are commonly
connected to a local area network and run multi-user
operating systems.

Desktop computer
The term 'desktop' refers specifically to a horizontally-oriented
case, the personal computer (PC) defines a computer
designed for general use by a single person.

Single unit
Single unit PCs (also known as all-in-one PCs) are a subtype
of desktop computers, which combine the monitor and case
of the computer within a single unit.

Nettop
A nettop (or miniature PC, Mini PC or Smart Micro PC)
is a small-sized, inexpensive, low-power, legacy-free
desktop computer designed for basic tasks such as
Internet surfing, accessing web-based applications,
document processing, and audio/video playback.

Laptop
Also called notebooks, laptops
are portable computers that integrate the display, keyboard, a
pointing device or trackball, processor, memory and hard drive
all in a battery-operated package slightly larger than an
average hardcover book.

Netbook

It is a generic name given to a category of small, lightweight, legacyfree,


and inexpensive laptop computers that were introduced in 2007.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 13
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Tablet PC

A tablet PC is a notebook or slate-shaped mobile computer,


first introduced by Pen computing in the early 90s with their
PenGo Tablet Computer and popularized by Microsoft. Its
touchscreen or graphics tablet/screen hybrid technology
allows the user to operate the computer with a stylus or digital
pen, or a fingertip, instead of a keyboard or mouse.

Ultra-Mobile PC

Ultra Mobile PC (UMPC) is a small handheld computer


with the capacity to run the Windows operating system
(OS).

Home theater PC

A home theater PC (HTPC) is a convergence device


that combines the functions of a personal computer
and a digital video recorder. It is connected to a
television or a television-sized computer display and
is often used as a digital photo, music, video player,
TV receiver and digital video recorder.

Pocket PC

A Pocket PC (P/PC, PPC), also known by Microsoft as a 'Windows


Mobile Classic device', is a kind of personal digital assistant (PDA)
that runs the Windows Mobile operating system. It has some of the
abilities of modern desktop PCs.

PARTS OF THE COMPUTER SYSTEM

Hardware- the physical, touchable, electronic and mechanical parts of a computer


system.

Processor
The central processing unit, or CPU, is part of a computer which
executes software program instructions.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 14
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Computer Case
A computer case is the enclosure that contains the
main components of a computer. Cases are usually
constructed from steel or aluminum. Cases can come
in many different sizes, or form factors.

Motherboard
The motherboard, also referred to as system
board or main board, is the primary circuit board
within a personal computer.

Hard disk

Mass storage devices store programs and data even


when the power is off; they do require power to perform
read and write functions during usage.

Main memory

A PC's main memory is fast storage that is directly


accessible by the CPU, and is used to store the currently
executing program and immediately needed data.

Adapter Cards

The video card - otherwise called a graphics card, graphics adapter or video adapter
- processes and renders the graphics output from the computer to the computer
display, and is an essential part of the modern computer.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 15
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Visual Display Unit

A visual display unit (or monitor) is a piece of electrical equipment,


usually separate from the computer case, which displays viewable
images generated by a computer without producing a permanent
record.

Keyboard
A keyboard is an arrangement of buttons that each
correspond to a function, letter, or number. They are the
primary devices of inputting text.

Mouse
A computer mouse is a handheld hardware input device that
controls a cursor in a GUI and can move and select text, icons, files,
and folders.

Mass storage

Mass storage refers to systems meant to store large


amounts of dataModern mass storage devices include
all types of disk drives and tape drives.

LAN Card – is a network


interface card. This is a computer circuit board or
card that is installed in a computer so that it can be
connected to a network.

Modem - (Modulator-Demodulator)
The modem is a device that allows a given computer to share
data or otherwise a device which let computers exchange
information.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 16
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Ports
External connecting sockets on the outside of the computer. This is a pathway into
and out of the computer. A port lets users plug in outside peripherals, such as monitors,
scanners and printers.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 17
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.1-2

A. Multiple Choice
Direction: Choose the best answer of the given choices. Use a separate sheet of
paper in answering.
1. It is a high-end personal computer designed for technical or scientific applications.
Intended primarily to be used by one person at a time, they are commonly
connected to a local area network and run multi-user operating systems.

A. Workstation B. Nettop C. Laptop D. Tablet PC

2. It is a small personal computer designed for portability. Usually all of the interface
hardware needed to operate this computer, such as USB ports (previously parallel
and serial ports), graphics card, sound channel, etc., are built in to a single unit.

A. Workstation B. Nettop C. Laptop D. Tablet PC

3. It is a convergence device that combines the functions of a personal computer


and a digital video recorder.

A. Workstation B. Home theater PC C. Laptop D. Tablet


PC

4. It is a hardware specification for a handheld-sized computer (personal digital


assistant) that runs the Microsoft Windows Mobile operating system.

A. Workstation B. Home theater PC C. Laptop D. Pocket


PC

5. It is also called mini notebooks or subnotebooks and are a rapidly evolving


category of small, light and inexpensive laptop computers suited for general
computing and accessing web-based applications

A. Netbook B. Home theater PC C. Workstation D. Pocket


PC

6. It is the enclosure that contains the main components of a computer.

A. Mother Board B. Computer Case C. Processor D. Hard


Disk

7. It is the part of a computer which executes software program instructions.

A. Mother Board B. CPU C. Processor D. Hard Disk

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 18
DR. CECILIO PUTONG NATIONAL HIGH SCH.
8. It is also referred to as system board or main board, and is the primary circuit board
within a personal computer.

A. Mother Board B. CPU C. Processor D. Hard Disk

9. It processes and renders the graphics output from the computer to the computer
display.

A. Memory B. CPU C. Video card D. Hard Disk

10. It is a piece of electrical equipment, usually separate from the computer case,
which displays viewable images generated by a computer without producing a
permanent record.

A. Memory B. CPU C. Printer D. Monitor

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 19
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.1-2
1. A

2. C

3. B
4. D

5. A

6. B

7. B
8. A

9. C

10. D

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 20
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-3

PERIPHERAL DEVICES

Learning Objective:

1. Classify the different peripheral devices.


2. Familiarize the uses and function of peripheral devices.
3. Install peripheral devices in a computer system within the standard
requirements.

Introduction

Peripheral device is any component or piece of equipment that expands a


computer’s input, storage, and output capabilities. Peripheral devices serve specific
purpose, enhance a computer’s functions, or add new service or additional
resources.

CLASSIFICATION OF PERIPHERAL DEVICES

1. Input Devices 2. Output device.

1. Monitor – is the display device that takes the electrical signals


from the video card and forms an image using points of
colored light on the screen.

2. Speaker – plays sounds transmitted as electrical signals


from the sound card.

3. Printer - an output device that produces text and


graphics on paper.

4. Keyboard – an input device that converts letters, numbers, and other characters
into electrical signals readable by the processors.

5. Mouse – is used for inputting commands and to manipulate objects


viewed on the computer display screen.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 21
DR. CECILIO PUTONG NATIONAL HIGH SCH.
6. Microphone - a device that converts sounds to electrical signals by
means of a vibrating diaphragm.

7. Scanner - it is an input device that reads text or illustration printed


on paper, translates the information into a form that a computer
can use.

8. Digital Camera – use a light-sensitive processor chip to capture


photographic images in digital form on a small diskette inserted in
the camera or on flash memory chips.

9. Graphic tablet – objects are drawn using a pen or a puck. The


puck is technically a tablet cursor, not a mouse.

10. Joystick - a hand-held control stick that allows a player to


control the movements of a cursor on a computer screen or
a symbol in a video game.

OTHER TYPES OF INPUT DEVICES

• Audio conversion device


• Barcode reader
• Biometrics (e.g., fingerprint scanner).
• Business card reader
• EEG (electroencephalography)
• Finger (with touch screen or Windows Touch).
• Gamepad, joystick, paddle, steering wheel, and Microsoft Kinect.
• Gesture recognition
• Graphics tablet
• Keyboard
• Light gun
• Light pen
• Magnetic ink (like the ink found on checks).
• Magnetic stripe reader
• Medical imaging devices (e.g., X-ray, CAT scan, and ultrasound images).
• MIDI keyboard
• MICR
• touchpad or other pointing devices.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 22
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• OMR (optical mark reader)
• Paddle
• Pen or stylus
• Punch card reader
• Remote
• Sensors (e.g., heat and orientation sensors).
• Sonar imaging devices • Stylus (with touch screen).
• Touch screen
• Voice (using voice speech recognition or biometric verification).
• Video capture device
• VR helmet and gloves
• Yoke

OTHER TYPES OF OUTPUT DEVICES


OUTPUT DEVICES
An output device is any device used to send data from a computer to another device
or user.

• 3D Printer
• Braille embosser
• Braille reader
• COM (Computer Output Microfilm)
• Flat-panel
• GPS
• Headphones
• Monitor
• Plotter
• Printer (dot matrix printer, inkjet printer, band laser printer)
• Projector
• Sound card
• Speakers
• SGD (Speech-generating device)
• TV
• Video card

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 23
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.1-4

A. Multiple Choice. Write the letter of the correct answer. Use a separate sheet of
paper in answering.

1. What do you call a device converts computer output into display images?

A. Floppy disk B. Monitor C. Printer D. Processor

2. Which of the following is a secondary storage device?


A. Floppy Disk Drive B. Memory Chip C. Printer D. Processor

3. If you want to enhance your computer’s capabilities, which would you install?
A. Monitor B. Sound Card C. Speaker D. Video Card

4. What part of the main circuit board would you connect a peripheral device such
as keyboard, printer or video monitor?
A. The Bus B. Port C. Expansion Slot D. Cable

5. You want a hard copy of your input, which would provide you this?
A. Monitor B. Printer C. Speaker D. Video Camera

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 24
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.1-3

1. A
2. C
3. D
4. B
5. C

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 25
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-4

COMPUTER SYSTEMS DESIGN

Learning Objective:

1. Know the Architecture of the computer system.


2. Describe the design of the Computer system.
3. Understand the concept of a computer system design.

Introduction

Why Study Computer Architecture?

 User

• Understand system capabilities and limitations


• Make informed decisions
• Improve communications with information technology professionals

 Systems Analyst

• Conduct surveys, determine feasibility and define and document user


requirements
• Specify computer systems to meet application requirements

 Programmer

• Create efficient application software for specific processing needs

Input-Process-Output Model (IPO)

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 26
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Input: keyboard, mouse, scanner, punch cards
• Processing: CPU executes the computer program
• Output: monitor, printer, fax machine
• Storage: hard drive, optical media, diskettes, magnetic tape

Architecture Components

 Hardware
 Processes data by executing instructions
 Provides input and output
 Software
 Instructions executed by the system
 Data
 Fundamental representation of facts and observations
 Communications
 Sharing data and processing among different systems

Hardware Component

 Input/Output devices
 Storage Devices  CPU
 ALU: arithmetic/logic unit
 CU: control unit
 IU: Interface unit
 Memory
 Short-term storage for CPU calculations

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 27
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Typical Personal Computer System

CPU: Central Processing Unit

 ALU: arithmetic/logic unit


 Performs arithmetic and Boolean logical calculations  CU: control unit
 Controls processing of instructions
 Controls movement of data within the CPU  Interface unit
 Moves instructions and data between the CPU and other hardware
components
 Bus: bundle of wires that carry signals and power between different
components

Memory

 Also known as primary storage, working storage, and RAM (random access
memory)
 Consists of bits, each of which hold a value of either 0 or 1 (8 bits = 1 byte)
 Holds both instructions and data of a computer program (stored program
concept)

Software Component
 Applications
 Operating System
 API: application program interface
 File management
 I/O
 Kernel
• Memory management
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 28
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Resource scheduling
• Program communication
• Security

Communications Component

Hardware
 Communication channels
• Physical connections between computer systems
• Examples: wire cable, phone lines, fiber optic cable, infrared light, radio waves

 Interface hardware
• Handles communication between the computer and the communication
channel
• Modem or network interface card (NIC)

 Software
• Network protocols: HTTP, TCP/IP, Advance Technology Attachment Packet
Interface

Computer Systems

All computer systems, no matter how complex, consist of the following:


• At least one CPU
• Memory to hold programs and data
• I/O devices
• Long-term storage

Protocols

• Common ground rules of communication between computers, I/O devices,


and many software programs

 Examples

• HTTP: between Web servers and Web browsers


• TCP/IP: between computers on the Internet and local area networks
• ATAPI: between a CPU and CD-ROMs

Standards

 Created to ensure universal compatibility of data formats and protocols


 May be created by committee or may become a de facto standard through
popular use  Examples:

• Computer languages: Java, SQL, C, JavaScript


• Display standards: Postscript, MPEG-2, JPEG, GIF

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 29
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Character set standards: ASCII (American Standard Code for
Information Interchange), Unicode, EBCDIC (Extended Binary Coded
Decimal Interchange Code)
• Video standards: VGA, XGA (Extended Graphics Array), RGB

SELF-CHECK 1.1-4

Test I. Enumeration

1 - 4 Computer Systems

5 - 6 Software Component

Test II. Essay

1. Describe the Computer Architecture in fifty (50) words only.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 30
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.1-4

Test I.

a. All computer systems

1. At least one CPU


2. Memory to hold programs and data
3. I/O devices
4. Long-term storage

b. Software Component

1. Applications 2.
Operating System

Test II.

Computer architecture is a specification detailing how a set of software and


hardware technology standards interact to form a computer system or platform.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 31
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-6

MOTHERBOARD

Learning Objective:

1. Define Motherboard
2. Describe the parts of the motherboard.
3. State the importance of the motherboard in the computer system.

Introduction
The motherboard is a printed circuit
board that is the foundation of a
computer, located on the back side or at
the bottom of the computer case. It
allocates power to the CPU, RAM,
and all other computer hardware
components. Most importantly,
the motherboard allows
hardware components to communicate
with one another. Alternatively referred to
as

the mb, mainboard, mobo, mobd, backplane board, base board, main circuit board,
planar board, system board, or a logic board on Apple computers.

Brief History of the Motherboard

Prior to the creation of microprocessors, computer systems were assembled in


mainframes, with gears which were linked by a backplane that had numerous slits for
linking wires. In previous plans, wires were required to bond card connector pins
however, quickly they became an object of past with the discovery of printed circuit
boards. The memory, CPU and additional peripherals were all created on this PCB.

At some stage in the 1990s, it was discovered that escalating the quantity of
peripheral supports on the printed circuit board was very cost-effective. Therefore, ICs
(single Integrated Circuits), proficient of sustaining low-speed peripherals such as
mouse, keyboards, serial ports, etc., were integrated on the motherboards. During the
late 1990s, they started to include full series of audio, video, networking as well as
storage functions on them. Advanced end functions for graphic cards and 3D gaming
were in addition incorporated later.
Micronics, AMI, Mylex, Orchid Technology, DTK, Elitegroup, etc. were a small number
of corporations that were early leaders in the development of motherboard but,
groups such as IBM and Apple soon took over. They provided high-end, complicated
motherboards that integrated better attributes and greater functioning over existing
motherboards.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 32
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TYPES OF MOTHERBOARD

a. Integrated Motherboards
Integrated motherboards have all the peripheral device slots, input output ports, serial
and parallel ports are mounted on the board. The connectors for the various devices
such as the hard drive connector and floppy disk drive connector are installed directly
on to the motherboard. The major disadvantage of these types of motherboards are
that if an individual component of the motherboard fails, the whole board may need
to be replaced and that can be a costly affair at times.

b. Non-integrated Motherboards
• Non-Integrated motherboards have RAM slots integrated on the board. All the
input-output ports for devices such as the serial and parallel port connectors,
other controllers such as connectors for hard drive and floppy disk drives are
attached to the system using expansion boards.

Types of Non-Integrated Motherboards

• Whole board is costlier as compared to integrated board as all the devices and
ports, and other connectors for the devices need to be installed individually.

• The Non-integrated Motherboards are almost extinct because these types of


motherboards are Costly and not very space efficient.

• Desktop Motherboards is used in personal computers and desktops. As it is used


for applications at home and in office, this type of motherboard is the most
basic type.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 33
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PARTS OF THE MOTHERBOARD

Expansion Slots
Alternatively referred to as a bus slot or expansion port, an expansion slot is connection
or port located inside a computer on the motherboard or riser board that allows a
computer hardware expansion card to be connected.

Accelerated Graphic Port (AGP)


The AGP channel is 32-bits wide and runs at
66 MHz, which is a total bandwidth of 266
MBps and much greater than the PCI
bandwidth of up to 1.07 GBps.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 34
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Peripheral Component Interconnect ( PCI)
Used to describe a common connection interface for
attaching computer peripherals to a
PC's motherboard, or main circuit board. It is also
called a PCI bus. A bus is a term for a path between
the components of a computer.

Case Fan
Referred to as a system fan, Case Fans help bring cool air
into and blow hot air out of the case.

Back Pane Connector (Connection)

A connection is a term that describes the link between a plug or connector into a port
or jack.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 35
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Heat Sink
A heat sink is an electronic device that incorporates
either a fan or a peltier device to keep a hot component
such as a processor cool.

Types of Heat sink:


1. Active
2. Passive

Active heat sinks utilize power and are usually a fan type
or some other Peltier cooling device.

Passive heat sinks are made of an aluminum-finned radiator that dissipates heat
through convection. For passive heat sinks to work to their full capacity, it is
recommended that there is a steady air flow moving across the fins.

4-Pin (P4) Power Connection


The P4 cable is a 12V power supply cable has two black
wires that serve as a ground and two yellow wires that are
+12VDC and is connected to a four-pin connection on the
motherboard.

Inductor (Coil)
Short for electromagnetic coil, a coil is conductor wire such
as copper in a cylindrical form around an iron core that
creates an inductor or electromagnet to store magnetic
energy. Coils are often used to remove power spikes and
dips from power. A coil can also refer to a spring.

Capacitor
A capacitor is a component made of two or sets of two
conductive plates with a thin insulator between them and
wrapped in a ceramic and plastic container. When the capacitor
receives a direct current (DC), a positive charge builds up on one
of the plates (or set of plates) while a negative charge builds up
on the other.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 36
DR. CECILIO PUTONG NATIONAL HIGH SCH.
CPU Socket
When referring to a processor, a CPU socket or processor socket is a
connection that allows computer processors to be connected to a
motherboard.

Northbridge
Alternatively referred to as the PAC
(PCI/AGP Controller) and NB, the Northbridge is an
integrated circuit responsible for
communications between the CPU interface,
AGP, and the memory.
Northbridge is directly connected to these
components and acts like a "bridge" for the
Southbridge chip to communicate with the CPU, RAM,
and graphics controller.

Southbridge is an IC on the motherboard responsible


for the hard drive controller, I/O controller and
integrated hardware. Integrated hardware can
include the sound card and video card if on the
motherboard, USB, PCI, ISA, IDE, BIOS, and Ethernet.

Screw Holes and Standouts screw holes can be easily identified because they'll have
metal surrounding each hole. Some earlier motherboards may also have holes without
metal surrounding the hole.

Sometimes referred to as a standoff and spacer, standouts are


small metal or plastic screws that attaches to a computer case
and holds the motherboard to the case.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 37
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Memory Slots
A memory slot, memory socket, or RAM slot is
what allows computer memory (RAM) to be
inserted into the computer.

SIO (Super Input/Output)


Short for super input/output or Super I/O, SIO is an integrated
circuit on a computer motherboard that handles the slower and
less prominent input/output devices. Super I/O communicates
through the Southbridge and is still used with computers to support
older legacy devices.

Computer devices handled by the Super I/O


• Game port
• Infrared
• Intrusion detection
• Keyboard and mouse (non-USB)
• Parallel port
• Real-time clock (RTC)
• Serial port (UART)
• Temperature sensor and fan speed

Integrated Drive Electronics (IDE)


Integrated Drive Electronics or IBM Disc Electronics, IDE is more commonly known as
ATA or Parallel ATA (PATA). It is a standard interface for IBM compatible hard drives
and CD or DVD drives. IDE is different than SCSI and Enhanced Small Device Interface
(ESDI) because its controllers are on each drive, meaning the drive can connect
directly to the motherboard or controller.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 38
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ATX Style Connector

An ATX style connector A power supply with a 24-pin connector


can be used on a motherboard with a 20-pin connector by
leaving the four additional pins disconnected.

SATA
Short for Serial ATA, SATA 1.0 was first released in August 2001 and is a replacement for
the Parallel ATA interface used in IBM compatible computers. Serial ATA can deliver
1.5 Gbps (1500 MBps) of performance to each drive within a disk array. This cable
helps make a much easier cable routing and offers better airflow in the computer
when compared to the earlier ribbon cables used with ATA drives.

CMOS is short for Complementary Metal-Oxide Semiconductor.


CMOS is an on-board, battery powered semiconductor chip
inside computers that stores information. This information ranges
from the system time and date to system hardware settings for
your computer. Alternatively referred to as a Real-Time Clock
(RTC), Non-Volatile RAM (NVRAM) or CMOS RAM,

RAID
Short for Redundant Array of Inexpensive Disks, RAID is an assortment of hard drives
connected and setup in ways to help protect or speed up the performance of a
computer's disk storage. RAID is commonly used on servers and high-performance
computers.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 39
DR. CECILIO PUTONG NATIONAL HIGH SCH.
System Panel Connector
Referred to as the fpanel or front panel connector, the system
panel connector or system panel header controls a computer
power button, reset button, and LED's. The System panel cables, as
shown in the picture are two wire cables that are color coded to
help identify where they connect to the motherboard system
panel connector. The black or white wire is the ground (GND) wire
and the colored wire is the powered wire. The cables, colors, and
connections vary depending on the computer case and
motherboard you have, however, generally include the cables
mentioned below.

Types of system panel cables


• HDD LED (IDE LED) - The LED activity light for the hard drive.
This is the LED that flashes as information is being written and
read from the hard drive.
• Power LED (PLED) - The LED power light, which indicates
when the computer is on, off, or in Standby.
• Power SW (PWRSW) - Controls the power button that allows
you to turn on and off the computer.
• Reset SW - Handles the reset button to restart the computer.
• Speaker - The internal speaker used to sound the beep noises you hear from
your computer when it is booting.

Firmware Hub, FWH is part of the Intel Accelerated Hub


Architecture that contains both the system BIOS and integrated
video BIOS on one component. The FirmWare Hub connects
directly to the I/O Controller Hub (ICH) without requiring an ISA
bus.

Serial Port
An asynchronous port on the computer used to connect
a serial device to the computer and capable of
transmitting one bit at a time. Serial ports are typically
identified on IBM compatible computers as COM
(communications) ports. Serial ports are rarely used
when
compared to how often they've been used in the past.

1394 Header and USB Header


The 1394 header and USB header is a pin connection found on a computer
motherboard that allow additional 1394 and USB connections to be added to the
computer.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 40
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Other Types of Motherboard Headers
• Audio header
• Game port and MIDI header
• Network header
• Parallel port header
• PS/2 header
• Serial port header

Integrated Circuit (IC)

A bare chip, monolithic integrated circuit,


or microchip, IC is short for Integrated Circuit
or Integrated Chip. The IC is a package containing
many circuits, pathways, transistors, and other
electronic components all working together to perform
a particular function or a series of functions. Integrated
circuits are the building blocks of computer hardware.
The picture is an example of what an Integrated Circuit
may look like on a circuit board today.

Jumper
Jumpers allow the computer to close an electrical circuit,
allowing the electricity to flow certain sections of the circuit
board. This Are used to configure the settings for computer
peripherals and other components.

S/PDIF
Short for Sony and Phillips Digital Interconnect Format, the S/PDIF
or SPDIF interface transmits digital audio in a compressed form
between audio equipment and home theater systems. The S/PDIF
interface can utilize a coaxial cable or a fiber optic cable to
transmit the audio.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 41
DR. CECILIO PUTONG NATIONAL HIGH SCH.
CD-IN the CD-IN is a four-pin connector found on a
computer's motherboard or sound card that connects
an optical drive's audio.

Other Components of a Motherboard


BIOS – Basic Input/Output System is a ROM chip that
allows you to access and set up your computer system
at the most basic level. The BIOS includes instructions on
how to load basic computer hardware and includes a
test referred to as a POST (Power On Self-Test) that helps
verify the computer meets requirements to boot up
properly.

The four main functions of a PC BIOS

• POST - Test the computer hardware and make sure no errors exist before loading
the operating system.
• Bootstrap Loader - Locate the operating system. If a capable operating system is
located, the BIOS will pass control to it.
• BIOS drivers - Low-level drivers that give the computer basic operational control
over your computer's hardware.
• BIOS or CMOS Setup - Configuration program that allows you to configure
hardware settings including system settings such as computer passwords, time,
and date.

Bus - also known as the address bus, data bus, or local bus is a data connection
between two or more devices connected to the computer.

Cache memory - Memory cache is a portion of the high-speed static RAM (SRAM)
and is effective because most programs access the same data or instructions
repeatedly.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 42
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Chipset - a group of microchips that are designed to work with one
or more related functions.

Diode - Short for Light-Emitting Diode, LED is a semiconductor that


illuminates when an electrical charge passes through it. LEDs are
commonly green, amber or red; however, can be an assortment
of other colors.

Dip switches - a set of small switches in a dual in-line package (DIP)


that is used to change the operating mode of a device. Dip
switches are used to configure computer peripherals and often
used as an alternative to jumpers because they are easier to
operate and less likely to get lost.
Caution: Make sure to disconnect power before changing a dip switch on any device.
Also, before you work inside of a computer, you should be aware of Electrostatic
Discharge.

Electrolytic - an electrolytic capacitor, which is a higher capacitance


capacitor in a smaller package. In the bottom picture to the right, is a
picture and an example of these types of capacitors.

Fuse - Acting as a mini circuit breaker, a fuse is


a resistor with a low tolerance designed to fail if excessive
current flows through an electronic device.

Game port and MIDI header - Musical Instrument Digital


Interface, MIDI is a standard for digitally representing and transmitting sounds. The MIDI
sound is played back through the hardware device or computer either through a
synthesized audio sound or a waveform stored on the hardware device or computer.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 43
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Internal speaker - PC speaker, onboard speaker, and system speaker,
the internal speaker is a basic speaker on a motherboard that creates
beeps, beeping noises, and mono tones. This speaker is very basic and
is not a speaker for playing songs, music, or other complex sounds
generated in a game.
Tip: The internal speaker works even if your sound card is not
working.

Keyboard controller – it handles input received


from the computer keyboard, A20 Lines, RESET,
deciphering scan codes, as well
as the PS/2 mouse. With later models of
keyboards, the 8042 was replaced with the
8742microcontroller, which had a microprocessor, RAM,
and I/O ports.

LCC - Leadless Chip Carrier, for socket designed to allow an


individual to place a chip on a circuit board.

Network header - In a network transmission, a header is part of the data packet and
contains transparent information about the file or the transmission.

Expansion slots
• AGP - Accelerated Graphics Port (Video Card)
(Note: Today, AGP has been replaced by PCI Express.)
• AMR - Audio/Modem Riser and allows OEMs to make one card that has the
functionality of either Modem or audio or both audio and Modem on one card.
(Modem, Sound card)
• CNR - Communication and Network Riser, CNR is a specification that supports
Audio, Modem, USB, and LAN interfaces of core logic chipsets. (Modem, Network
card, Sound card)
• EISA - Extended Industry Standard Architecture, EISA or Extended ISA is a standard
first announced in September of 1988 for IBM compatible computers that
competed with the MCA bus. (SCSI, Network card, Video card)
• ISA - Industry Standard Architecture (Network card, Sound card, Video card)
• PCI - Peripheral Component Interconnect Network card, SCSI, Sound card, Video
card
• PCI Express - PCI Express, or PCIe, was approved on July 2002
as a serial computer expansion bus standard. PCI Express was
designed as a high-speed replacement for the
aging PCI and AGP standards and is available in different formats.(Video card,
Modem, Sound Card, Network Card)
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 44
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• VESA - Video Electronics Standard Association, VESA is a group of monitor and
video card manufacturers that set video display and bus standards.

Parallel port header - A parallel interface for connecting an external device such as
a printer. Most personal computers have both a parallel port and at least one serial
port.

Resistor - Resistors help restrict and impede a current flow. The


picture shows examples of resistors on a motherboard.

SCSI - Small Computer System


Interface, SCSI is pronounced as "Scuzzy"and is one of
the most commonly used interfaces for disk drives. SCSI
is a standard for parallel interfaces that transfers
information at a rate of eight bits per second and
faster, which is faster than the average parallel
interface.

Solenoid - a thin wire looped, or wrapped, around a


metallic object. When electricity is passed through the
wire, a magnetic field is generated. A solenoid can also
be a transducer that converts energy in linear motion. It
can be used as a switch to turn something on or off.

Voltage regulator module (VRM) referred to as a


processor power module, VRM is short for voltage
regulator module. It is either embedded into the
motherboard or a separate, small circuit board that
regulates and supplies the correct voltage to the
processor

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 45
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.1-6

Enumeration
1 – 5 Types of system panel cables
6 - 9 The four main functions of a PC BIOS
10 – 15 Give at least 5 types of Expansion slot and describe each types ANSWER KEY
1.1-6

Types of system panel cables

• HDD LED (IDE LED)


• Power LED (PLED)
• Power SW (PWRSW)
• Reset SW
• Speaker

The four main functions of a PC BIOS

• POST - Test the computer hardware and make sure no errors exist before
loading the operating system. Additional information on the POST can be
found on our POST and Beep Codes page.
• Bootstrap Loader - Locate the operating system. If a capable operating system
is located, the BIOS will pass control to it.
• BIOS drivers - Low-level drivers that give the computer basic operational
control over your computer's hardware.
• BIOS or CMOS Setup - Configuration program that allows you to configure
hardware settings including system settings such as computer passwords, time,
and date.

Expansion slots
• AGP - Accelerated Graphics Port (Video Card)
(Note: Today, AGP has been replaced by PCI Express.)
• AMR - Audio/Modem Riser and allows OEMs to make one card that has the
functionality of either Modem or audio or both audio and Modem on one
card. (Modem, Sound card)
• CNR - Communication and Network Riser, CNR is a specification that supports
Audio, Modem, USB, and LAN interfaces of core logic chipsets. (Modem,
Network card, Sound card)
• EISA - Extended Industry Standard Architecture, EISA or Extended ISA is a
standard first announced in September of 1988 for IBM compatible computers
that competed with the MCA bus. (SCSI, Network card, Video card)
• ISA - Industry Standard Architecture (Network card, Sound card, Video card)
• PCI - Peripheral Component Interconnect Network card, SCSI, Sound card,
Video card

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 46
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• PCI Express - PCI Express, or PCIe, was approved on July 2002 as
a serial computer expansion bus standard. PCI Express was
designed as a high-speed replacement for the aging PCI and
AGP standards and is available in different formats.(Video
card, Modem, Sound Card, Network Card)
• VESA - Video Electronics Standard Association, VESA is a group of monitor and
video card manufacturers that set video display and bus standards. (Video
card)

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 47
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.1-1

ASSEMBLE COMPUTER HARDWARE

Performance Objective: Given the following materials, equipment’s and tools perform
the PC assembly in a logical, and methodical manner within 15 minutes.

Tools and Materials: Screwdriver (Philip Screw, Flat Screw), Gloves, Flashlights,
AntiStatic Wrist strap, Multi-tester
Equipment: PC System

STEPS IN ASSEMBLING THE PC

Open the Case


A. Prepare the workspace before opening the computer case:
 Adequate lighting
 Good ventilation
 Comfortable room temperature
 Workbench accessible from all sides
 Avoid cluttering workbench
 An antistatic mat on the table
 Small containers to hold screws and other small parts
B. Install the Power Supply
Power supply installation steps include the following:
1. Insert the power supply into the case
2. Align the holes in the power supply with the holes in the case
3. Secure the power supply to the case using the proper screws

Attach Components to the Motherboard


C. CPU on Motherboard
D. Thermal Compound
 Thermal compound helps to keep the CPU cool.
 To install a used CPU, clean it and the base of the heat sink with isopropyl
alcohol to remove the old thermal compound.
 Follow manufacturer’s recommendations about applying the thermal
compound.
E. Heat Sink/Fan Assembly
 The Heat Sink/Fan Assembly is a two-part cooling device.
 The heat sink draws heat away from the CPU.
 The fan moves the heat away from the heat sink.
 The heat sink/fan assembly usually has a 3-pin power connector.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 48
DR. CECILIO PUTONG NATIONAL HIGH SCH.
F. Install CPU and Heat Sink/Fan Assembly
1. Align the CPU so that the Connection 1 indicator is lined up with Pin 1 on the
CPU socket.
2. Place the CPU gently into the socket.
3. Close the CPU load plate and secure it by closing the load lever and moving it
under the load lever retention tab.
4. Apply a small amount of thermal compound to the CPU and spread it evenly.
Follow the application instructions provided by the manufacturer.
5. Line up the heat sink/fan assembly retainers to the holes on the motherboard.
6. Place the heat sink/fan assembly onto the CPU socket, being careful not to
pinch the CPU fan wires.
7. Tighten the heat sink/fan assembly retainers to secure the assembly in place.
8. Connect the heat sink/fan assembly power cable to the header on the
motherboard.

G. Install RAM
 RAM installation steps:
1. Align the notches on the RAM module to the keys in the slot and press down
until the side tabs click into place.
2. Make sure that the side tabs have locked the RAM module and visually check
for exposed contacts.

H. Install Motherboard
1. Install standoffs in the computer case.
2. Align the I/O connectors on the back of the motherboard with the openings in
the back of the case.
3. Align the screw holes of the motherboard with the standoffs.
4. Insert all of the motherboard screws.
5. Tighten all of the motherboard screws.

I. Install Internal Drives


 HDD installation steps:
1. Position the HDD so that it aligns with the 3.5-inch drive bay.
2. Insert the HDD into the drive bay so that the screw holes in the drive line
up with the screw holes in the case.
3. Secure the HDD to the case using the proper screws.

J. Install Drives in External Bays


 Drives, such as optical drives (CD and DVD) and floppy drives, are installed in
drive bays that are accessed from the front of the case.
 Optical drives and floppy drives store data on removable media.
 Drives in external bays allow access to the media without opening the case.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 49
DR. CECILIO PUTONG NATIONAL HIGH SCH.
K. Install Optical Drive
 Optical drive installation steps:
1. Position the optical drive to align with the 5.25-inch drive bay.
2. Insert the optical drive into the drive bay so that the optical drive screw
holes align with the screw holes in the case.
3. Secure the optical drive to the case using the proper screws.

L. Install Floppy Drive


 FDD installation steps:
1. Position the FDD so that it aligns with the 3.5-inch drive bay.
2. Insert the FDD into the drive bay so that the FDD screw holes align with
the screw holes in the case.
3. Secure the FDD to the case using the proper screws.

M. Install Adapter Cards


N. Install the Network Interface Card (NIC)  NIC installation steps:
1. Align the NIC to the appropriate slot on the motherboard.
2. Press down gently on the NIC until the card is seated.
3. Secure the NIC PC mounting bracket to the case with the appropriate
screw.

O. Install the Wireless NIC


 Wireless NIC installation steps:
1. Align the wireless NIC to the appropriate expansion slot on the
motherboard.
2. Press down gently on the wireless NIC until the card is fully seated.
3. Secure the mounting bracket to the case with the appropriate screw.

P. Install the Video Adapter Card


 Video adapter card installation steps:
1. Align the video adapter card to the appropriate expansion slot on the
motherboard.
2. Press down gently on the video adapter card until the card is fully
seated.
3. Secure the video adapter card PC mounting bracket to the case with
the appropriate screw.

Q. Connect Internal Cables


 Power cables
 Data cables
 Additional cables connect the buttons and link lights on the front of the
computer case to the motherboard.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 50
DR. CECILIO PUTONG NATIONAL HIGH SCH.
R. Connect Power Cables
 A 20-pin connector will work in a motherboard with a 24-pin socket.
 4-pin Berg Power Connector supplies power to a floppy drive.

S. Power Connector Installation Steps


1. Plug the SATA power connector into the HDD.
2. Plug the Molex power connector into the optical drive.
3. Plug the 4-pin Berg power connector into the FDD.
4. Connect the 3-pin fan power connector into the appropriate fan header on the
motherboard, according to the motherboard manual.
5. Plug the additional cables from the case into the appropriate connectors
according to the motherboard manual.

T. Install Data Cables


1. Plug the motherboard end of the PATA cable into the motherboard socket.
2. Plug the connector at the far end of the PATA cable into the optical drive.
3. Plug one end of the SATA cable into the motherboard socket.
4. Plug the other end of the SATA cable into the HDD.
5. Plug the motherboard end of the FDD cable into the motherboard socket.
6. Plug the connector at the far end of the FDD cable into the floppy drive.

U. Re-attach Side Panels


 Most computer cases have two panels, one on each side.
 Once the cover is in place, make sure that it is secured at all screw locations.
 Refer to the documentation or manufacturer’s website if you are unsure about
how to remove or replace your computer case.
Caution:
Handle case parts with care. Some computer case covers have sharp or
jagged edges.
When attaching cables, never force a connection.

NOTE: Plug in the power cable after you have connected all other cables.

V. Connect External Cables


1. Attach the monitor cable to the video port.
2. Secure the cable by tightening the screws on the connector.
3. Plug the keyboard cable into the PS/2 keyboard port.
4. Plug the mouse cable into the PS/2 mouse port.
5. Plug the USB cable into a USB port.
6. Plug the network cable into the network port.
7. Connect the wireless antenna to the antenna connector.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 51
DR. CECILIO PUTONG NATIONAL HIGH SCH.
8. Plug the power cable into the power supply.
W. Boot Computer for the First Time

Assessment Method:
• Observation
• Interview
• Performance Criteria

PERFORMANCE CRITERIA 1.1-6

Disassemble and Assemble Computer Hardware

CRITERIA 4 3 2 1 Points
Safety Procedures - Applied / manifested
safety precautions while working on the
Computer System
15 %
Adherence to the Procedures Followed
the procedures systematically (30%)

Workmanship (15%) -Organized materials


and tools while accomplishing the task and
has time management
Quality of Product - Produced a fully
functional Computer System
40%

Total

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 52
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-7 Multimedia Systems

Learning Objective:

1. Define Multimedia
2. Install Multimedia in a computer system as part of the computer
hardware.
3. Understand the importance of multimedia Systems in the real-life
situation.
4. Apply and use Multimedia Systems in a proper way.

Introduction

Multimedia Devices
Multimedia is any media and content that goes beyond the traditional printed or
hand-produced material. Pictures, video, audio, and even computer animation are
often used to enhance the storytelling process. A Multimedia System is a system
capable of processing multimedia data and applications. It is characterized by the
processing, storage, generation, manipulation and rendition of Multimedia
information.

Characteristics of a Multimedia System

A Multimedia system has four basic characteristics:

1. computer controlled
2. integrated
3. represented digitally
4. interactive

Challenges for Multimedia Systems

Supporting multimedia applications over a computer network renders the


application distributed. This will involve many special computing techniques.
Multimedia systems may have to render a variety of media at the same instant – a
distinction from normal applications.

There is a temporal relationship between many forms of media (e.g.Video and Audio.
There 2 are forms of problems here

• Sequencing within the media – playing frames in correct order/time frame in


video
• Synchronization – inter-media scheduling (e.g. Video and Audio).
Lip synchronization is clearly important for humans to watch playback of
video and audio and even animation and audio. Ever tried watching an out of
(lip) sync film for a long time?
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 53
DR. CECILIO PUTONG NATIONAL HIGH SCH.
The key issues multimedia systems need to deal with here are:
• How to represent and store temporal information.
• How to strictly maintain the temporal relationships on play back/retrieval
• What process are involved in the above.

Features for a Multimedia System

Very High Processing Power


- needed to deal with large data processing and real time delivery of media.
Special hardware commonplace.

Multimedia Capable File System


- needed to deliver real-time media – e.g. Video/Audio Streaming. Special
Hardware/Software needed e.g RAID technology.

Data Representations/File Formats that support multimedia


- Data representations/file formats should be easy to handle yet allow for
compression/decompression in real-time.

Efficient and High I/O


- input and output to the file subsystem needs to be efficient and fast. Needs to
allow for real-time recording as well as playback of data.

Special Operating System


- to allow access to file system and process data efficiently and quickly. Needs
to support direct transfers to disk, real-time scheduling, fast interrupt processing,
I/O streaming etc.

Storage and Memory


- large storage units (of the order of 50 -100 Gb or more) and large memory (50
-100 Mb or more). Large Caches also required and frequently of Level 2 and 3
hierarchies for efficient management.

Network Support
- Client-server systems common as distributed systems common.

Software Tools
- user friendly tools needed to handle media, design and develop applications,
deliver media.

Components of a Multimedia System

• Capture devices
• Storage Devices
• Communication Networks
• Computer Systems
• Display Devices
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 54
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ACTIVITY 1.1-7

Download any video and edit the video.

SELF-CHECK 1.1-7
Essay:

1. What is multimedia? Give an examples of communication media.


2. Discuss the importance of multimedia in maintaining, upgrading and repairing our
Personal Computers.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 55
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.1-7

1. Multimedia is any media and content that goes beyond the traditional printed or
hand-produced material. Pictures, video, audio, and even computer animation
are often used to enhance the storytelling process.
2. Importance of Multimedia
• There are several fields where multimedia could be of use Examples are:
- Business
- Education
- Entertainment
- Home
- Public Places
Business– Use and Applications •
Sales / Marketing Presentation
• Trade show production
• Staff Training Application
• Company Kiosk

Education– Use and Applications


• Courseware / Simulations
• E-Learning / Distance Learning
• Information Searching

Entertainment– Use and Applications


• Games (Leisure / Educational)
• Movies
• Video on Demand –Online

Home– Use and Applications


• Television
• Satellite TV
• SMS services (chats, voting, reality TV)

Public Places– Use and Applications


• Information Kiosk
• Smart Cards, Security

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 56
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.1-7

CREATE A VIDEO OF AN ICT CLASS

Performance Objective:

Given the following materials, equipment’s and tools create a short video of an ICT
class that motivates all the young people in your community.

Tools and Materials:


Equipment: Digital Camera/Cellphone

STEPS:
1. Divide the class into four, each group must select a leader.
2. You must create a situation that motivates all the young people in your
community.
3. Post it in your Facebook account/Instagram/Tweeter or any social
media.
4. Each group must present their output to the class.

Assessment Method:

• Refer to performance Criteria


• Interview

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 57
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.1-7

Performance Level Needs Satisfactory 6-10 Excellent 11-15


Improvement points points
0-5 points
Group Students needed All students All students contributed
Collaborations to be reminded to contributed to the equally to the video and
stay on task project, collaborated on task.
frequently. One or though some
two people did all workloads
the work. Students varied.
argued with one
another or left
some students out
of the process.
Storyboard Students did not Students Students completed
complete a completed on storyboard on time.
storyboard and time, the Storyboard is thorough
did not match storyboard and the and matches the video.
video. video match the
story board
but some
items are not
thoroughly
described.
Documentation There is no Most of the All elements from other
documentation. elements taken sources are accurately
from other sources documented.
are documented;
however, some
documentation is
inaccurate and
missing.
Video content and The video lacks a Information is Video includes a clear
organization central theme, connected to a statement of purpose.
clear point of theme. Details are Events and messages
view, and logical logical and are presented in a
sequence of information is logical order, with
information. relevant throughout relevant information
Much of the most of the video that supports the
information is video’s main ideas.
irrelevant to the
overall message

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 58
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Mechanics The text and audio The text and audio The text and audio have
have 4 or more have 1-2 grammar no grammar or spelling
grammar or or spelling errors. errors
spelling errors.

Production Video is of poor Video is good and Video is excellent and


quality and is edited. A variety of edited. Video runs
unedited. There transitions are used smoothly from shot to
are no transitions and most transitions shot. A variety of
added or help tell the story. transitions are used to
transitions are used Most of video has assist in communicating
so frequently that good pacing and the main idea. Shots
they detract from timing. Graphics and scenes work well
the video. There are used together. Graphics
are no graphics. appropriately. explain and reinforce
key points in the video.
Total
Output Grade

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 59
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.1-8

CMOS AND BIOS CONFIGURATION

Learning Objective:

1. Understand the function Complementary Metal Oxide Semiconductor


(CMOS) and Basic Input/output System (BIOS) in a system
2. Describe the function of Complementary Metal Oxide Semiconductor
(CMOS) and Basic Input/output System (BIOS) Differentiate CMOS and
BIOS
3. Configure Complementary Metal Oxide Semiconductor (CMOS) and
Basic Input/output System (BIOS)

Introduction

Understanding the CMOS and BIOS

The CMOS memory is 64 or 128 bytes of RAM that is part of the system clock chip or
one of the chipset chips. The name came from the material the RAM was made of,
Complementary Metal Oxide Semiconductor. This material was used because it could
be backed-up by a battery, requiring a very low operating current to keep the data
in the RAM with the power turned off.

CMOS Function

The function of CMOS RAM is to store information your computer needs when it boots
up, such as Disk Drive details, Keyboard type and Video Interface information,
details of the configuration of the PCI Bus slots and even a Password to restrict
access to the CMOS. If the battery that powers your CMOS RAM dies, all this
information is lost, and your PC will boot with the CMOS basic defaults.

BIOS
BIOS (basic input/output system) is the program a personal computer's microprocessor
uses to get the computer system started after you turn it on. It also manages data flow
between the computer's operating system and attached devices such as the hard
disk, video adapter, keyboard, mouse and printer.

Power ON self-test (POST) and basic-input-output-system (BIOS) configuration


procedures When power is turned on, POST (Power-On Self-Test) is the diagnostic
testing sequence that a computer's basic input/output system (or "starting program")
runs to determine if the computer keyboard, random access memory, disk drives, and
other hardware are working correctly.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 60
DR. CECILIO PUTONG NATIONAL HIGH SCH.
BIOS Setup
 The BIOS contains a setup program used to configure settings for hardware
devices.
 The configuration data is saved to a special memory chip called a
complementary metal-oxide semiconductor (CMOS).
 CMOS is maintained by the battery in the computer.
 If this battery dies, all BIOS setup configuration data will be lost.
 Replace the battery and reconfigure the BIOS settings.

Tip: Make sure the computer turns on. If nothing happens (no lights, no sound, no fans,
etc.), the computer has a power related issue.

Caution: Some of the steps below recommend removing physical parts from inside
the computer. While working inside the computer, it is highly recommended that you
be aware of Electrostatic Discharge (ESD) and its potential hazards.

Why is Booting Required?

• Hardware doesn’t know where the


operating system resides and how to
load it.
• Need a special program to do this job
– Bootstrap loader.
 E.g. BIOS – Boot Input Output
System.
• Bootstrap loader locates the kernel,
loads it into main memory and starts its
execution.
• In some systems, a simple bootstrap loader fetches a more complex boot
program from disk, which in turn loads the kernel.

Booting process

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 61
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Reset event on CPU (power up, reboot) causes instruction register to be loaded
with a predefined memory location. It contains a jump instruction that transfers
execution to the location of Bootstrap program.
• This program is form of ROM, since RAM is in unknown state at system startup.
ROM is convenient as it needs no initialization and can’t be affected by virus.

BIOS Interaction

Tasks performed at boot up


• Run diagnostics to determine the state of machine. If diagnostics pass, booting
continues.
• Runs a Power-On Self-Test (POST) to check the devices that the computer will
rely on, are functioning.
• BIOS goes through a preconfigured list of devices until it finds one that is
bootable. If it finds no such device, an error is given and the boot process stops.
• Initializes CPU registers, device controllers and contents of the main memory.

Recommended Advanced CMOS Settings


Option Setting Reason

Write-Protect Boot Enable for normal This doesn't really stop viruses, but it will help
Sector, Virus system use prevent users from accidentally
Warning, or FORMATting or FDISKing the hard disk.
Antivirus Protection
Cache Internal Enabled Cache memory makes system faster (see
and External"Adding Main and Cache
RAM," page 54.
Boot Sequence C: (first hard disk), A: Prevents users from booting with floppy
(floppy disk drive), floppy disk left in A: won't spread disks; boot
CD-ROM, C: A: sector viruses to the system; system won't
stop if floppy disk is left in A:.
Shadowing Enable for memory Copies firmware contents such as system
addresses BIOS, video BIOS, and add-on card BIOS to
containing RAM. Located between 640KB-1MB (upper
firmware (BIOS) memory blocks).
chips
LBA mode See "Overcoming
Hard Disk Capacity
Limitations with LBA
Mode," page 211

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 62
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF – CHECK 1.1-8 A. Essay

1. Why is Booting Required?

B. Enumeration

1-4 Tasks performed at boot up

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 63
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.1-8

Test I. Essay
Hardware doesn’t know where the operating system resides and how to load it.
• Need a special program to do this job – Bootstrap loader.
 E.g. BIOS – Boot Input Output System.
• Bootstrap loader locates the kernel, loads it into main memory and starts its
execution.
• In some systems, a simple bootstrap loader fetches a more complex boot
program from disk, which in turn loads the kernel.

Test II. Enumeration


• Run diagnostics to determine the state of machine. If diagnostics pass, booting
continues.
• Runs a Power-On Self-Test (POST) to check the devices that the computer will
rely on, are functioning.
• BIOS goes through a preconfigured list of devices until it finds one that is
bootable. If it finds no such device, an error is given and the boot process stops.
• Initializes CPU registers, device controllers and contents of the main memory.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 64
DR. CECILIO PUTONG NATIONAL HIGH SCH.
JOB SHEET 1.1-8

CONFIGURE THE BIOS AND CMOS

Performance Objective:
The learner must be able to configure the BIOS and CMOS within the required
standard.

Requirements:
- Set of System Unit
Duration: 10 minutes

Steps/Procedures:
1. Observe OHS
2. Power on the PC
3. Enter the BIOS Setup Utility by pressing the F2 key while the system is performing
the power-on self-test (POST).
4. Tip - Watch the screen for the prompt to press F2.
- The main BIOS Setup menu screen appears.
5. Use the following keyboard keys to navigate the BIOS Setup Utility:
• Use the left and right arrow keys to select the main menu screens.
• Use the up and down arrows, on the keyboard, to select an item within
a screen.
6. Navigate to the item to be modified. Fields that can be configured or that
provide access to a sublevel appear highlighted. All other fields are read only
e.g- go to the Boot Option tab then change the Boot sequence to CD-ROM
drive as the first boot device.

NOTE: Use the < + > key to move the CD-ROM Drive up. Make sure that you read help
menu on or blow the window screen

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 65
DR. CECILIO PUTONG NATIONAL HIGH SCH.
7. When you are finished customizing BIOS settings, navigate to the Exit screen.
8. Select one of the exit options and press Enter. For example, to save the
changes that you made, highlight the Save Changes and Exit option and press
Enter.
9. When you exit the BIOS Setup Utility, the server boots. If you've made changes
to BIOS settings, those changes are valid with the system boot.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 66
DR. CECILIO PUTONG NATIONAL HIGH SCH.
BIOS Setup

Boot Procedure

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 67
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.1-8

CONFIGURE THE BIOS AND CMOS

CRITERIA 20 15 10 5 Points

Safety Procedures 15%


Applied / manifested safety precautions
while working on the Computer System

Adherence to the Procedures (30%)


Followed the procedures systematically in
configuring BIOS and CMOS Configuration

Workmanship (15%)
Organized materials and tools while
accomplishing the task and has time
management
Quality of Product 40%
Configured fully the BIOS and CMOS without
errors
Total

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 68
DR. CECILIO PUTONG NATIONAL HIGH SCH.
LEARNING EXPERIENCES

Learning Outcome 2: Prepare Installer


Learning Activities Special Instructions
1. Read information sheet If you have some problem on the content of the
1.2-1 information sheet don’t hesitate to approach your
“Portable Devices” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can answer
selfcheck provided in the module.
2. Answer Self Check 1.2-1 Compare your answer to the answer key 1.2-1. If you
got 100% correct answer in this self-check, you can
now move & do the Activity Sheet. If not review the
information sheet and go over the self-check again.

3. Do Activity Sheet 1.2-1 Compare your work to the checklist and let your
trainer check it. If you got 100% correct answer in this
activity, you can now move to the next information
sheet. If not review the information sheet and go over
the activity again.

4. Read information sheet 1.2-2 If you have some problem on the content of the
“Portable Application information sheet don’t hesitate to approach your
Software” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
5. Answer self-check 1.2-2 Compare your answer to the answer key 1.2-3. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not review
the information sheet and go over the self-check
again.

6. Read information sheet 1.2-3 If you have some problem on the content of the
“Software License Agreement” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
7. Answer self-check 1.2-3 Compare your answer to the answer key 1.2-5. If you
got 100% correct answer in this self-check, you can
now move to the next Information sheet. If not review
the information sheet and go over the self-check
again.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 69
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.2-1

PORTABLE DEVICES

Learning Objective:

1. Identify the different portable devices


2. Describe the different types of portable devices
3. Create a bootable device with in the standard requirements.

Introduction

A boot device is any piece of hardware that can read or contains the files required
for a computer to start. For example, a hard drive, floppy disk drive, CD-ROM drive,
DVD drive, and USB jump drive are all considered bootable devices. However, unless
the necessary boot files are stored on the drive, diskette, or disc, the computer
cannot boot from that device.

Example:
• hard drive
• floppy disk drive,
• CD-ROM drive,
• DVD drive, and
• USB jump drive

Two Disk types:


• Disk 0 for hard drive and,
• Disk 1 for your USB Flash Drive with its total capacity.

Short Bytes: Creating bootable USB without any software in Windows 10 is the cleanest
and easiest way to make a bootable USB without errors. Just follow the steps below to
create bootable USB drive which you can use to install Windows on your machine.

The most commonly used boot device or boot drive is the hard drive. When an
operating system, such as Microsoft Windows, is installed onto the hard drive, it copies
the boot files and drivers required to load Windows onto the computer. When
installing a new operating system, troubleshooting the computer, or booting from
another drive (e.g., CD-ROM drive), a bootable disc or setup disc is inserted into the
drive. If the boot sequence is set up correctly in CMOS setup and the bootable disc
is in the computer, it will load from the disc.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 70
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Creating a bootable disc or drive

Today, there are many different ways to create a bootable disc or another type of
bootable drive. To create a bootable disc or drive to troubleshoot or install an
operating system, follow the link below that relates to the bootable media you're
trying to create.

Tip
To install a new operating system (e.g., Microsoft Windows), the setup
disc or USB drive is bootable and can start the install without the aid of
another disc or drive.

No boot devices available


If the computer hard drive is not working, has not yet been set up, or there are no
other bootable devices, you will receive an error when the computer boots.
Common errors in this situation are "no bootable device" or "no boot devices
available." This error indicates that the computer looked at all available devices, but
did not see any drive with boot files. If the computer was working before getting this
error message and no new hardware was added, your hard drive has likely failed.

If there are no other disks, discs, or USB drives connected to the computer and you've
recently moved the computer, computer and verify the cables hard drive cables
are connected.

If none of the above steps help resolve the problem, unfortunately, it is likely a bad
hard drive.

Inaccessible boot device


If the computer has detected a boot device that is not bootable, an error, such as
"inaccessible boot device," is shown as the computer boots. When this error occurs,
it's an indication of a corrupt boot device (e.g., hard drive, diskette, disc, or USB drive)
attached to the computer is not bootable. Remove any diskettes and discs from the
computer and disconnect any USB drives, MP3 players, or cameras connected to the
computer.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 71
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF- CHECK 1.2-1

Instruction: Essay: Write your answer in a separate sheet.

1. Describe bootable devices


2. Give at least two methods in creating bootable devices.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 72
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.2-1

1. A boot device is any piece of hardware that can read or contains the files required
for a computer to start. The most commonly used boot device or boot drive is the
hard drive. When an operating system such as Microsoft Windows installed onto
the hard drive, it copies the boot files and drivers required to load Windows on the
computer.
2. Using CMD
3. Using Rufus/Win to bootic software

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 73
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.2-2
PORTABLE APPLICATION SOFTWARE
Lesson Objective:

1. Define portable application software


2. Identify the most commonly used – and useful – features seen in portable
applications
3. Install and use a portable application
4. Use portable applications to instantly upgrade old PCs and aid in disaster
recovery
Introduction

A portable application (portable app) is a software product designed to be easily


moved from one computing environment to another. They include portable versions
of regular applications – such as browsers, for example – as well as specialized apps
designed to enhance mobile computing. Portable apps are typically open source
and either free, low-cost or donation funded.
It is usually stored on USB drives but can be stored on some other flash media. A
portable app may also be uploaded to a cloud storage service, such as Dropbox or
Google Drive, and accessed online.
It can be used on any compatible device, wherever the user is.
Portable applications offer some definite advantages over their traditional
counterparts. They’re lightweight and they allow you to move between computers
while taking your applications and settings with you.
Example of Portable Application Software

• Browsers of your choice: chrome, firefox, opera


• Antivirus, antispyware, and antimalware
• pdf and text readers
• Password managers: keepass and lastpass offline access
• Archive utility: 7-zip
• Rufus

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 74
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1-2-3

CREATE A BOOTABLE USB DRIVE WITH RUFUS

Performance Objective:
The learner must be able to use Rufus to create bootable USB images within the
required standard. Duration: 20 minutes Requirements:
• Rufus 1.4.9 or higher
• USB cable

Procedures/Steps:
1. Follow the OHS Policy
Note: Rufus requires an account with admin access in order to make the necessary
changes to hardware.
2. Insert the USB flash drive and launch Rufus. It will detect the drive almost
immediately. Since Rufus can handle various partition schemes and file structures,
ensure that the correct settings are set that match the UFD you're going to build
Figure A

3. Click the optical drive button next to the Create a bootable disk using checkbox,
and you'll be prompted to search for the ISO image to use.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 75
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Figure B

4. When using ISO images, Rufus will automatically modify the settings to best match
it. Once everything is set correctly, click the Start button to begin the process. You'll
be prompted with a warning that all data on the UFD will be destroyed.
5. Click OK to proceed with the creation process (Figure C).

Figure C

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 76
DR. CECILIO PUTONG NATIONAL HIGH SCH.
6. Depending on the ISO image size, the process
may take several minutes to complete. For
the log readout of each step in the process,
click the Log button to open a side window
and save the output details (Figure D).

Figure D

7. The longest part of the entire process is the file


copy portion. This is typically the last step and
varies depending on file size/number of files
to copy (Figure E).

Figure E
8. When complete, double-check the external drive to verify the files were copied
over (Figure F).

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 77
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Figure F

9. With the process completed, simply eject the UFD, insert it into the device you
wish to install the OS on, and boot as you normally would.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 78
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.2-1-A

CREATE BOOTABLE FLASH DRIVE WITHOUT ANY SOFTWARE ON WINDOWS 10

Performance Objective: The learner must be able to create bootable flash drive using
command line prompt.

Duration: 20 minutes

Requirements: PC, Flash Drive/CD-DVD

Procedure:

1. Insert a USB flash drive into a running computer.


2. Open a Command Prompt window as an administrator.
3. Type diskpart.
4. In the new command line window that opens, to determine the USB flash drive
number or drive letter, at the command prompt, type list disk, and then click
ENTER. The list diskcommand displays all the disks on the computer. Note the
drive number or drive letter of the USB flash drive.
5. At the command prompt, type select disk <X>, where X is the drive number or
drive letter of the USB flash drive, and then click ENTER.
6. Type clean, and the click ENTER. This command deletes all data from the USB
flash drive.
7. To create a new primary partition on the USB flash drive, type create partition
primary, and then click ENTER.
8. To select the partition that you just created, type select partition 1, and then click
ENTER.
9. To format the partition, type format fs=ntfs quick, and then click ENTER.

Important

If your server platform supports Unified Extensible Firmware Interface (UEFI), you
should format the USB flash drive as FAT32 rather than as NTFS. To format the
partition as FAT32, type format fs=fat32 quick, and then click ENTER.

10. Type active, and then click ENTER.


11. Type exit, and then click ENTER.
12. When you finish preparing your custom image, save it to the root of the USB flash
drive.

Assessment Procedure: Demonstration with Oral Questioning

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 79
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.2-1-A

CREATE BOOTABLE DEVICE

CRITERIA 20 15 10 5 Points
Safety Procedures 15%
Applied / manifested safety precautions
while working on creating bootable devices
Adherence to the Procedures (30%)
Followed the procedures systematically in
creating bootable device
Workmanship (15%)
Organized materials and tools while
accomplishing the task and has time
management
Quality of Product 40%
Created fully functional bootable device
within the standard requirements
Total
Feedback:

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 80
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.2-1-B
CREATE BOOTABLE USB FROM ISO FILE

Performance Objective:
The learner must be able to Copy Files from an ISO Image on PC/DVD to Flash Drive
manually within the required standard.

Duration: 20 minutes

Requirements: PC, Flash Drive/CD-DVD

Procedures:

1. Follow the OHS


2. Open the files inside the DVD or ISO file, copy it and paste inside USB
manually. This will make your USB drive bootable.

Copying files from a DVD to Flash Drive using CMD:


1. Assume that the USB drive is the G: drive and the DVD installer is located on
drive E:. And, also have inserted a DVD inside the DVD drive from where you
want to copy the data to create a bootable USB drive.
2. By default, Command Prompt’s active directory for Administrator permission is
on C:\Windows\System32>.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 81
DR. CECILIO PUTONG NATIONAL HIGH SCH.
3. Navigate Command Prompt to set on DVD (E:) as its active directory.
Remember there should be a DVD inside DVD installer.
4. Just type E: then hit Enter, and then the active directory is changed to E.
5. Type cd boot and hit Enter. Now the active directory is changed to E:\boot>
6. Type bootsect /nt60 g: and hit Enter. It
7. will create the boot sector on G: drive (USB Flash drive).
8. Type exit and hit Enter to close the Command Prompt.

Assessment Procedure: Demonstration and Observation

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 82
DR. CECILIO PUTONG NATIONAL HIGH SCH.
OPERATION SHEET 1.2-1 - C

CREATE UEFI BOOTABLE USB OF WINDOWS 7

Performance Objective:
The learner must be able to make a bootable flash drive for windows 7 within the
required standard.

Duration: 20 minutes
Requirements: PC, Flash Drive/CD-DVD

Prerequisites: Using bootable USB to install an operating system speeds up installation.


It also saves a DVD.

• Starting from a USB flash/pen/key drive supported by the PC


• One system with Windows* 7 or Windows Vista already installed
• One completely formatted USB flash drive preferably 4 GB or more

Procedures/steps:

Method 1 of 2

Step 1: download the latest version of Rufus. Rufus is a portable utility and
hence doesn’t require an installation.

Step 2: Connect your 8GB+ USB drive to your PC. Be sure to backup all data
from your USB drive.

Step 3: Run the Rufus utility. Click the Yes button when you see the UAC prompt
to launch the tool.

Step 4: Under the Device section, select the USB drive that you want to make
bootable, select MBR partition scheme for BIOS or UEFI computers, or GPT
partition scheme for UEFI computer depending the type of partition type on
your PC.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 83
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Step 5: Next, select the File system as FAT32 (default) as it supports both BIOS
and UEFI. But if you’re sure that your PC doesn’t support UEFI, you can choose
NTFS for a faster installation.

Step 6: Enter a volume label, click on the CD/DVD drive icon to browse to the
Windows 7 ISO image file. Select the file. To download the latest ISO, please go
through download Windows 10 ISO from Microsoft guide.

Step 7: Finally, click the Start button, click the OK button when you see the
warning dialog to continue its job.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 84
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Once Rufus completes its job, you’ll see the “Done” message. That’s it!

Method 2 of 2

Windows 7 bootable USB using USB/DVD Download Tool

IMP: If you get “The selected file is not a valid ISO file” error, please follow the
instructions mentioned in our how to fix the selected file is not a valid ISO file
error guide.

WARNING: Before using this tool, please make sure that your PC doesn’t support
UEFI as Windows USB/DVD Download Tool doesn’t help you prepare the
bootable USB for UEFI PCs. To create a bootable USB of Windows 10 for UEFI
supported PCs, please follow the instructions in Method 1.

Step 1: Click on this official link to download Windows USB/DVD Download Tool
directly from Microsoft servers.

Step 2: Connect a USB flash or hard drive with 4GB+ capacity and backup data
before continuing further. Please be sure to back up all data from your USB
drive as the drive will be formatted in the coming steps.

Step 3: Run the downloaded USB/DVD Download Tool setup file and then

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 85
DR. CECILIO PUTONG NATIONAL HIGH SCH.
follow the easy on-screen instructions to get it installed on your PC running Vista,
Windows 7, Windows 8 or Windows 8.1.

Step 4: Launch Windows 7 USB/DVD Download Tool, click the Browse button to
browse to the folder where Windows 10 ISO image file is located. After selecting
the ISO image, click the Next button.

Step 5: In the following screen, you need to select the USB device as your media
type. To do so, click on the USB device button. And if you want to prepare the
bootable DVD, please click DVD instead.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 86
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Step 6: Next, you’ll be asked to select your USB drive. Please carefully select
your USB drive from the drop-down list before clicking the Begin Copying
button. Again, it’s important to note that a wrong selection of drive will cause
data loss.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 87
DR. CECILIO PUTONG NATIONAL HIGH SCH.
The Windows 7 USB/DVD Download Tool starts copying all the contents of the
ISO image to the USB drive and will make it bootable in a couple of minutes.

Once done, you can connect bootable USB to the PC on which you want to
install Windows 10, change BIOS settings to boot from USB, and start installing
Windows 10.

Assessment Procedures: Demonstration and Observation

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 88
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.2-1-C

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 89
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.2-3 SOFTWARE LICENSE AGREEMENT

Learning Objectives:
1. Define Software license agreement
2. Understand the legal and ethical issues of software
agreement.
3. Value the importance of a software License agreement.

Introduction

A software license agreement


- legal contract between the licensor and/or author and the purchaser of a
piece of software which establishes the purchaser's rights.
- details how and when the software can be used
- provides any restrictions that are imposed on the software.
- defines and protects the rights of the parties involved in a clear and concise
manner.
- digital form and are not presented to the purchaser until the purchase is
complete.
- gives the purchaser the rights to modify and redistribute the software and
related components, while a proprietary software license agreement forbids
this.
- enclosed within the software package and can't be accessed by purchaser
until the purchase is complete.
- contain warranty provisions and patent information.

However, the purchaser can decline the software license agreement, thus
surrendering his or her right to use the software.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 90
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SOFTWARE LICENSE TYPES

Individual Licenses

Individual (Single-user): This license type allows the program to be installed and used
on one CPU which is not accessed by other users over a network. The software will
only be used on a single computer, and other users will not be able to access or run
the software while connected to your computer.

Types of individual licenses are:

1. Perpetual license - allows the customer to install and use the software
indefinitely. Technical support is included for a limited term, usually 90 days.
2. Subscription license - Allows the user to use the software for a specified time
period. This license usually includes technical support and access to upgrades
and patches released during the term of the subscription. At the end of the
term the user has several options: (1) renew the subscription; or (2) purchase a
perpetual license at a discounted cost; or (3) remove the software from the
computer.
3. Freeware license - This license type is offered as freeware by the author and
does not require paying any fee for use.
4. Shareware license - This is a license to use software for a trial period and then,
if you continue to use the software, you must pay a shareware fee or cease
using the software.

SPECIAL CHANNEL LICENSES

1. OEM (original equipment manufacturer) - These licenses cover software for


stand-alone PC's and notebooks and MUST stay bundled with the computer
system and NOT distributed as a separate (or stand-alone) product. This
software will be identified or labeled "For Distribution Only with New Computer
Hardware."
2. Educational or Academic Software - Software marked for distribution to
educational institutions and students at reduced prices. This software is usually
labeled that it is an academic product and for use only by academic or
educational institutions.
3. Not for Resale (NFR) Software License - Specific and restricted licenses that are
made available by software vendors directly to the distribution channel and
are typically marked NFR with explicit conditions that it is NOT FOR RESALE. The
NFR software is not licensed for normal commercial distribution.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 91
DR. CECILIO PUTONG NATIONAL HIGH SCH.
4. Concurrent Use - This license type requires that you purchase licenses for the
maximum number of people who will be running the software simultaneously.

INDIVIDUAL/MULTI-USER LICENSING
• Volume licenses - allows the Licensee to install the software on a certain
number of computers. The licensee usually has to satisfy a minimum purchase
requirement and obtains reduced prices in exchange.
• Site/Enterprise - This license provides access to software at a single location.
Typically, these licenses are individually negotiated with the publisher and vary
widely in their provisions. • Unlimited

NETWORK/MULTI-USER LICENSES

• Server (Network) - Licensed per server – This license type requires that you have
a single copy of the software residing on the file server.
• Per Seat (Machine) - Licensed per machine/seat – This license requires that you
purchase a license for each client computer and/or device where access to
services is needed.
• Per Processor - Under the Per Processor model, you acquire a Processor License
for each processor in the server on which the software is running. A Processor
License usually includes access for an unlimited number of users to connect.
• Per Mailbox (Education customers only) - If you are an education customer
using Exchange Server, you have the additional option of deploying licenses in
Per Mailbox mode.

ADD-ON’S TO EXISTING OR NEW LICENSES


• Upgrade - This license is acquired when a user has a previously acquired
software license and would like to move up to a newer version.
• Student use - This allows students to use the software as long as they are
students of the institutions.
• Secondary use - Allows the licensed end user to use the software on a second
computer.
• Work-at-home rights - Allows Faculty/Staff to use software at home.
Termination of employment also terminates this benefit.
• Home use - Similar to Work-at-home rights
• Subscription/Maintenance - This is an agreement between the license holder
and the software developer that allows the user to obtain all updates or
upgrades for software during the term of a contract.
Subscription/Maintenance added to an existing license may change the
original license (e.g. Microsoft select software assurance added to an OEM
license changes the OEM license to a Microsoft select license; with all benefits)

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 92
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.2-3

Identify the following, write answer on separate sheet of paper.

1. ___________________ allows the customer to install and use the software


indefinitely.
2. ___________________ Allows the user to use the software for a specified time
period.
3. ___________________ This license type is offered as freeware by the author and
does not require paying any fee for use.
4. ___________________ This is a license to use software for a trial period and then, if
you continue to use the software, you must pay a shareware fee or cease using
the software.
5. ___________________ This license type requires that you have a single copy of the
software residing on the file server.

Test II. Enumeration


6 – 9 Special Channel Licenses
10 – 12 Individual/Multi-User Licensing

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 93
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.2-3

Test I. Identification

1. Perpetual license
2. Subscription license
3. Freeware license
4. Shareware license
5. Server (Network): Licensed per server

Test II. Enumeration

1. OEM (original equipment manufacturer


2. Educational or Academic Software
3. Not for Resale (NFR) Software License
4. Concurrent Use
5. Volume licenses
6. Site/Enterprise
7. Unlimited

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 94
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Activity 1.2-3

1. Download any application software


2. Read the License agreement before installing the software.
3. Take note those important agreement.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 95
DR. CECILIO PUTONG NATIONAL HIGH SCH.
LEARNING EXPERIENCES

Learning Outcome 3: Install Operating System and Drivers for Peripherals/devices


Learning Activities Special Instructions
1. Read information sheet 1.3-1 If you have some problem on the content of the
“Introduction to Computer information sheet don’t hesitate to approach
Operating Systems” your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
answer self-check provided in the module.
2. Answer Self Check 1.3-1 Compare your answer to the answer key 1.2-1. If
you got 100% correct answer in this self-check,
you can now move & do the Activity Sheet. If not
review the information sheet and go over the
selfcheck again.

3. Do Activity Sheet 1.3-1 Compare your work to the checklist and let your
trainer check it. If you got 100% correct answer in
this activity, you can now move to the next
information sheet. If not review the information
sheet and go over the activity again.

4. Read information sheet 1.3-2 If you have some problem on the content of the
“PC Drivers Installation and information sheet don’t hesitate to approach
Configuration” your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self-check provided in the module.
5. Answer self-check 1.3-2 Compare your answer to the answer key 1.2-3. If
you got 100% correct answer in this self-check,
you can now move to the next information sheet.
If not review the information sheet and go over
the self-check again.

6. Read information sheet 1.3-3 If you have some problem on the content of the
“Software Updates” information sheet don’t hesitate to approach
your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self check provided in the module.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 96
DR. CECILIO PUTONG NATIONAL HIGH SCH.
7. Answer self-check 1.3-4 Compare your answer to the answer key 1.2-5. If
you got 100% correct answer in this self-check,
you can now move to the next Information sheet.
If not review the information sheet and go over
the self-check again.

8. Read information sheet 1.3-5 If you have some problem on the content of the
“Checking of Work” information sheet don’t hesitate to approach
your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self check provided in the module.
9. Answer self-check 1.3-5 Compare your answer to the answer key 1.2-6. If
you got 100% correct answer in this self-check,
you can now move to the next information sheet.
If not review the information sheet and go over
the self-check again.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 97
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.3-1

COMPUTER OPERATING SYSTEM

Learning Objective:

1. Define operating systems


2. Determine the different types of operating systems
3. Install operating systems in a personal computer.
4. Appreciate the importance of an Operating system in a system.

Introduction

Operating System (OS)


• is a software that manages computer resources and provides programmers/users
with an interface used to access those resources.

• It is a layer of software which takes care of technical aspects of a computer's


operation. It shields the user of the machine from the low-level details of the
machine's operation and provides frequently needed facilities.

• The operating system uses CPU scheduling and multiprogramming to provide


each user with a small portion of a time.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 98
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TYPES OF OPERATING SYSTEMS

Batch operating system


The users of a batch operating system do not interact with the computer directly. Each
user prepares his job on an off-line
device like punch cards and submits it
to the computer operator. To speed
up processing, jobs with similar needs
are batched together and run as a
group.
Disadvantage of Batch Operating
Systems

• Lack of interaction between the user and the job.


• CPU is often idle, because the speed of the mechanical I/O
devices is slower than the CPU.
• Difficult to provide the desired priority.

Time-sharing operating systems


Time-sharing or multitasking is a logical extension of multiprogramming. Time is shared
among multiple users simultaneously. It is also a technique which enables many
people, located at various terminals, to use a particular computer system at the
same time.

The main difference between Batch Systems and Time-Sharing Systems is that in case
of batch systems, the objective is to maximize processor use, whereas in Time-Sharing
Systems, the objective is to minimize response time.

Advantages of Time-sharing operating systems

• Provides the advantage of quick response.


• Avoids duplication of software.
• Reduces CPU idle time.

Disadvantages of Time-sharing operating systems are as follows:

• Problem of reliability.
• Question of security and integrity of user programs and data.

• Problem of data communication.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 99
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Distributed operating System
Distributed systems use multiple central processors to serve multiple real-time
applications and multiple users. The processors communicate with one another
through various communication lines (such as high-speed buses or telephone lines).
These are referred as loosely coupled systems or distributed systems. Processors may
vary in size and function. These processors are referred as sites, nodes, computers,
and so on.

The advantages of distributed systems


• With resource sharing facility, a user at one site may be able to
use the resources available at another.
• Speedup the exchange of data with one another via electronic
mail.
• If one site fails in a distributed system, the remaining sites can
potentially continue operating.
• Better service to the customers.
• Reduction of the load on the host computer.
• Reduction of delays in data processing.
Network operating System
A Network Operating System runs on a server and provides the server the capability
to manage data, users, groups, security, applications, and other networking
functions. The primary purpose of the is to allow shared file and printer access among
multiple computers in a network, typically a local area network (LAN), a private
network or to other networks.

The advantages of network operating systems

• Centralized servers are highly stable.


• Security is server managed.
• Upgrades to new technologies and hardware can be easily
integrated into the system.
• Remote access to servers is possible from different locations and
types of systems.
The disadvantages of network operating systems

• High cost of buying and running a server.


• Dependency on a central location for most operations.
• Regular maintenance and updates are required.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 100
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Real Time operating System
A real-time system is defined as a data processing system in which the time interval
required to process and respond to inputs is so small that it controls the environment.
The time taken by the system to respond to an input and display of required updated
information is termed as the response time.

2 Types of real-time operating systems.

1. Hard real-time systems


Hard real-time systems guarantee that critical tasks complete on time. In hard realtime
systems, secondary storage is limited or missing and the data is stored in ROM.

2. Soft real-time systems are less restrictive

A critical real-time task gets priority over other tasks and retains the priority until it
completes. Soft real-time systems have limited utility than hard real-time systems.
Example: multimedia, virtual reality, Advanced Scientific Projects

PURPOSE OF AN OPERATING SYSTEM


 Manage files and folders
 Control hardware access
 Provide user interface
 Manage applications
 Boots the computer and manages the file system.  Support
more than one user, task, or CPU.

Five Basic Functions of the Operating system

1. Interface between the user and the hardware

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 101
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Figure: GUI vs CLI

2. Coordinate hardware components: Each hardware device speaks a different


language, but the operating system can talk to them through the specific translational
software’s called device drivers.

Figure: Device Drivers in between OS and Hardware devices

3. Provide environment for software to function


4. Provide structure for data management: An OS displays structure/directories for
data management, view file and folder listings and manipulate on those files and
folders like (move, copy, rename, delete, and many others).
5. Monitor system health and functionality: OS monitors the health of our system’s
hardware, giving us an idea of how well (or not) it’s performing.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 102
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Figure: Performance Monitor in windows

CHARACTERISTICS OF AN OPERATING SYSTEM

Licensing
3 kinds of Operating systems

2. Open Source operating system which means that anyone can download and
modify it for example Ubuntu etc.

3. A Free OS doesn’t have to be open source. They are free to download and use
but cannot modify them. For example, Google owns Chrome OS and makes it
free to use.

4. Commercial Operating Systems are privately owned by companies that charge


money for them. Examples include Microsoft Windows and Apple MAC OS.
These require paying for the right (or license) to use their Operating systems.

Software Compatibility
The developers make the software’s which may be compatible or incompatible in
different versions within the same operating system’s type but they can’t be
compatible with the other OS types. Every OS type have their own software
compatibility.

Complexity
Operating systems come in basically two editions one is 32-bit and other is 64-bit
editions. The 64-bit edition of an operating system best utilizes random access memory
(RAM). A computer with a 64-bit CPU can run either a 32-bit or a 64-bit OS, but a
computer with a 32-bit CPU can run only a 32-bit OS.
Common operating systems
Operating Developer
system
Corel Linux Corel
COMPUTER Date Document
SYSTEM Developed: No.:
SERVICING September 19,
NC II 2016
INSTALLING Issued by:
TAGBBILARAN AND Developed by:
Page
CITY SCIENCE CONFIGURING Engr. Floridel C.
HIGH COMPUTER
Revision 104
Pelin
SCHOOL SYSTEM No.:0

Linux Linux Torvalds


MAC OS 8 Apple
MAC OS 9 Apple
MAC OS 10 Apple
MS-DOS 5.x Microsoft
MS-DOS 6.x Microsoft
Windows 2000 Microsoft
Windows 2003 Microsoft
Windows 95 Microsoft
Windows 98 Microsoft
Windows CE Microsoft
Windows ME Microsoft
Windows NT Microsoft
Windows XP Microsoft
Windows Vista Microsoft
Windows 7 Microsoft
Windows 8 Microsoft
Windows 10 Microsoft

Mac OS X
Mac OS X is a line of open core graphical operating systems developed, marketed,
and sold by Apple Inc., the latest of which is pre-loaded on all currently shipping
Macintosh computers. Mac OS X is the successor to the original Mac OS, which had
been Apple's primary operating system since 1984.

Linux and GNU


Linux (or GNU/Linux) is a Unix-like operating system that was developed without any
actual Unix code, unlike BSD and its variants. Linux can be used on a wide range of
devices from supercomputers to wristwatches. The Linux kernel is released under an
open source license, so anyone can read and modify its code.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 104
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Microsoft Windows

Microsoft Windows is a family of proprietary operating systems designed by Microsoft


Corporation and primarily targeted to Intel architecture based computers, with an
estimated 88.9 percent total usage share on Web connected computers.

SELF-CHECK 1.3-1

A. True or False: Write TRUE if the statement is correct and FALSE if the statement is
wrong.

________1. An operating system is a set of programs that manage computer


hardware resources.

________2. Operating system is not a vital component of the system software in


a computer system.

________3. Time-sharing operating systems schedule time for efficient use of the system
and may also include accounting for cost allocation of processor time, mass storage,
printing, and other resources.

________4. For software functions such as input and output and memory allocation,
the operating system acts as an intermediary between application programs and the
computer hardware.

________5. Operating systems are found on almost any device that contains a
computer—from cellular phones and video game consoles to
supercomputers and web servers

B. Enumeration

6 - 8 3 kinds of Operating systems


9-14 Purpose of an operating system

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 105
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.3-1

A.

1. TRUE
2. FALSE
3. FALSE
4. FALSE
5. TRUE

B.
6. Open source
7. free OS
8. Commercial operating systems
9. Manage files and folders
10. Control hardware access
11. Provide user interface
12. Manage applications
13. Boots the computer and manages the file system.
14. Support more than one user, task, or CPU.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 106
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.3-1-A

INSTALL WINDOWS 7

Performance Objective: Given the following PC System, supplies and materials, you
are going to install Windows 7 using bootable flash device/DVD, within the industry
standards.

Duration: 45 min.

Requirements:

 Bootable Flash Drive with Win 7 ISO


 Set of PC System Procedures/Step:

1. Enter your computer's BIOS. Turn off the computer on which you want to install
Windows 7 and then turn it back on. When the
,
BIOS screen appears or you Del Esc F2 F10 , , , F9 are prompted to do
so, press (depending on or your computer’s
motherboard) to enter the system BIOS. The key to enter the BIOS is usually shown
on the screen.

Boot from Windows 7 DVD/Flash Drive

Select the CD-ROM driv/Flash Drive as the first boot device of your computer.

Save the changes of the settings. Press the button


indicated on the screen or select the save option
from the BIOS menu to save your configuration.

Once you have completed this stage, Windows


7 will start loading. If you see the below image,
you're doing well so far. After a few moments,
you will reach the installation menu.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 107
DR. CECILIO PUTONG NATIONAL HIGH SCH.
1. Choose the language and the
keyboard.

2. You will be now taken to the Install now menu. Click Install now

Choose your Windows Setup options.


Once Windows Setup loads, you'll be
presented with a window. Select your
preferred language, keyboard type,
and time/currency format, then click
Next.

3. Accept the
license agreement.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 108
DR. CECILIO PUTONG NATIONAL HIGH SCH.
4. Select a Custom (advanced) installation

5. Partitioning

5.1 Choose where you want to install


Windows 7.

5.2 Click unallocated space and click


Next. The partitioning layout will be
created for them.

6. Create a new partition. According


to official system requirements,
Windows 7 needs 16GB of free
space. However, you can do with
less. The minimum recommended
space for a partition where you
want to place Windows 7 is
10350MB. Eventually, the
installation itself will take approx.
7GB.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 109
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Windows 7 installer will now tell you that it will have to create an additional partition
for the core system files.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 110
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Two types of partitions:

1. primary
2. logical Recommendation

Use a third-
party partitioning
tool to create a
partition layout
beforehand. This will
allow you to place
Windows files on
a logical
partition, saving
yourself the
precious
commodity of
wasting
primary
partitions on what is
essentially
nonsystem data.

7. Begin installation

If you're comfortable with your setup, highlight the created partition and click Next.
Windows 7 will be installed to this partition. Depending on your hardware, this can take
some time. My testing shows approx. 30-40 minutes.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 111
DR. CECILIO PUTONG NATIONAL HIGH SCH.
During the installation, your computer may restart several times.

User settings

Provide username and a


computer name. Create
a password to protect
your account. This is most
advisable. You should opt
for a strong password.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 112
DR. CECILIO PUTONG NATIONAL HIGH SCH.
8. Activation

Activate Windows, Input


the product key.

9. Updates

Configure updates, choose either CHOICE LATER, after Windows 7 is installed and
running properly.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 113
DR. CECILIO PUTONG NATIONAL HIGH SCH.
10. Time zone:
Configure your
time zone.
11. Location: Your
location will
determine the
firewall settings for
your newly
installed Windows
7. You have three
choices: home,
work or
public network.
Home and work
networks
are supposed
to be
trusted, so you
should not experience any problems adding other
machines to your group or sharing data with them.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 114
DR. CECILIO PUTONG NATIONAL HIGH SCH.
12. Congratulations! Congratulations, you have just successfully installed
Windows 7.

Assessment Method: Demonstration with Rubrics

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 115
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.3-1-A
Complete and Clean Operating System (OS) installation
Configure BIOS and CMOS
Install Windows 7

Poor Fair Good Very Good Score


Content 15 pts 25 pts 35 pts 50 pts

BIOS and Learners was Learners was Learners was Learners was
CMOS unable able to able to able to
Configuration to configure the successfully to successfully to
configure BIOS and configure the configure the
40 % Correctly the BIOS CMOS with BIOS and BIOS and
configure the and CMOS close CMOS with very CMOS without
BIOS and guidance little supervision and
CMOS and supervision and guidance.
assistance guidance

Install Win 7
Learners Learners was Learners was Learners was
50 % Correctly was unable unable to able to able to
install to install the install the successfully successfully
appropriate appropriate appropriate install the install the
Network Operating Operating appropriate appropriate
Operating System System Operating Operating
System on the (OS) (OS) on the System (OS), System (OS),
PC. PC with very little without
with supervision and supervision and
close guidance guidance.
guidance
and
assistance
10% Learners Learners was Learners was Learners was
Occupational was unable able to apply able to apply able to apply
Health and to apply OHS with full OHS with less OHS without
Safety OHS. supervision. supervision. supervision.
Total

Remarks

Feedback
TASK SHEET 1.3-1-B
INSTALL WINDOWS 8

Performance Objective: Given the following PC System, supplies and materials, you are
going to install Windows 8 using bootable flash device/DVD, within the industry
standards.

Duration: 45 minutes
Tools/Materials: Flash Drive/DVD Drive
Equipment: PC System Procedures/Steps:

1. Insert the Windows 8 DVD or USB Memory key into your system and restart your
computer. At the Dell logo screen, tap the F12 key repeatedly until Preparing one-
time boot menu notice appears.
2. When the menu appears, select the appropriate device to boot from, ie. USB
Storage device
3. Windows 8 or Windows 10 Setup appears.
4. Select Language to install, Time and currency format, and Keyboard or input
method and select Next.
5. Select Install Now
6. Accept the license terms described in the License Terms screen. Click the
checkbox at the bottom of the screen to accept and click Accept to continue.
7. At the Which Type of Installation do you Want screen, select Custom: Install
Windows only (advanced).
8. At the Where do you want to Install Windows? screen, select Drive options
(advanced).
Caution: This step will delete all data on your system. Please ensure that you
have created a backup and tested the functionality of the back up before
completing thist step.

9. For a clean installation, delete all partitions that are shown by highlighting them
one at a time and selecting Delete. After you have deleted all partitions select
Unallocated Space and then select New. Click Apply to create your new Windows
8 or Windows 10 partitions, then click Next.
10. Windows will now be freshly installed on your computer.

11. Your computer will restart several times. This may take some time to complete
installation.

12. Windows 8 will boot up for the first time.

Assessment Method: Demonstration with oral questioning

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 117
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Rubrics
Complete and Clean Operating System (OS) installation
Configure BIOS and CMOS
Install Windows 7

Poor Fair Good Very Good Score


Content 15 pts 25 pts 35 pts 50 pts

BIOS and Learners was Learners was Learners was Learners was
CMOS unable able to able to able to
Configuration to configure the successfully to successfully to
configure BIOS and configure the configure the
40 % Correctly the BIOS CMOS with BIOS and BIOS and
configure the and CMOS close CMOS with very CMOS without
BIOS and guidance little supervision and
and supervision and guidance.
CMOS
assistance guidance

Install Win 8
Learners Learners was Learners was Learners was
50 % Correctly was unable unable to able to able to
install to install the install the successfully successfully
appropriate appropriate appropriate install the install the
Network Operating Operating appropriate appropriate
Operating System System Operating Operating
System on the (OS) (OS) on the System (OS), System (OS),
PC. PC with very little without
with supervision and supervision and
close guidance guidance.
guidance
and
assistance
10% Learners Learners was Learners was Learners was
Occupational was unable able to apply able to apply able to apply
Health and to apply OHS with full OHS with less OHS without
Safety OHS. supervision. supervision. supervision.
Total

Remarks

Feedback
TASK SHEET 1.3-1-C

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 118
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INSTALL WINDOWS 10 (THRESHOLD) WITHOUT GUIDE

Performance Objective: Given the following PC System, supplies and materials, you are
going to install Windows 10 using bootable flash device/DVD, within the industry
standards.
Duration: 45 min. Requirements:
• Win 10
• Flash Drive
• Rufus
• PC System

Assessment Method: Demonstration with Rubrics/Performance Criteria Checklist

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 119
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.3-1-C
Complete and Clean Operating System (OS) installation
Configure BIOS and CMOS
Install Windows 10

Poor Fair Good Very Good Score


Content 15 pts 25 pts 35 pts 50 pts

BIOS and Learners was Learners was Learners was Learners was
CMOS unable able to able to able to
Configuration to configure the successfully to successfully to
configure BIOS and configure the configure the
40 % Correctly the BIOS CMOS with BIOS and BIOS and
configure the and CMOS close CMOS with very CMOS without
BIOS and guidance little supervision and
and supervision and guidance.
CMOS
assistance guidance
Install Win 10
Learners Learners was Learners was Learners was
50 % Correctly was unable unable to able to able to
install to install the install the successfully successfully
appropriate appropriate appropriate install the install the
Network Operating Operating appropriate appropriate
Operating System System Operating Operating
System on the (OS) (OS) on the System (OS), System (OS),
PC. PC with very little without
with supervision and supervision and
close guidance guidance.
guidance
and
assistance
10% Learners Learners was Learners was Learners was
Occupational was unable able to apply able to apply able to apply
Health and to apply OHS with full OHS with less OHS without
Safety OHS. supervision. supervision. supervision.
Total

Remarks

Feedback

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 120
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.3-2

TYPES OF PC DRIVERS

Learning Objective:

1. Describe the different PC drivers


2. Familiarize the procedure in installing drivers for peripheral devices
3. Install and configure computer system drivers following the safety
operation.

Introduction

A PC Driver is software that allows computer to communicate with


hardware devices. Without drivers, the devices you connect to your
computer. Windows can automatically check if there are drivers
available for new devices that you connect to your computer. For
hardware that you've connected to your computer in the past,
updated drivers might become available at a later date; but those
drivers aren't installed automatically. To install these optional updates,
go to Windows Update in Control Panel, check for updates, and then
view and install driver updates that are available for your
computer.

Device drivers
A device driver is a computer program that helps your hardware
communicate with your operating system. Every piece of hardware in
your computer has a driver or driver pack.
Examples of hardware are printers, keyboards, monitors, printers,
graphic cards, sound cards, and so on.

BIOS driver
The BIOS (basic input/output system) is a chip on the computer's
motherboard that runs a program when your computer boots. Its
purpose is to start the different pieces of hardware on your computer,
such as your screen, mouse, keyboard, and hard disks.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 121
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Motherboard Drivers
These drivers interact directly with the operating system
(such as Windows) and let your computer run all the
features of your motherboard.

Hardware Device Drivers


Everything that connects one way or another to your motherboard is a device that
requires its own specific driver or set of drivers. These devices include peripheral devices,
such as input/output devices, network cards and expansion slots.

Types of Peripheral Devices


Input devices
The device which are connected to computer and they are used to send the data to the
computer internally, are known as the input devices. Following are some important input
devices;

• Mouse
• Keyboard
• Touch screen
• Scanner
• Barcode reader
• KVM
• Microphone
• Biometric devices
• Game pads
• Joysticks
• Digitizer
• Multimedia devices - Multimedia devices have become so common
these days and now they are an important part of our lives.
Following are a few devices which are as follows:

• Digital cameras
• Microphone
• Webcam
• Camcorder
• MIDI enabled devices - MIDI stands for the Musical Instrument Digital
Interface. It is actually a device which is musical one and can
digitalize all of the information and can transfer it to the computer in
some really standard way.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 122
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Output devices

Output devices are those devices which do not send the data into the computer, in fact
through these devices, the computer communicates with the user. They contain the
devices like displays, printers etc. Since they are very vital part of the computer system, so
one should have enough knowledge about them. Some of these output devices are as
follows;

• Printers
• Speakers
• Display devices
- Monitors

Virtual device drivers


Virtual device drivers emulate a piece of hardware to make the computer recognize a
program as actual hardware. The most commonly used virtual device is a virtual CD/DVD
drive that allows the computer to read an .ISO image file from a hard disk, without having
to mount it on an actual CD/DVD.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 123
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.3-2

Identification. Identify the following statement, write your answer beside the number.
_______________ 1. it emulates a piece of hardware to make the computer recognize a
program as actual hardware.
________________2. These drivers interact directly with the operating system and let your
computer run all the features of your motherboard.
________________3. a chip on the computer's motherboard that runs a program when your
computer boots.
________________4. Everything that connects one way or another to your motherboard is a
device that requires its own specific driver or set of drivers.
________________5. a computer program that helps your hardware communicate with your
operating system.

Test II. Multiple Choices. Write your answer on a separate sheet of paper.

1. Words and graphics appear on this part of the computer.


A. Mouse B. CPU C. Monitor d. Scanner

2. Peripherals are:

A. Additional devices connected to the computer


B. Needed for the CPU to keep running
C. Programmes we use
D. None of the above

3. Instead of a handheld mouse, a laptop has a:


A. Rolling pad
B. Track pad
C. Joystick
D. All of the above

4. Some computers operating by touching the screen to select programmers and files.
A. True B. False

5. The CPU is a computer peripheral device.


A. True B. False

ANSWER KEY 1.3-2


COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 124
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Test I. identification

1. Virtual device drivers


2. Motherboard drivers
3. BIOS
4. Hardware device drivers
5. Device Driver

Test II. Multiple Choices


1. C
2. A
3. B
4. A
5. B

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 125
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.3-2-A

INSTALL PRINTER DRIVER

Performance Objective: Given the following PC System, supplies and materials, you are
going to install printer driver. Duration: 15 min.
Requirements:
• Printer Driver
• Printer
• System Unit Procedures:
Use the Manufacturer's Instructions and Installation Disc Note: The

set-up process is usually the same for most printers

1. Install the cartridges in the printer and add paper to the tray.
2. Insert installation CD and run the printer set up application (usually "setup.exe"), which
will install the printer drivers.
3. Connect your printer to the PC using the USB cable and turn it on.
4. Look in your printer’s folder on your computer (on Windows, go to "Start" then "Printers
and Faxes". hit the Windows key and type "printers" into the search box to quickly get
to the Printers section. For Mac, go to System Preferences and select "Print & Fax".)
5. Print a test page. In Windows, right-click on the printer and go to "Properties" then click
the "Print Test Page" button. On Mac, click on the "Options & Supplies" button, then the
"Utility" tab and click "Print Test Page"

Assessment Method: Demonstration with Rubrics

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 126
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.3-2-B

INSTALL LAN/ETHERNET DRIVER

Performance Objective: Given all the materials and equipment the learners must be able
to install the printer driver within 15 minutes. Requirements: LAN/Ethernet Driver, System
Unit Steps/Procedures:

1. Insert the Flash drive/CD with the LAN/Ethernet Driver.


2. The EXE is a self-extracting compressed file and you can double-click the EXE you
downloaded to automatically install the drivers and Proset software. For manual
installation, continue to step 3.
3. Use your favorite Zip software to extract the files from the installation package you
downloaded (either PROWinx64.exe or PROWinx32.exe) to a temporary location.
Example: C:\Temp\PROWinx64
4. Open Device Manager
5. Right-click Start and click Device Manager OR run devmgmt.msc

6. Right-click the connection you want to update and choose Update Driver
Software. If there is no driver installed for that device, it will show up with a yellow
exclamation and have a generic name such as Ethernet Controller.
7. Choose Browse my computer for driver software

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 127
DR. CECILIO PUTONG NATIONAL HIGH SCH.
8. Click Browse and go to the folder where you extracted the driver files. Make sure
that Include subfolders is checked so that it will scan the entire driver set.

9. Click Next and it will start to install the driver software. Once installation is
complete, it will show in the network adapters section.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 128
DR. CECILIO PUTONG NATIONAL HIGH SCH.
10. Continue with the same process for any other adapters you wish to update by
selecting the adapter from the list.

Assessment Method: Demonstration and Observation

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 129
DR. CECILIO PUTONG NATIONAL HIGH SCH.
PERFORMANCE CRITERIA 1.3-2

Criteria Yes No
Did you….

1. Insert the Flash drive/CD with the LAN/Ethernet Driver.

2. The EXE is a self-extracting compressed file and you can double-click


the EXE you downloaded to automatically install the drivers and Proset
software. For manual installation, continue to step 3.

3. Use your favorite Zip software to extract the files from the installation
package you downloaded (either PROWinx64.exe or PROWinx32.exe)
to a temporary location. Example: C:\Temp\PROWinx64

4. Open Device Manager

5. Right-click Start and click Device Manager OR run devmgmt.msc

6. Right-click the connection you want to update and choose Update


Driver Software. If there is no driver installed for that device, it will show
up with a yellow exclamation and have a generic name such as
Ethernet Controller.

7. Choose Browse my computer for driver software

8. Click Browse and go to the folder where you extracted the driver files.
Make sure that Include subfolders is checked so that it will scan the
entire driver set.

9. Click Next and it will start to install the driver software. Once installation
is complete, it will show in the network adapters section.

10. Continue with the same process for any other adapters you wish to
update by selecting the adapter from the list.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 130
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.3-2

SOFTWARE UPDATES

Learning Objective:
After reading this Information Sheet, you must be able to:

1. Know the different PC updates


2. Install PC software updates
3. Follow the standard procedure in updating software.

Introduction

Software Update

Software Update is a free and instant


informer special for those users who
care to keep their application up to
date with new functions and better
performance. Software Update offers
links to download software updates
and ensures you are running the latest
versions. It also gathers and displays
other relevant information on software
updates that you might need. Software
updates enhance the functionality of your products through new features
and improvements.

THE DIFFERENT SOFTWARE UPDATES

Operating System Updates

Update the operating system to prevent security


compromises.
An operating system is the core set of programs
that run a computer and upon which all other
programs rely in order to operate. Operating
system updates are corrections for program
incompatibilities, discovered errors, and security
vulnerabilities. There are errors and security
problems discovered in every operating system
and updates are created and distributed on a
regular basis.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 131
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Why need to update my operating system?

Operating system updates often address security vulnerabilities that have been
discovered or not previously disclosed. If operating system updates are not installed in a
timely manner it can lead to unauthorized access, theft of personal, confidential, or
Protected Health Information, or the destruction of data.
For those systems where automatic operating system updates are not available a plan
should be put in place which:

1. identifies which systems are not automatically updated,


2. states which resource(s) will be used to determine if an operating
system update is available
3. directs how and by whom the update will be installed.

Windows

To update Windows, first open the Control Panel. If you don't know where the Control
Panel is. In the search bar in the Control Panel, type update. Under Windows Update,
click Check for updates.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 132
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Mac OS X

To update Mac OS X, open the App Store, then click Updates at the top. OS X
updates will be at the top of the list of available updates. On the right side of the
screen, there are buttons to update individual apps or to apply all available
updates.

Update your apps


For many apps, regular updates provide new features and stability rather than
security patches, so it isn't necessary to update them as frequently. However, for
more essential software like web browsers and antivirus software, security updates
are just as critical as operating system updates.

Many apps in both OS X and Windows will automatically check for updates when
you open them. If you installed them through the App Store or another distribution
platform, the program will alert you about updates. For standalone programs, take
time to explore the program's menus and learn how to run the update process.

For example, in Avast! Free Antivirus, there is an Update page on the Settings screen.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 133
DR. CECILIO PUTONG NATIONAL HIGH SCH.
However, in Firefox, the About Firefox screen in the Help menu also checks for updates.

Third-Party Software Updates

Third-party software describes any software created by a third party and did not
come with your computer's operating system. This primarily includes any software
you, yourself, have installed on your machine. Because third-party software is
created by different people, the way you update it varies.

The location varies, but you'll almost always find a "Check for Updates" option in one
of the program's menus. Some software will not notify you of updates and you'll have
to visit the software's web site in order to find out if a new version is available. If it is,

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 134
DR. CECILIO PUTONG NATIONAL HIGH SCH.
just download the available update or the most recent version and install it like it's a
new program. If it asks you to replace the previous version, it's okay to allow that.

PC UPDATER

PC Updater is a free app for the Windows PC by RadarSync Ltd. which looks for your
driver and software updates for your system. It identifies, finds, downloads, and
installs essential updates for your computer's hardware and software which can help
you prevent computer problems such as crashes, security holes and bugs,
components and peripherals.

FIVE BEST SOFTWARE UPDATE TOOLS

FileHippo Update Checker (Windows, Free)

FileHippo.com is a software download site that hosts tons of both freeware and
shareware, so the FileHippo Update Checker is a natural extension of their web site—
only better.

Synaptic/APT (Linux, Free)

The Advanced Packaging Tool, a.k.a. APT, is a free tool built into most Linux
distributions and many variants that handles the installation, removal, and updating
of software packages.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 135
DR. CECILIO PUTONG NATIONAL HIGH SCH.
AppFresh (Mac OS X, Free)

AppFresh is an automated update checker for Mac OS X. The app filters your
updates and installed applications in a number of useful ways, and provides
descriptions of each tool in a handy info panel along with release notes.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 136
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Update Notifier (Windows, Free)

Update Notifier is a small,


portable software update
utility that quickly scans your
installed applications and lists
your available updates in a
small window, complete with
links to sites where you can
download updates. Update
Notifier is freeware, Windows
only.

Secunia PSI (Windows, Free

Secunia Personal Software Inspector takes a bit more of a doomsday—i.e.,


securityfocused—approach with software update. When you run your first scan after
installing Secunia, you'll be presented with a list of insecure apps that have available
updates, "end-of-life" apps that are no longer being supported by the developer,
and patched apps that have the latest security updates.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 137
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Free Software Updater for your PC

Updated software versions and program updates are vital steps in staying secure
online, as security patches are often included in updates, as well as solutions for
other vulnerabilities and bugs.

Automatic Software Download

Every time a program's version is updated our crawlers will find it and notify you. This
crawl is done on our servers throughout the day to make sure you will always have
the newest, most secure and stable version from the software publisher's original
download source.

SELF-CHECK 1.3-3
Essay (5 pts)

1. Define Software Update


2. Why need to update my operating system?

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 138
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.3-3

Essay:

1. Software Update is a free and instant informer special for those users who care
to keep their application up to date with new functions and better
performance. Software Update offers links to download software updates and
ensures you are running the latest versions. It also gathers and displays other
relevant information on software updates that you might need. Software
updates enhance the functionality of your products through new features and
improvements. We strongly encourage you to install updates as soon as they
are available.

2. Operating system updates often address security vulnerabilities that have been
discovered or not previously disclosed. If operating system updates are not
installed in a timely manner it can lead to unauthorized access, theft of
personal, confidential, or Protected Health Information, or the destruction of
data. For those systems where automatic operating system updates are not
available a plan should be put in place which 1) identifies which systems are
not automatically updated, 2) states which resource(s) will be used to
determine if an operating system update is available, and 3) directs how and
by whom the update will be installed.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 139
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.3-3

UPDATE WINDOWS OPERATING SYSTEM

Performance Objective: Given the following PC System, supplies and materials, you are
going to update windows operating system.
Duration: 1 hr

Requirements:
• Internet
• System Unit with OS (any)

Procedures:

To update your Windows 7, 8, 8.1, and 10 Operating System:

1. Open Windows Update by clicking the Start button in the lower left corner. In
the search box, type Update, and then, in the list of results, click Windows
Update.
2. Click Check for updates, and then wait while Windows looks for the latest
updates for your computer.
3. If you see a message telling you that important updates are available, or
telling you to review important updates, click the message to view and select
the important updates to install.
4. In the list, click the important updates for more information. Select the check
boxes for any updates that you want to install, and then click OK.
5. Click Install updates.

Note: It is important that you do not shut your computer off or allow it to run out of
battery during the update process. Doing so can cause a corruption of the
operating system, which can often only be fixed by reformatting the computer.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 140
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Performance Criteria 1.3-3
Did you….. Yes No
1. Open Windows Update by clicking the Start button in the
lower left corner. In the search box, type Update, and then,
in the list of results, click Windows Update.

2. Click Check for updates, and then wait while Windows looks
for the latest updates for your computer.

3. If you see a message telling you that important updates are


available, or telling you to review important updates, click
the message to view and select the important updates to
install.

4. In the list, click the important updates for more information.


Select the check boxes for any updates that you want to
install, and then click OK.

5. Click Install updates.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 141
DR. CECILIO PUTONG NATIONAL HIGH SCH.
LEARNING OUTCOME SUMMARY Learning Experiences Learning
Outcome 4: Install Application Software

Learning Activities Special Instructions


1. Read information sheet 1.4-1 If you have some problem on the content of
“Introduction to Application the information sheet don’t hesitate to
Software” approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
answer self-check provided in the module.
2. Answer Self Check 1.4-1 Compare your answer to the answer key If you
got 100% correct answer in this self-check, you
can now move & do the Activity Sheet. If not
review the information sheet and go over the
self-check again.

3. Do Activity Sheet 1.4-1 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

4. Read information sheet 1.4-2 If you have some problem on the content of
“Utility Software and its uses” the information sheet don’t hesitate to
approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self-check provided in the module.
5. Answer self-check 1.4-2 Compare your answer to the answer key. If you
got 100% correct answer in this self-check, you
can now move to the next information sheet. If
not review the information sheet and go over
the self-check again.

6. Do Activity Sheet 1.4-2 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

7. Read information sheet 1.4-3 If you have some problem on the content of
“Variation of a Software the information sheet don’t hesitate to
Application” approach your facilitator.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 142
DR. CECILIO PUTONG NATIONAL HIGH SCH.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self check provided in the module.
8. Answer self-check 1.4-3 Compare your answer to the answer key , If you
got 100% correct answer in this self-check, you
can now move to the next Information sheet. If
not review the information sheet and go over
the self-check again.

9. Do Activity Sheet 1.4-3 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

4. Read information sheet 1.4-4 If you have some problem on the content of
“Applications Software Updates” the information sheet don’t hesitate to
approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self check provided in the module.
Answer self-check 1.4-4 Compare your answer to the answer key , If you
got 100% correct answer in this self-check, you
can now move to the next information sheet. If
not review the information sheet and go over
the self-check again.

Do Activity Sheet 1.4-4 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

6. Read information sheet 1.2-5 If you have some problem on the content of
“Virtualization Software ” the information sheet don’t hesitate to
approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self check provided in the module.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 143
DR. CECILIO PUTONG NATIONAL HIGH SCH.
7. Answer self-check 1.2-5 Compare your answer to the answer key. If you
got 100% correct answer in this self-check, you
can now move to the next Information sheet. If
not review the information sheet and go over
the self-check again.

Do Activity Sheet 1.4-5 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

8. Read information sheet 1.2-6 If you have some problem on the content of
“Disk Management Software” the information sheet don’t hesitate to
approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
now answer self check provided in the module.
9. Answer self-check 1.2-6 Compare your answer to the answer key. If you
got 100% correct answer in this self-check, you
can now move to the next information sheet. If
not review the information sheet and go over
the self-check again.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 144
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.4.1

INTRODUCTION TO APPLICATION SOFTWARE

Learning Objective:

1. Identify the different application software


2. Describe productivity software
3. Install Application Software
4. Value the importance of application software

Introduction

This chapter discusses the role of the system


software with respect to application
software. It then presents an overview of
several productivity software applications,
graphic design/multimedia software
applications,
home/personal/educational software
applications, and communications software
applications. The chapter then identifies
various Web applications.

Application Software

Application software consists of programs designed to


perform specific tasks for users. It can be used as a
productivity/business tool; to assist with graphics and
multimedia projects; to support home, personal, and
educational activities; and to facilitate
communications.

Specific application software products, called software


packages, are available from software vendors.

Application software also is available as shareware, freeware, and public-domain


software, these usually have fewer capabilities than retail software packages.

Productivity Software

Productivity software use to become more effective and efficient while performing
daily activities.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 145
DR. CECILIO PUTONG NATIONAL HIGH SCH.
The used of products and the key features

• productivity/business software
applications
• graphic design/multimedia software
applications
• home/personal/educational software
applications
• communications software applications

Types of Productivity Software

• Spreadsheet software, data is organized in rows and columns, which collectively


are called a worksheet.
• Database software allows you to create and manage a database. A database is
a collection of data organized to allow access, retrieval, and use of that data.
• Presentation graphics software is used to create presentations that communicate
ideas, messages, and other information to a group through a slide show.
• A personal information manager (PIM) is software that includes an appointment
calendar to schedule activities, an address book to maintain names and
addresses, and a notepad to record ideas, reminders, and important information.
• A software suite is a collection of individual applications sold as a single package.
• Project management software allows you to plan, schedule, track, and analyze the
progress of a project.
• Accounting software helps companies record and report their financial
transactions.
• Computer-aided design (CAD) software assists in creating engineering,
architectural, and scientific designs.
• Desktop publishing (DTP) software is used to design and produce sophisticated
documents.
• Paint software is used to draw graphical images with various on-screen tools.
• Image editing software provides the capability to modify existing images.
• Video editing software and audio editing software can be used to modify video
and audio segments.
• Multimedia authoring software is used to create electronic interactive presentations
that can include text, images, video, audio, and animation.
• Web page authoring software is designed to create Web pages and to organize,
manage, and maintain Web sites.
• Integrated software combines several productivity software applications that share
a similar interface and common features into a single package.
• Personal finance software is an accounting program that helps pay bills, balance a
checkbook, track income and expenses, follow investments, and evaluate
financial plans.
• Legal software assists in the creation of legal documents and provides legal advice.
• Tax preparation software guides users through the process of filing federal taxes.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 146
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Personal DTP software helps develop conventional documents by asking questions,
presenting predefined layouts, and supplying standard text.
• Photo-editing software is used to edit digital photographs.
• Home design/landscaping software assists with planning or remodeling.
• Educational software teaches a particular skill and exists for about any subject.
• Reference software provides valuable and thorough information for all individuals.
• Entertainment software includes interactive games, videos, and other programs
designed to support a hobby or provide amusement.
• E-mail software is used to create, send, receive, forward, store, print, and delete
email (electronic mail).
• Web browser is a software application used to access and view Web pages.
• A chat client is software that allows you to connect to a chat room, which permits
users to chat via the computer.
• A newsreader is a software program used to participate in a newsgroup, which is
an online area on the Web where users conduct written discussion about a
particular subject.
• An instant messenger is a software program installed to use instant messaging (IM),
a real-time communications service that notifies you when one or more people are
online and then allows you to exchange messages or files.
• Groupware is a software application that helps groups of people on a network work
together and share information.
• A video conference software is a meeting between two or more geographically
separated people who use a network or the Internet to transmit audio and video
data.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 147
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF CHECK 1.4.1

Multiple Choice: Write your answer on a separate sheet of paper.

1. Software doesn’t plays a crucial role in transforming data into


information products in order to improve the features of the
computer
A. True B. False

2. Software brings life to the computer hardware


A. True B. False

3. Application software are?

A. Websites that a user use to perform certain task


B. Self-contained program that perform a specific function or
tasks directly for the user
C. Hardcopy of a program
D. Option 4

4. All of the following are examples of application software except


A. MS Word
B. Excell
C. Access
D. Windows

5. Software application that helps groups of people on a network


work together and share information.
A. Instant messenger
B. groupware C. newsreader
D. software

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 148
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.4 -1

1. B
2. A
3. B
4. D
5. B

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 149
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4.1

INSTALL APPLICATION SOFTWARE (MS OFFICE 2007)

Performance Objective: Given the following PC System, supplies and materials, you are
going to install MS Office 2007 within the standard requirements.

Duration: 30 min.

Requirements: PC with OS (Any), MS Office 2007

Procedures:

1. Insert your Office 2007 CD into the drive. If the setup wizard doesn’t start
automatically, navigate to the CD drive and click SETUP.EXE.
2. When prompted, enter the product key.

You can find the product key on the sticker on the CD case or other packaging. If you
need help, see Find your Product Key for Office 2007 or look up an error message.

3. Read and accept the Microsoft Software License Terms, and then click
Continue.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 150
DR. CECILIO PUTONG NATIONAL HIGH SCH.
4. Follow the prompts and after Office installs, click Close.

Activate Office 2007


You’ll need to activate Office to keep your Office programs working fully. To
activate from Excel, Word, PowerPoint, and Access:

• Click the Microsoft Office Button > Options > Activate Microsoft Office.
To activate from all other Office products:
• Click Help > Activate Product.

Assessment Method: Demonstration and Oral Questioning

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 151
DR. CECILIO PUTONG NATIONAL HIGH SCH.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 152
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4.1-B

INSTALL APPLICATION SOFTWARE (MS OFFICE 2016) USING CD

Performance Objective: Given the following PC System, supplies and materials, you are
going to install MS Office 2016 within the standard requirements.

Duration: 30 min.

Requirements: PC with OS (Any), MS Office 2016 DVD/CD

Procedures:

1. Insert the Microsoft Office media disc into the DVD drive.
2. Click "Start" followed by "Computer." Double-click the disc drive if
Windows fails to launch setup automatically.
3. Enter your product key when prompted and click "Continue."
4. Read the license terms and then check "I Accept the Terms of This
Agreement." Click "Continue."
5. Click "Customize."
6. Select the first program or tool from the list and then choose "Run
from My Computer," "Run All from My Computer," "Installed on First
Use" or "Not Available" from the options.
7. Repeat the previous step for each application or feature.
8. Click "Install Now" to install Microsoft Office.

Assessment Method: Demonstration and Observation

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 153
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4.1-C

INSTALL APPLICATION SOFTWARE (MS OFFICE 365)

Performance Objective: Given the following PC System, supplies and materials, you are
going to install MS Office 365 within the standard requirements without any procedures
given.

Duration: 30 min.

Requirements: PC with OS (Any), MS Office 365 DVD/CD/Downloaded

software Assessment Method: Demonstration with Rubrics

Performance Criteria 1.4.1-C

Content Poor Fair Good Score


Install MS Office 365
Student was Student was Student was
40 pts unable to install able to install 1 able to install
Correctly install the any of the to 3 of the all of the
following Office required MS required MS required MS
applications on the PC: Office Office Office
Word, Excel, Access, & Applications. Applications. Applications.
PowerPoint.
Apply OHS Learners Learners was Learners was
10 pts was able to apply able to
unable to OHS with full apply OHS
apply OHS. supervision. without
supervision.
Total

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 154
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.4.2

UTILITY SOFTWARE AND ITS USES

Learning Objective:
1. Identify the different utility software.
2. Describe the uses of a different types of Utility Software
3. Install Utility Software in your PC.

Introduction
A utility or software utility is computer system software intended to
analyze, configure, monitor, or help maintain a computer. Usually,
a utility is smaller than a standard program in size and may be
included with an operating system or installed separately.

List of Computer Utilities

Antivirus

Antivirus program alternatively referred to as


antivirus software, AVS, antivir, or AV is a software
utility designed to protect your computer or
network against computer viruses. If and when a
virus is detected, the computer displays a warning
asking what action should be done, often giving
the options to remove, ignore, or move the file to
the vault.

Portable antivirus programs

• Anvi Rescue Disk - a bootable antivirus program that provides a GUI for
userfriendly operation; able to run on a USB flash drive.
• ClamWin Portable - provides a GUI to run scans and remove viruses and
spyware that are found.
• Comodo Rescue Disk - a bootable antivirus program that provides a user-
friendly GUI for running scans and removing threats; able to run on a USB flash
drive or a CD/DVD.
• Emsisoft Emergency Kit - provides a command line interface and a GUI,
allowing you to choose which way to run scans and remove malware.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 155
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Spybot - Search & Destroy Portable - the portable version of the very popular
Spybot malware removal tool; provides a GUI to run scans and remove threats
found on a computer.

Backup software
A backup is a copy of important data that is stored on an
alternative location, so it can be recovered if deleted or it
becomes corrupted.

Clipboard

The clipboard, also referred to as pasteboard, is a special location in your computer's


memory that temporarily stores data that was cut or copied from a document. This
data can then be pasted to a new location. The clipboard will hold its information until
you cut or copy something else, or log out of the computer. For example, a user may
copy information from a word processor and paste that information into an e-mail
message.

Compression utility
A compression program or
compression utility is a software
program that can compress and
decompress various file
types.

Example of compression utilities


• 7-Zip
• WinAce
• WinZip
• WinRAR
Cryptography Software

Cryptography is the practice and study


of mathematically manipulating data so that it
can be stored and transmitted securely. The act of
manipulating this data is called encryption, and the
manipulated data is called encrypted. Encrypted
data must undergo a reverse
process, called decryption, before its original
form is revealed.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 156
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Debugger

A debugger is a software utility that is designed to locate errors


within a program's source code.

DirectX

First released in 1995, DirectX is a set of APIs developed by


Microsoft that allows software to write instructions directly to
audio and video hardware, improving multimedia
performance.

Latest DirectX versions

Early versions of Microsoft Windows (XP and earlier) had multiple versions of DirectX that
had to be installed separately. Later versions of Windows included DirectX with some
having the ability to upgrade. Below are the latest versions of DirectX for the different
versions of Windows.
Windows 10 = DirectX 12.
Windows Vista 7, and 8 = Up to DirectX 11 (Vista released with DirectX 10).
Other Windows latest version = Up to DirectX 9.0c depending on Windows version.

DISK CHECKERS (E.G., DEFRAG, DISK CLEANUP, AND SCANDISK) Defrag

Defrag is a Microsoft utility first included with


MSDOS 6.0, and in all versions of Windows. It is
designed to help chronologically order the data
on the hard drive. Defrag places each part of a
program together instead of
scattered throughout the hard drive, allowing
the read-write head to access the data faster on
the hard drive.

Note: New computers with an SSD instead of an


HDD no longer need to Defrag.

Disk Cleanup

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 157
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Disk Cleanup is a Microsoft software
utility allows users to remove files
that are no longer needed or that
can be safely deleted.
Removing unnecessary files,
including temporary files, can
help to speed up and improve the
performance of the hard drive and
computer. Running Disk Cleanup at
least once a month is
an excellent
maintenance task and frequency. Disk Cleanup can delete temporary Internet files
(associated with Internet Explorer), downloaded program files, and offline webpages.
Disk Cleanup also allows you to empty the Recycle Bin, delete temporary files, and
delete thumbnails.

How to open Microsoft Disk Cleanup?


Microsoft Disk Cleanup can be opened by following these steps.

Windows 10 and Windows 8


1. Press Windows key + X to open the Power User Task Menu.
2. In the menu, tap or click the Run option.
3. In the Run text field, type cleanmgr and press Enter.

Windows 7 and earlier


1. Open the Start menu.
2. Click on Programs > Accessories > System Tools.
3. In System Tools, click the Disk Cleanup utility.
or
1. Open the Start menu.
2. Click the Run option.
3. In the Run text field, type cleanmgr and press Enter.

ScanDisk

ScanDisk is a software utility capable


of checking the hard drive or floppy
diskette drive for any disk errors. When
errors are encountered, ScanDisk will mark
those sections of the disk to help prevent
information from further issues.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 158
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Disk Partition Editors

When referring to a computer hard drive, a disk partition or partition is a section of the
hard drive that is separated from other segments. Partitions enable users to divide a
physical disk into logical sections. Partition management software programs let you
create, delete, shrink, expand, split, or merge partitions on your hard drives or other
storage devices.

Press the Windows key, type Disk Management, and then press Enter.

Dr. Watson

Dr. Watson is a software utility included with Microsoft Windows that is used to help
detect, decode, and log errors that are encountered while Windows or Windows
programs are running.

ENCRYPTION TOOLS

Encrypt

To encrypt is the process of making data unreadable by other


humans or computers for the purpose of preventing others from
gaining access to its contents. Encrypted data is generated using
an encryption program such as PGP, encryption machine, or a
simple encryption key and appears as garbage until it is
decrypted. To read or use the data, it must be decrypted, and

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 159
DR. CECILIO PUTONG NATIONAL HIGH SCH.
only those who have the correct password or decryption key can make
the data readable again.

For example, as shown below the alphabet is shifted over four characters.

Encrypt key:
a=e, b=f, c=g, d=h, e=i, f=j, g=k, h=l, i=m, j=n, k=o, l=p, m=q, n=r, o=s, p=t, q=u, r=v, s=w,
t=x, u=y, v=z, w=a, x=b, y=c, and z=d.

Decrypt key:
a=w, b=x, c=y, d=z, e=a, f=b, g=c, h=d, i=e, j=f, k=g, l=h, m=i, n=j, o=k, p=l, q=m, r=n,
s=o, t=p, u=q, v=r, w=s, x=t, y=u, and z=v

File manager

A file manager is a software program that helps a user manage


all the files on their computer. File manager helps the user view
and manager their files, it is the operating system that is
responsible for accessing and storing the files on a storage
device.

Hex Editor

A hex editor is a computer program that allows users to edit the binary code,
represented by hexadecimal values, which makes up a computer file. You can view
and edit the raw file data, making modifications down to the core programming of
the software application.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 160
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Memory tester

• Memory test software, often called RAM test software, are programs that
perform detailed tests of your computer's memory system.
• The memory installed in your computer is very sensitive. It's always a good idea
to perform a memory test on newly purchased RAM to test for errors.

Network monitors

Network Monitoring Utilities consists of tools to monitor the performance of Routers,


Switches and other such devices. The tools provide graphical views of the monitored
statistics.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 161
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Bandwidth Monitor

Utility to check the bandwidth utilization of a Switch. The Tool is ideal for identifying
bottlenecks related to bandwidth within the network. This tool monitors the average
BPS and percentage utilization of all the interfaces existing in the specified device. The
tool shows the output in a graphical form.

Wake-on-LAN
Utility to remotely power on a PC. For the tool to
work, the PC should be configured to accept the
Wake-On-LAN remote command.

Port Scanner
Utility to scan the TCP ports of a
given range of IP Addresses to
check whether the port is
occupied or not.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 162
DR. CECILIO PUTONG NATIONAL HIGH SCH.
System Details Update

Utility to view and update the details, such


as Name, Location, and Contact details.

System Explorer

Utility to scan a SNMP-enabled


device to get its complete
details like system snapshot,
CPU usage, Disk Space details,
running processes, and
installed software.

TCP Reset

Utility to find and reset the list of TCP connections established with the switches, routers,
etc., in the network.

Package Manager
• A package manager or package-management system is a collection of
software tools that automates the process of installing, upgrading, configuring,
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 163
DR. CECILIO PUTONG NATIONAL HIGH SCH.
and removing computer programs for a computer's operating system in a
consistent manner.
• A package manager deals with packages, distributions of software and data in
archive files. Packages contain metadata, such as the software's name,
description of its purpose, version number, vendor, checksum, and a list of
dependencies necessary for the software to run properly.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 164
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Registry Cleaners
The registry or Windows registry is
a database of information, settings,
options, and other values
for software and hardware installed
on all versions of Microsoft
Windows operating systems.

• Information about the Registry


Editor.
• Registry root keys (hive
name).
• Windows registry values.
• Should I use "registry" or
"Registry" in my writing?
• Related pages.

Screen Saver

A screen saver or screensaver is


a software program that becomes
activated after the computer is
inactive for a specified amount of time.
Screensavers were originally designed
to help prevent images or text from
being burned into older monitors.

System monitor

Wise System Monitor is designed


to offer you a simple way to
monitor memory usage, CPU
usage, all the processes running
and main hardware
component info of your PC.
Since you know what is
consuming your RAM and CPU,
which part of your PC is
overheated, you can deal with
them accordingly to ensure your
computer functionality.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 165
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.4.2

Multiple Choice. Write your answer on a separate sheet of paper.

1. Which of the following statements is/are correct?


A. A virus copies itself automatically between and within computers
by attaching itself to another file.
B. A worm spreads very fast over a network and often slows down a
system.
C. Trojans are not viruses because they do not copy themselves
automatically D. All the above are true

2. Utility software is system software designed to help analyze, configure, optimize or


maintain a computer.
A. TrueTrue B. False

3. Utility software is generally used by people with an advanced level of computer


knowledge.
A. TrueTrue B. False

4. Which of the following utilities can make internet downloading safer?


A. Scandisk
B. AntivirusAntivirus
C. Defragmentation
D. Winzip

5. Why is a File-Compression utility ideal for use when files are being transferred over
a network connection?

A. Zipped files are smaller and so sending them is faster


B. Zipped files are always virus-free
C. It is impossible to send unzipped files over a network connection
D. None of the above are true

6. Which of these utilities can help us get rid of malicious software?


A. Scan disk, antivirus
B. Anti-spyware software, antivirus
C. Scan disk, antivirus, anti-spyware software
D. Antivirus, trojan, anti-spyware software

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 166
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.4.2

1. D 2.
A
3. A
4. B
5. A
6. B

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 167
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 4.1.3

APPLICATION SOFTWARE UPDATES

Learning Objective:

1. Identify the different method in updating application software.


2. Update application software installed on your PC.
3. Value the importance of application software updates.
Introduction
Keeping your software up to date is a crucial practice in Internet safety. Most software
updates automatically by default, but you should know how to check the updates
and begin the process yourself. Knowing how to keep software updated can improve
your computer's stability and security and let you know about new features, helping
you be an informed and empowered user.

Fix Your Own Computer

1. Check the File and Help menus for update instructions.


2. Choose Start→Programs→All Programs.
3. Look for the install directory of an application you want to update. Look for an
update program option.
4. Point your Internet browser to the software manufacturer’s Web site and look
for update instructions.
5. Download a newer version than the version you’re running.
6. Install according to the software directions.
7. Run diagnostics and use a defragmentation utility, which differs depending on
your operating system:
Windows Vista or Windows 7:

1. Choose Start→Control Panel.


2. Click System and Security.
3. Choose Defragment Your Hard Drive in the Administrative Tools
section.
4. Choose the drive you want to defragment.
5. Click Defragment Disk.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 168
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Software and App Updates

Software and app updates contain vital


security updates to help protect your devices
from cyber criminals.

Update your web browser

If you haven’t been prompted to update your


web browser by the browser itself, just head
along to the What Browser? (opens new
window)website to check what version you’re
using and – if necessary – download and install
the latest one.

Update Microsoft Windows

The best way to keep your


PC current is to turn on
automatic updates. Go to
'Windows Update'
and check that your
computer is set to
download and install
updates automatically.

Update Apple macOS

Your Apple computer will usually prompt you when a software update is available.

If you’ve turned this feature off, you can check for updates in the App Store. Click the
‘App Store’ icon in the dock to open the App store. Once it has opened press the
‘Updates’ icon at the top of the screen and it will check options to install any available
Updates.
Update Android on your tablet or smartphone

Go into the ‘Settings’ app, scroll to the bottom and select ‘About’. Choose ‘Software
updates’ from the menu and your device will check for available updates.

Your Android tablet or smartphone should automatically check for updates to the
apps you use, and download and install them directly from the Google Play Store.
Update your iPhone or iPad

When the apps on your iPhone or


iPad need updating, you’ll notice a
red dot appear in the corner of the
icon for the ‘App Store’ app, with a
number. The number in the red dot
tells you how many apps need
updating.

When the red dot appears, go into


‘Updates’ in the App Store and press
‘Update All’ to get the latest version
of each app.

You can also change your settings so that apps update automatically, as soon as a
new version is available. In ‘Settings’ go to ‘iTunes and App Store’ and then press the
switch next to ’Updates’. If you want the updates to only download when you have
access to Wi-Fi, then leave the ‘Use Mobile Data’ option unselected.

Apple has a really good guide to updating the iOS software that iPhones and iPads run on.
You can view it here:

Importance of Software Updates

• Know that keeping your security software up-to-date is critical. This will protect you
from the latest threats.
• Select auto-update for software on both your mobile devices and computers,
when possible. For software that doesn’t update automatically, make it a habit to
regularly check for and apply available updates.
• Before downloading any software, read others’ reviews first to make sure it’s safe
to install in the first place. Cybercriminals like to distribute phony applications
designed to steal your information.
• Keep on top of the latest threats so you know how to protect yourself from known
vulnerabilities.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 170
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.4-3
Essay

1. Give the Importance of Software Updates

ANSWER KEY 1.4-3

• Know that keeping your security software up-to-date is critical. This will protect you
from the latest threats.
• Select auto-update for software on both your mobile devices and computers,
when possible. For software that doesn’t update automatically, make it a habit to
regularly check for and apply available updates.
• Before downloading any software, read others’ reviews first to make sure it’s safe
to install in the first place. Cybercriminals like to distribute phony applications
designed to steal your information.
• Keep on top of the latest threats so you know how to protect yourself from known
vulnerabilities.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 171
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.4-4

VIRTUALIZATION SOFTWARE

Learning Objective:
1. Define Virtualization
2. Describe virtualization software
3. Plan for OS installation using the virtual Machine
4. Appreciate the benefits of Virtualization in our daily lives

Introduction
What is virtualization?

Virtualization is a broad term (virtual memory, storage, network, etc) basically allows
one computer to do the job of multiple computers, by sharing the resources of a single
hardware across multiple environments

App. App. App. App. Virtual Virtual


App. A App. B App. C App. D
Operating Container Container

Virtualization Layer

Hardware

Hardware
The concept of virtualization is generally The
‘Nonvirtualized ’ system Virtualized system
A single OS controls all hardware platform
resources It makes it possible to run multiple Virtual
Containers on a single physical platform

Brief History of Virtualization

The concept of virtualization is generally believed to have its origins in the mainframe
days in the late 1960s and early 1970s, when IBM invested a lot of time and effort in
developing robust time-sharing solutions.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 172
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Time-sharing refers to the shared usage of computer resources among a large group
of users, aiming to increase the efficiency of both the users and the expensive
computer resources they share.
This model represented a major breakthrough in computer technology: the cost of
providing computing capability dropped considerably and it became possible for
organizations, and even individuals, to use a computer without actually owning one.
Similar reasons are driving virtualization for industry standard computing today: the
capacity in a single server is so large that it is almost impossible for most workloads to
effectively use it. The best way to improve resource utilization, and at the same time
simplify data center management, is through virtualization.

Advantages and Disadvantages of VIRTUALIZATION

Main Advantages:
✓ Less hardware is needed (easy maintaining and reduced costs)
✓ High flexibility when the infrastructure is under construction due to fast
provision of neVMs
✓ Easy maintaining of the reduced hardware

Disadvantages:
✓ Less performance, usually overhead of 5 to 10 percent
✓ Failure of one server concludes the shutdown of all VM’s running on it

VIRTUALIZATION SOFTWARE
It allows a single host computer to create and run one or more virtual environments.

It is most often used to emulate a complete computer system in order to allow a guest
operating system to be run.

What are virtual machines?

A virtual computer system is known as a “virtual machine” (VM): a tightly isolated software
container with an operating system and application inside.

Key Properties of Virtual Machines


A. Partitioning
Run multiple operating systems on one physical machine
Divide system resources between virtual machines

B. Isolation
Provide fault and security isolation at the hardware level
Preserve performance with advanced resource controls

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 173
DR. CECILIO PUTONG NATIONAL HIGH SCH.
C. Encapsulation

Save the entire state of a virtual machine to files


Move and copy virtual machines as easily as moving and copying files

Hardware Independence

Provision or migrate any virtual machine to any physical server

Types of Virtualizations

1. Network virtualization is a method of combining the available resources in a


network by splitting up the available bandwidth into channels, each of which is
independent from the others and can be assigned -- or reassigned -- to a particular
server or device in real time.

2. Storage virtualization is the pooling of physical storage from multiple network


storage devices into what appears to be a single storage device that is managed
from a central console. Storage virtualization is commonly used in storage area
networks.

3. Server virtualization is the masking of server resources -- including the number and
identity of individual physical servers, processors and operating systems -- from
server users.

4. Data virtualization is abstracting the traditional technical details of data and data
management, such as location, performance or format, in favor of broader access
and more resiliency tied to business needs.

5. Desktop virtualization is virtualizing a workstation load rather than a server. This


allows the user to access the desktop remotely, typically using a thin client at the
desk. Since the workstation is essentially running in a data center server, access to
it can be both more secure and portable.

6. Application virtualization is abstracting the application layer away from the


operating system. This way the application can run in an encapsulated form
without being depended upon on the operating system underneath.

DIFFERENT VIRTUAL MACHINES USED IN VIRTUALIZATION

VMware Player (Windows, Linux): VMware has their own line of virtual machine
programs. You can use VMware Player on Windows or Linux as a free, basic virtual
machine tool.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 174
DR. CECILIO PUTONG NATIONAL HIGH SCH.
More advanced features — many of which are found in VirtualBox for free — require
upgrading to the paid VMware Workstation program. We recommend starting out with
VirtualBox, but if it doesn’t work properly you may want to try VMware Player

VMware Fusion (Mac OS X): Mac users will need to buy VMware Fusion to use a VMware
product, as the free VMware Player isn’t available on a Mac.

Parallels Desktop (Mac OS X)


Macs also have Parallels Desktop available. Both Parallels Desktop and VMware Fusion
for Mac are more polished than the virtual machine programs on other platforms —
they’re marketed to average Mac users who might want to run Windows software.

BENEFITS OF VIRTUALIZATION

• Virtualization can increase IT agility, flexibility, and scalability while


creating significant cost savings. Workloads get deployed faster,
performance and availability increases and operations become
automated, resulting in IT that's simpler to manage and less costly to
own and operate.
• Reduce capital and operating costs.
• Minimize or eliminate downtime.
• Provision applications and resources faster.
• Enable business continuity and disaster recovery.
• Simplify data center management.
• Build a true Software-Defined Data Center.

How virtualization works?

Virtualization describes a technology in which an application, guest operating system


or data storage is abstracted away from the true underlying hardware or software. A
key use of virtualization technology is server virtualization, which uses a software layer
called a hypervisor to emulate the underlying hardware. This often includes the CPU's
memory, I/O and network traffic. The guest operating system, normally interacting with
true hardware, is now doing so with a software emulation of that hardware, and often
the guest operating system has no idea it's on virtualized hardware. While the
performance of this virtual system is not equal to the performance of the operating
system running on true hardware, the concept of virtualization works because most
guest operating systems and applications don't need the full use of the underlying
hardware. This allows for greater flexibility, control and isolation by removing the
dependency on a given hardware platform. While initially meant for server virtualization,
the concept of virtualization has spread to application

When to virtualize?

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 175
DR. CECILIO PUTONG NATIONAL HIGH SCH.
A. Virtualize if you rely on technology – Companies that rely on technology often
use several servers and technology from hardware like laptops and networks. Basically,
if your company needs technology to operate, virtualization can help you reduce the
overall operation costs.

B. Virtualize if your company exceeds 20 employees – Many tech experts agree


that there is no need for virtualization if you have a business with less than 10-20
employees.

C. Virtualize if you can cover the costs – While virtualization is meant to reduce
costs, like any modern technology it requires an initial investment. The cost of
virtualization can be high for smaller businesses to implement.

Virtualize if you want space – Certain business operators throw away a big chunk of
their money on an extra room to house large server racks, wires or even IT personnel to
maintain them. The issue here is the cost of maintenance, as well as limited office
space.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 176
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.4.4

ORAL INTERVIEW

1. What is the use of virtual box?


Answer: Running multiple operating systems simultaneously. Virtual Box allows you to
run more than one operating system at a time. This way, you can run software written
for one operating system on another (for example, Windows software on Linux or a
Mac) without having to reboot to use it.

2. What are the benefits of using a virtual machine?


Answer: The main advantages of virtual machines: Multiple OS environments can exist
simultaneously on the same machine, isolated from each other; Virtual machine can
offer an instruction set architecture that differs from real computer’s; Easy
maintenance, application provisioning, availability and convenient recovery.

We can create and run multiple Virtual Machines, running different operating systems, on
the same computer at the same time.

3. Virtual box runs on which operating systems?

Answer: Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and
supports a large number of guest operating systems including but not limited to
Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10),
DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and
OpenBSD.

4. Why is virtualization useful?


Answer: The techniques and features that VirtualBox provides are useful for several
scenarios:

Running multiple operating systems simultaneously. VirtualBox allows you to run more
than one operating system at a time. This way, you can run software written for one
operating system on another (for example, Windows software on Linux or a Mac)
without having to reboot to use it.

Easier software installations. Software vendors can use virtual machines to ship entire
software configurations. For example, installing a complete mail server solution on a
real machine can be a tedious task.

Testing and disaster recovery. Once installed, a virtual machine and its virtual hard disks
can be considered a “container” that can be arbitrarily frozen, woken up, copied,
backed up, and transported between hosts.

Infrastructure consolidation. Virtualization can significantly reduce hardware and


electricity costs. Most of the time, computers today only use a fraction of their potential
power and run with low average system loads.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 177
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4-5

INSTALL THE FOLLOWING OS (BY GROUP) USING VIRTUAL MACHINE

Performance Objective: Given the following materials, equipment’s and tools perform
install the following OS (by group) using virtual machine in a logical, and
methodical manner.

Duration: 15 minutes.
Procedure:
By Group: Divide the class into 2 groups Install Virtual Box in your PC

Group 1: Install Win 7 using the virtual Box


Group 2: Install Win 8
Group 3: Install Win 10
Group 4: Install Server 8 R2

Assessment Method: Hands-on and Observation

RUBRICS

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 178
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.4.5

“DISK MANAGEMENT SOFTWARE”

Learning Objective:

1. Describe Disk Management Software


2. Understand difference between Basic disk and Dynamic disk
3. Understand difference between: Spanned volume, Striped volume,
Mirrored volume, RAID-5 volume
4. Manage your Disk at least 50 GB.
Introduction
Disk Management is a utility built into different operating systems which can be used
to create, delete, format partitions, assign drive letters, and much more. Disk
Management can also be used to view partitions and their formatted file systems on
the hard drive.

It is an extension of the Microsoft Management Console that allows full management of


the disk-based hardware recognized by Windows.
The Disk Management tool has a graphical interface like a regular program and is
similar in function to the command line utility diskpart, which was a replacement of an
earlier utility called fdisk.
Disk Management also used to check free hard drive space, total storage capacity of
all the disks as well as how much free space is remaining, which is expressed in units
(i.e. MB and GB) as well as a percentage.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 179
DR. CECILIO PUTONG NATIONAL HIGH SCH.
COMMON WAY TO ACCESS DISK MANAGEMENT
1. via the Computer Management utility

Method 1 - Start > Control Panel > Administrative Tools. Double click Computer
Management and then click Disk Management in the left hand column.

2. via the Command Prompt or another command line

Method 2 - Click Start > Run and type diskmgmt.msc in the Open: line and click OK. The
Disk Management snap-in will open.

Disk Management Sections

Disk Management has two main sections - a top and a bottom:


• The top section of Disk Management contains a list of all the partitions,
formatted or not, that Windows recognizes.
• The bottom section of Disk Management contains a graphical representation
of the physical drives installed in the computer.

DISK MANAGEMENT CONSOLE


The basic Disk Management console is divided into three main areas
• GREEN rectangle
• RED rectangle
• BLUE rectangle
Green - The Console Tree is the tall vertical column on the left that's defined by the green
color.
Red and blue areas are referred to as Top and Bottom and are both user definable via
the View menu option. By default, the Top area displays the Volume List and the
Bottom area displays the Graphical View. A third view called Disk List can be
substituted in either pane if it's more to your liking, or the Bottom pane can be hidden
completely. The View menu option also contains a [Settings] option that allows
adjustment of the color schemes, size of the drive displays and a few other options so
the console can be tailored to individual taste.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 180
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Common things that you can do in Disk Management:
• Partition a Drive
• Format a Drive
• Change a Drive's Letter
• Shrink a Partition
• Delete a Partition
• Change a Drive's File System
Partition a Hard Drive to partition a hard drive in Windows means to divide the hard
drive into parts and make those parts available to the operating system. It's also
possible for an entire hard drive to have a single partition, which oddly enough is
actually the most common way to partition a hard drive.
Steps:
In Disk Management’s Graphical view, right-click an unallocated or free area, and then
click New Simple Volume. This starts the New Simple Volume Wizard.
Read the Welcome page and then click Next.
• The Specify Volume Size page specifies the minimum and maximum size for the
volume in megabytes and lets you size the volume within these limits.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 181
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Size the partition in megabytes using the Simple Volume Size field and then click
Next.
• On the Assign Drive Letter or Path page, specify whether you want to assign a
drive letter or path and then click Next.
The available options are as follows:
• Use the Format Partition page to determine whether and how the volume
should be formatted. If you want to format the volume, choose Format This
Volume with The
Following Settings, and then configure the following options:
• Click Next, confirm your options, and then click Finish.
• The Windows Disk Management tool will now show the space configured as a
new partition.
Shrink a Partition
To shrink a basic volume, follow these steps:
• In Disk Management, right-click the volume that you want to shrink, and then
click Shrink
• In the field provided in the Shrink dialog box, enter the amount of space by
which to shrink the disk.
• In Disk Management, right-click the volume that you want to shrink, and then
click Shrink
• In the field provided in the Shrink dialog box, enter the amount of space by
which to shrink the disk.
• Click Shrink.
• Once you have unallocated space, you can use that space to create a new
partition by repeating above partition steps.
Extend volume
You can add more space to existing primary partitions and logical drives by extending
them into adjacent unallocated space on the same disk. To extend a basic volume, it
must be raw or formatted with the NTFS file system. You can extend a logical drive
within contiguous free space in the extended partition that contains it. If you extend a
logical drive beyond the free space available in the extended partition, the extended
partition grows to contain the logical drive.
Change drive letter & path
You can use Disk Management to assign a mount point folder path (rather than a drive
letter) to the drive. Mount-point folder paths are available only on empty folders on
basic or dynamic NTFS volumes.
Reactivate Volume
A dynamic disk may become Offline if it is corrupted or intermittently unavailable. A
dynamic disk may also become Offline if you attempt to import a foreign (dynamic)
disk and the import fails. An error icon appears on the Offline disk. Only dynamic disks
display the Missing or Offline status. Only dynamic disks can be reactivated.
Create a Spanned Volume
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 182
DR. CECILIO PUTONG NATIONAL HIGH SCH.
A spanned volume is a dynamic volume consisting of disk space on more than one
physical disk. If a simple volume is not a system volume or boot volume, you can extend
it across additional disks to create a spanned volume, or you can create a spanned
volume in unallocated space on a dynamic disk. You need at least two dynamic disks
in addition to the startup disk to create a spanned volume. You can extend a spanned
volume onto a maximum of 32 dynamic disks. Spanned volumes are not fault tolerant.
Extending a spanned volume
A spanned volume is a dynamic volume that consists of disk space on more than one
physical disk. If you extend a simple volume across multiple disks, it becomes a
spanned volume. You can extend a volume only if it does not have a file system or if it
is formatted using the NTFS file system.
You cannot extend volumes formatted using FAT or FAT32.
Shrink a Spanned Volume
You can decrease the space used by simple or spanned volumes by shrinking them
into contiguous free space at the end of the volume. When you shrink a partition, any
ordinary files are automatically relocated on the disk to create the new unallocated
space. There is no need to reformat the disk to shrink the partition.
Initialize Disk
New disks appear as Not Initialized. Before you can use a disk, you must first initialize it.
If you start Disk Management after adding a disk, the Initialize Disk Wizard appears so
you can initialize the disk. The disk is initialized as a basic disk.
Move Disks to Another Computer Verify
volume health.
Use Disk Management to make sure the status of the volumes on the disks is Healthy. If the
status is not Healthy, you should repair the volumes before you move the disks.
Uninstall the disks.
Remove dynamic disks If the disks you want to move are dynamic disks, in Disk
Management, right-click the disks that you want to move, and then click Remove Disk.
Install disks in the new computer
If the disks are external, plug them into the computer. If the disks are internal, make
sure the computer is turned off and then physically install the disks in that computer.
Start the computer that contains the disks you moved and follow the instructions on
the Found New Hardware dialog box.
Manage Virtual Hard Disks
The Virtual Hard Disk (VHD) format is a publicly available image format(ISO)
specification that specifies a virtual hard disk encapsulated in a single file, capable of
hosting native file systems while supporting standard disk and file operations.
The path specifying the location for the VHD must be fully qualified and cannot be in the
\Windows directory.
• The minimum size for a VHD is 3 megabytes (MB).
• A VHD can only be a basic disk.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 183
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Because a VHD is initialized when it is created, creating a large fixed-
size VHD might take some time.
Warning
This is not for a daily use. It may be cause a damage to your hard drive because it realtime
deal with the hardware.

SELF-CHECK 1.4.6
Multiple Choice. Choose the best answer.
1. The Disk Cleanup utility removes which types of unneeded files?
A. Temporary Internet files
B. Temporary files that remain when an application is closed
C. Programs no longer in use
D. Both A and B

2. Which of the following correctly identifies the four possible entries in a file
allocation table?
A. Filename, date, time, size
B. Number of the starting cluster, number of the ending cluster,
number of used clusters, number of available clusters
C. An end-of-file marker, a bad-sector marker, code indicating the
cluster is available, the number of the cluster where the next part
of the file is stored D. Filename, folder location, starting cluster
number, ending cluster number

3. You receive an "Invalid media" error when trying to access a hard drive.
What is the most likely cause of the error?
A. The drive has not been partitioned.
B. The drive has not been set to active.
C. The drive has not been formatted.
D. The drive has died.

4. Which of the following is an advantage of partitioning a hard drive into


more than one partition?
A. It enables a single hard drive to store more than one operating
system.
B. It protects against boot sector viruses.
C. It uses less power.
D. It allows for dynamic disk RAID 5.

5. What graphical program does Microsoft include with Windows 2000/XP


and Windows Vista/7 to partition and format a drive?
A. Format
B. Disk Management console
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 184
DR. CECILIO PUTONG NATIONAL HIGH SCH.
C. Disk Administrator console
D. System Commander

6. Which of the following statements is true about extended partitions? A.


They are optional.
B. They are assigned drive letters when they are created.
C. They may be set to active.
D. Each drive must have at least one extended partition.

7. Nhughes wants to create a new simple volume in some unallocated


space on his hard drive, but when he right-clicks the space in Disk
Management he sees only an option to create a new partition. What is the
problem? A. The drive has developed bad sectors.
B. The drive is a basic disk and not a dynamic disk.
C. The drive has less than 32 GB of unallocated space.
D. All of the above

8. Rj wishes to check her hard drive for errors. What tool should she use?
A. FDISK
B. Format
C. Disk Management
D. Error-checking

9. Which two terms identify a bootable partition?


A. Master, FAT
B. Slave, FAT
C. Primary, Active
D. Primary, N Primary, NTSF

10. For what purpose can you use disk quotas? A. Limit users to a specific
drive.
B. Extend the capacity of a volume.
C. Manage dual-boot environments.
D. Limit users’ space on a drive

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 185
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.4.5
1. D
2. C
3. C
4. A
5. B
6. A
7. B
8. D
9. C
10. D

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 186
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4.6 - A ACCESS DISK MANAGEMENT IN WINDOWS 10
Performance Objective: Given all the materials and equipment’s, you must be able to
access disk management in windows 10.
Duration: 10 min.
Requirements: System Unit with complete OS Procedure:
1. Right-click on Start at the bottom left of the screen

2. From the list, click on Disk Management

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 187
DR. CECILIO PUTONG NATIONAL HIGH SCH.
3. Disk Management will then launch on the Desktop

Assessment Method: Hands-on and Oral questioning

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 188
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4.6 - B ACCESS DISK MANAGEMENT IN WINDOWS 8

Performance Objective: Given all the materials and equipment’s, you must be able to
access disk management in windows 10.
Duration: 10 min.
Requirements: System Unit with complete OS
Procedure:
1. Right-click on Start at the bottom left of the screen.

2. From the list, click on Disk Management

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 189
DR. CECILIO PUTONG NATIONAL HIGH SCH.
3. Disk Management will then launch on the Desktop

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 190
DR. CECILIO PUTONG NATIONAL HIGH SCH.
TASK SHEET 1.4.6 – C ACCESS DISK MANAGEMENT IN WINDOWS

Performance Objective: Given all the materials and equipment’s, you must be able to
access disk management in windows 10.
Duration: 10 min.
Requirements: System Unit with complete OS
Procedure:
1. From the Start Menu,
rightclick on the Computer
icon and choose Manage
from the menu. This will bring
up the Computer
Management window

2. Click on Disk Management,


which appears in the left-
hand side under the heading
Storage.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 191
DR. CECILIO PUTONG NATIONAL HIGH SCH.
3. The list of the hard drives available is now be visible in the center of the window

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 192
DR. CECILIO PUTONG NATIONAL HIGH SCH.
LEARNING OUTCOME SUMMARY Learning Experiences Learning Outcome
5: Conduct Testing and Documentation
Learning Activities Special Instructions
2. Read information sheet 1.5-1 If you have some problem on the content of
“Computer System Stress testing ” the information sheet don’t hesitate to
approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
answer self check provided in the module.
2. Answer Self Check 1.5-1 Compare your answer to the answer key. If you
got 100% correct answer in this self-check, you
can now move & do the Activity Sheet. If not
review the information sheet and go over the
self-check again.

3. Do Activity Sheet 1.5-1 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

4. Read information sheet 1.5-2 If you have some problem on the content of
“Environmental Policy” the information sheet don’t hesitate to
approach your facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
answer self-check provided in the module.
5. Answer Self Check 1.5-1 Compare your answer to the answer key. If you
got 100% correct answer in this self-check, you
can now move & do the Activity Sheet. If not
review the information sheet and go over the
self-check again.

6. Do Activity Sheet 1.5-1 Compare your work to the checklist and let
your trainer check it. If you got 100% correct
answer in this activity, you can now move to
the next information sheet. If not review the
information sheet and go over the activity
again.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 193
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.5-1

COMPUTER SYSTEM STRESS TESTING

Learning Objective:

1. Define stress test.


2. Identify the different stress testing method.
3. Conduct stress test to ensure reliability of equipment in accordance
with manufacturer’s instructions and system requirements.

INTRODUCTION

STRESS TESTING

Stress testing is the process of determining the ability of a


computer, network, program or device to maintain a
certain level of effectiveness under unfavorable conditions.
The term also refers to qualitative evaluation of factors such
as availability or resistance to denial-of-service
(DoS) attacks. Stress testing is often done in conjunction
with the
more general process of performance testing. Stress testing can be time-consuming
and tedious. Stress testing can provide a means to measure graceful degradation, the
ability of a system to maintain limited functionality even when a large part of it has
been compromised.

The main purpose of stress testing is to check the recoverability of system, program, device,
or network.

Five (5) different types of stress testing


1. Distributed Stress Testing
2. Application Stress Testing
3. Transactional Stress Testing
4. Systemic Stress Testing
5. Exploratory Stress Testing

The image given beside will show you the


different factors of stress testing.

Actions involved may include:


• Running several resource-
intensive applications in a single
computer at the same time

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 194
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Attempting to hack into a computer and use it as a zombie to spread
spam
• Flooding a server with useless e-mail messages
• Making numerous, concurrent attempts to access a single Web site
• Attempting to infect a system with viruses, Trojans, spyware or other
malware.

TYPES OF COMPUTER STRESS TEST

A. CPU Stress Testing is performed to check the CPU’s performance after running it
at a full speed completely up to maximum temperature. When CPU stress testing
is performed, all the cores of the multi-core system will get used. CPU will get
tested with the compatible and justified workload.

B. GPU Stress Testing is performed to check its limits by utilizing its full processing
power. Stress testing a RAM is the first thing that you should perform if you are
facing any of the problems like bluescreen or system reboot.

Different tools use different techniques for checking the performance of the system.
For Example, some tools use a 3D scene or some use the prime numbers.

C. Hardware Stress testing should be performed according to its usage. While


performing hardware stress testing make sure that your CPU is well ventilated, is
cooled down properly, etc. Most importantly, check if the power supply is good.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 195
DR. CECILIO PUTONG NATIONAL HIGH SCH.
14 FREE HARD DRIVE TESTING PROGRAMS

Important: Depending on the issue found, you may need to drive if it fails some part of one
of these hard drive tests.

1. Seagate SeaTools
Seagate SeaTools is free hard drive testing software that comes in two forms for home users:
• SeaTools for DOS supports Seagate or Maxtor drives and runs independent from your
operating system on its own CD or USB drive, making it highly reliable.
• SeaTools for Windows is a program that installs on your Windows system. You can do
basic and advanced testing of any kind of drive - internal or external - from any
manufacturer.

2. HDD Scan

• HDD Scan is a free hard drive testing program for all types of drives, no matter the
manufacturer.
• There are several tools included in HDD Scan, including a SMART test and a surface
test.
• The program is very easy to use, is completely portable, supports almost all drive
interfaces, and seems to be regularly updated.

3. Disk Checkup

• Disk Checkup is a free hard drive tester that should work with most hard drives.
• Hard drives that have a SCSI or hardware RAID connection are not supported and
cannot be detected by DiskCheckup.

4. GSmartControl

GSmartControl can run three self-tests to find drive faults:

• Short Self-test: Takes around 2 minutes to complete and is used to detect a


completely damaged hard drive.
• Extended Self-test: Takes 70 minutes to finish and examines the entire surface of a
hard drive to find faults.
• Conveyance Self-test: This is a 5-minute test that's supposed to find damages that
occurred during the transporting of a drive.

5. Windows Drive Fitness Test

• Windows Drive Fitness Test is free hard drive diagnostic software available for use on
most drives available today.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 196
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• but you can't use the program to scan the drive that has Windows installed.
• only USB and other internal hard drives can be scanned with Windows Drive
Fitness Test.

6. Samsung HUTIL.

• Samsung HUTIL is a free hard drive diagnostic utility for Samsung hard drives.
• HUTIL is sometimes called ES-Tool.
7. Western Digital Data Lifeguard Diagnostic for Windows

• The Western Digital Data Lifeguard Diagnostic software is available for download in
both a portable Windows program as well as a bootable, ISO file and allows for a
number of hard drive tests. See the installation instructions from Western Digital in the
link below for details.

8. Bart's Stuff Test

• Bart's Stuff Test is a free, Windows-based hard drive stress test.


• There aren't a lot of options in Bart's Stuff Test and it's not as thorough as some other
tests on this list.

9. Fujitsu Diagnostic Tool

Fujitsu Diagnostic Tool.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 197
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• The Fujitsu Diagnostic Tool (FJDT) is available in both a Windows version and an
operating system independent, bootable DOS version. Unfortunately, the bootable
version is designed for floppy disks - an image that works with a CD or USB drive is
not available.
• Two tests are available with Fujitsu Diagnostic Tool, a "Quick Test" (about three
minutes) and a "Comprehensive Test" (time will vary based on hard drive size).

10. HD Tune

• HD Tune is a Windows-based hard driver tester that works with any internal or
external hard drive, SSD, or memory card.
• run a benchmark read test with HD Tune, check the health status with SelfMonitoring

Analysis and Reporting Technology (SMART), and run an error scan.

11. Free EASIS Drive Check

• Free EASIS Drive Check is a hard drive tester that has two main testing utility builtin -
a sector test and a SMART value reader.
• The SMART test can list over 40 values about a hard drive while the sector test checks
the surface of the media for reading errors.
• The report of either test can be read straight from the program when complete,
configured to be sent to you by email or printed off.
• Free EASIS Drive Check is said to work with Windows 2000 through Windows 7, but I
was able to use it properly on Windows 8 and 10 as

well.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 198
DR. CECILIO PUTONG NATIONAL HIGH SCH.
12. Error Checking (chkdsk) in Windows 10

A. Error Checking sometimes referred to as scandisk, is a hard drive testing tool that
comes with Microsoft Windows that can scan your hard drive in search of a wide
range of errors.

13. Macrorit Disk Scanner


A. Macrorit Disk Scanner is a very simple program that checks for bad sectors on a
hard drive. It's easy to use and you can start using it in no time since it's fully
portable and doesn't need to be installed.

14. Ariolic Disk Scanner

A. Ariolic Disk Scanner is very similar to Macrorit Disk Scanner in that it's just a
readonly scan of a drive to check for bad sectors.
B. The program is completely portable and just over 1 MB in size.
C. One thing that's different than Macrorit Disk Scanner is that Ariolic Disk Scanner
lists the files where read errors occurred. This sounds like a useful feature but I,
unfortunately, was unable to confirm it because my scan returned no errors.

D. A Self-Boot Burn-In Test will ensure your essential hardware is reliable. These
diagnostics are robust, accurate and quick, and act directly on the core
hardware level (i.e. without needing to alter the O/S). These tests also reveal
exactly where faults lie (e.g.
hard disc, memory, mainboard etc).

E. Windows Stress Test is O/S based and recommended as a follow up to self-boot


burn-in testing. During this process, Windows systems are pushed to levels where
the unreliable components fail.

F. Pass Mark Burn in Test is a software tool that allows all the major sub-systems of
a computer to be simultaneously stress tested for endurance, reliability and
stability.

FUNCTIONS OF PASSMARK BURN-IN TEST

• Assists in PC Troubleshooting and diagnostics


• Dramatically reduce your test times with simultaneous testing
• Avoid costly downtime, system rebuilds and lost data
• The hottest, fastest CPU Burn in tool around

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 199
DR. CECILIO PUTONG NATIONAL HIGH SCH.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 200
DR. CECILIO PUTONG NATIONAL HIGH SCH.
G. Graphic Card Tests

3DMark is a computer benchmarking tool to determine the performance of a


computer's 3D graphic rendering and CPU workload processing capabilities.

PCMark is a computer benchmark tool to test the performance of a PC at the system


and component level.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 201
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1-5-1

A. Essay

Describe Stress Testing

B. Enumeration:

1- 5 Different Types of Stress Testing

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 202
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.5.1

A. Essay

1. Stress testing is a type of performance testing which validates the highest limit of your
computer, device, program, or network with an extreme load. Stress testing will
check the behavior of a system, network, or application under an immense load. It
also checks whether the system can recover while returning to the normal stage or
not.

B. Enumeration

Five different types of stress testing


1. Distributed Stress Testing
2. Application Stress Testing
3. Transactional Stress Testing
4. Systemic Stress Testing
5. Exploratory Stress Testing

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 203
DR. CECILIO PUTONG NATIONAL HIGH SCH.
INFORMATION SHEET 1.5.2

ENVIRONMENTAL POLICY

Learning objective:

1. Describe Environmental Policy


2. Differentiate 5s and 3R
3. Follow 5s and 3r according to environmental policies. Introduction

An environmental policy is a statement about an organization’s environmental position


and values. The ISO 14001 standard states that an environmental policy is the
organization’s overall environmental performance intentions and direction formally
expressed by top management.

5S is a foundation for more disciplined actions.

The benefits of 5S are:

1. Cleaner and safer work areas


2. Less wasted time through more
workplace organization
3. Less space
4. Improved self-discipline
5. Improved culture

What are the 5S's?

• Sorting - separating the needed from the unneeded. Sorting activities aim to
eliminate unneeded items from the work area and to perform an initial cleaning.
• Simplifying - a place for everything and everything in its place, clean and ready for
use. Simplifying arranges the workplace to ensure safety and efficiency.
COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 204
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Systematic Cleaning - cleaning for inspection. Systematic daily cleaning and
inspection of work areas and equipment help you understand current conditions
and determine if corrective action is required.
• Standardizing - developing common methods for consistency. Standardizing aims
to make abnormal conditions noticeable and to document agreements to ensure
consistency and sustainability.
• Sustaining - holding the gains and improving. Sustaining is aimed at maintaining the
improvements from the other 5S activities and improving further.

Implementing 5S

5S must be a team effort and the results must enable anyone to "tell at a glance" what
is right and what is out of place. It also must make doing the work easier. Implementing

5S occurs in two phases:

1. Initial implementation
2. Later refinement

Sorting

The steps of sorting are:

• Establish criteria for what is not needed.

• Identify the unneeded items and move to a holding area.

• Dispose of the not needed items, either by transferring to a department that


needs them, selling them, or discarding them.

• Conduct an initial cleaning.

Simplifying

The steps of simplifying are:

• Determine a location for each item based on frequency of use and proper
safety zone (decreasing the likelihood of strain injuries, for example).
• Develop shadow boards and label items - a home for everything.
• Determine how to replenish supplies.
• Document layout, equipment, supplies, and agreements for returning items to
their homes.

Systematic Cleaning

The steps of systematic cleaning are:

• Identify points to check for performance.


COMPUTER SYSTEM Date Developed: Document No.:
SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 205
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Determine acceptable performance.

• Mark equipment and controls with visual indicators (e.g., gauges show the
correct range).

• Conduct daily cleaning and visual checks.

Standardizing

The steps in standardizing are:

• Establish a routine check sheet for each work area. The check sheet is like a
pilot's pre-flight check list. It shows what the team should check during selfaudits.
• Establish a multi-level audit system where each level in the organization has a
role to play in ensuring that 5S is sustained in the work areas and that the 5S
system evolves and strengthens.
• Establish and document standard methods across similar work areas.
• Document any new standard methods for doing the work.

Sustaining

The steps of sustaining are:

• Determine the 5S level of achievement - the overall grade.


• Perform worker-led routine 5S checks using the 5S check list.
• Address backsliding and new opportunities found during routine checks.
• Conduct scheduled, routine checks by team leads or supervisors or by people
from outside of the workgroup.
• Perform higher-level audits to evaluate how well the 5S system is working overall.

Three R’s (3r’s)– Reduce, Reuse and Recycle

Reduce: The first step towards the effective waste management is to consume only a
limited number of resources, which are essential.

• Helps in saving energy and money


• Helps in utilizing a product to its fullest extent
• Helps in saving natural resources
• Helps in reducing pollution caused by harvesting of new raw materials.

Reuse: Reusing your old things for a little longer can play a major role in reducing lot of
waste in your surroundings.

Major advantages of employing this policy in our daily lives:

• Helps in the reduction of gas emissions, which is majorly contributing to the


global climate change

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 206
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Helps in sustaining the beautiful surroundings and environment for our future
generations
• Helps in reducing waste that needs to be recycled or sent to incinerators and
landfills.

Recycle: Recycling is one of those R’s that has caught the maximum attention of all
age groups. It is mainly due to the number of recycling programs, which are run by the
government and the municipalities. The process of waste recycling usually involves
collecting and processing those materials, which would otherwise be discarded as
trash, and turning them into new products.

This process is and will always be of great benefit to your surroundings and environment
in the following ways:

• Helps in the conservation of natural resources like water, minerals, timber, etc.
• Helps in the prevention of pollution
• Helps in the creation of new jobs in the manufacturing and recycling industries
in the States.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 207
DR. CECILIO PUTONG NATIONAL HIGH SCH.
SELF-CHECK 1.5-2

Enumeration

1-5 5s
6-8 3Rs
9 – 13 benefits of 5s

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 208
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY 1.5 - 2

1. Sorting
2. Simplifying
3. Systematic Cleaning
4. Standardizing
5. Sustaining
6. Recycling
7. Reduce
8. Reuse
9. Cleaner and safer work areas
10. Less wasted time through more workplace organization
11. Less space
12. Improved self-discipline
13. Improved culture

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 209
DR. CECILIO PUTONG NATIONAL HIGH SCH.
EVIDENCE PLAN
Competency
COMPUTER SYSTEM SERVICING NC II
standard:
Unit of competency: INSTALL AND CONFIGURE COMPUTER SYSTEM
Ways in which evidence will be collected:
[tick the column]

The evidence must show that the trainee…


1. Plans and prepares unit assembly to ensure OH&S
policies and procedures, sequences the work
✓ ✓
appropriately in accordance with systems
requirements
2. Identifies and obtains materials necessary to
complete the work in accordance with established
✓ ✓
procedures and checks against systems
requirements
3. 3. Obtains tools, equipment and testing devices in
installation work which establishes procedures and to ✓ ✓ ✓
comply with requirements

4. Assembles computer hardware in accordance with


✓ ✓ ✓
established procedures and systems requirements

5. Configures Basic-input-output-system (BIOS) in


✓ ✓
accordance with hardware requirements
6. Creates portable bootable devices in accordance

with software manufacturer instruction
7. Prepares customized installers in accordance with
✓ ✓ ✓
software utilization guide and end user agreement
8. Carries out installation of portable applications in
accordance with software user guide and software ✓ ✓
license
9. Installs Operating system (OS) in accordance with
established installation procedures and to comply ✓ ✓
with end-user requirements

10. Installs and configures peripherals/devices drivers in


accordance with manufacturer’s instructions and/or ✓ ✓
OS installation procedures.

11. Accesses and installs OS and drivers


updates/patches in accordance with ✓ ✓ ✓
manufacturer’s recommendations and requirements

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 210
DR. CECILIO PUTONG NATIONAL HIGH SCH.
12. Undertakes on-going checks of the quality of the work
in accordance with established procedures ✓ ✓ ✓

13. Installs application software based on software


installation guides, end-user requirements and ✓ ✓
software license agreement
14. Carries out variation to application software
installation in accordance to customer/client ✓ ✓ ✓
requirements
15. Accesses and installs software updates in
accordance with manufacturer’s recommendations ✓ ✓ ✓
and requirements
16. Tests devices / systems and/or installation to
determine whether it conforms to requirements ✓ ✓ ✓

17. Conducts stress test to ensure reliability of equipment


in accordance with manufacturer’s instructions and ✓ ✓ ✓
system requirements

18. Follows 5S according to environmental policies ✓ ✓ ✓

19. Forwards documentation to appropriate personnel


and /or authority in relation to the test in accordance ✓ ✓ ✓
with requirements

NOTE: *Critical aspects of competency

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 211
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Qualification : COMPUTER SYSTEM SERVICING NC II
Unit of Competency : INSTALL AND CONFIGURE COMPUTER SYSTEM

INSTITUTIONAL ASSESSMENT

WRITTEN TEST

Name: ________________________________ Date:_____________

General Instruction: Write your answer on a separate sheet of paper. Avoid erasure.

Test I. Identification. Identify the following statement.

____________ 1. a major part of protecting the safety, health and welfare of people
engaged in work or employment.
____________ 2. A machine that can be programmed to manipulate symbols.
____________ 3. the physical, touchable, electronic and mechanical parts of a
computer system.
____________ 4. the enclosure that contains the main components of a computer.
____________ 5. it stores programs and data even when the power is off.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 212
DR. CECILIO PUTONG NATIONAL HIGH SCH.
B. Identify and describe the following PC parts.

1. ___________________________

2. ___________________________

3. ___________________________

4. ___________________________

5. __________________________
Test II. Enumeration

1- 4 Hardware components

5- 7 Components of the CPU


8 – 11 four basic characteristics of Multimedia
12-15 Types of individual licenses
16 – 19 Types of an OS

Test III. Essay


1. Differentiate between operating systems and computer hardware?

2. What is the purpose of an operating system? Explain.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 213
DR. CECILIO PUTONG NATIONAL HIGH SCH.
ANSWER KEY

Test I. Identification. Identify the following statement.

1. OHS Policies and Procedures


2. Computer
3. Hardware
4. Computer Case
5. Hard Disk/Storage Media

B. Identify and describe the following PC parts.

6. agp

7. pci

8. P4

9. PROCESSOR SOCKET

10. IOS

Test II. Enumeration


2- 4 Hardware components
1. INPUT DEVICES/OUTPUT DEVICES
2. CPU
3. STORAGE
4. MEMORY

5- 7 Components of the CPU


5. ALU – arithmetic logic unit
6. CU – CONTROL UNIT

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 214
DR. CECILIO PUTONG NATIONAL HIGH SCH.
7. INTERFACE UNIT
8 – 11 four basic characteristics of Multimedia

8. Multimedia systems must be computer controlled.


9. Multimedia systems are integrated.
10. The information they handle must be represented digitally.
11. The interface to the final presentation of media is usually interactive.

12-15 Types of individual licenses


12. Perpetual license:
13. Subscription license
14. Freeware license
15. Shareware license 16 – 19 Types of an OS
16. BATCH
17. TIME SHARING
18. DISTRIBUTED
19. NOS
20. REAL TIME

Test III. Essay


1. Differentiate between operating systems and computer hardware?

Answer: Operating system helps to make computer hardware available to the


application programs. Without Operating System, we cannot access computer
hardware.
2. What is the purpose of an operating system? Explain.

1. Manage files and folders


2. Control hardware access
3. Provide user interface
4. Manage applications
5. Boots the computer and manages the file system.
6. Support more than one user, task, or CPU.

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 215
DR. CECILIO PUTONG NATIONAL HIGH SCH.
Criteria Percentage Feedback

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 216
DR. CECILIO PUTONG NATIONAL HIGH SCH.
1. Workmanship 20%
2. Functionality 30%
3. Methods and Procedures 20%
4. Follow Occupational Health and Safety 10%
5. Accuracy 20%
Total 100%

Satisfactory
Description of assessment activity performed
The Candidate….. YES NO
• Planned and prepared unit assembly to ensure OH&S policies
and procedures, sequences the work appropriately in
accordance with systems requirements
• Identified and obtained materials necessary to complete the
work in accordance with established procedures and checks
against systems requirements
• Obtained tools, equipment and testing devices in installation
work which establishes procedures and to comply with
requirements
• Assembled Computer hardware in accordance with established
procedures and systems requirements
• Configured Basic-input-output-system (BIOS) in accordance with
hardware requirements
• Created portable bootable devices in accordance with
software manufacturer instruction
• Prepared customized installers in accordance with software
utilization guide and end user agreement
• Carried out installation of portable applications in accordance
with software user guide and software license
• Installed Operating system (OS) in accordance with established
installation procedures and to comply with enduser
requirements
• Installed and configures peripherals/devices drivers in
accordance with manufacturer’s instructions and/or OS
installation procedures
• Accessed and installed OS and drivers updates/patches in
accordance with manufacturer’s recommendations and
requirements

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 217
DR. CECILIO PUTONG NATIONAL HIGH SCH.
• Undertaken on-going checks of the quality of the work in
accordance with established procedures
• Installed application software based on software installation
guides, end-user requirements and software license
agreement
• Carried out variation to application software installation in
accordance to customer/client requirements
• Accessed and installed software updates in accordance with
manufacturer’s recommendations and requirements
• Tested devices / systems and/or installation to determine
whether it conforms to requirements
• Conducted stress test to ensure reliability of equipment in
accordance with manufacturer’s instructions and system
requirements
• Followed 5S according to environmental policies
• Forwarded documentation to appropriate personnel and /or
authority in relation to the test in accordance with
requirements
 Yes
Did the candidate’s overall performance meet the standard?  No

General Feedback to learners:

Candidate signature: Date:

Signature of Trainer: Date:

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 218
DR. CECILIO PUTONG NATIONAL HIGH SCH.
QUESTIONING TOOL (Oral Interview)
Satisfactory
Questions to probe the candidate’s underpinning knowledge Response

Extension/Reflection Questions Yes No


1. How will you check the power supply is providing enough
voltage output or not?
Answer:
Measure the output voltage of the power supply using
appropriate setting on the voltmeter.  
2. How will you solve the problem if a computer does not
recognize a bootable flash drive?
Answer:
Maybe the BIOS is not properly configured to boot on the flash
drive. You must Configure the BIOS to boot on the flash drive  
Safety Questions
3. What should you do before working on any part of a
computer?
Answer: You need to remove all your accessories that cause
electrocuted, and turn off power switch and everything before
disassembling computer hardware.  
4. What would you do if the computer shutdown itself?
Answer:
If your computer turns off immediately or even within a few
seconds after it is turned on, there could be several possible issues.
Loose cable if the problem persists; make sure all cables inside the
computer case are firmly attached to the motherboard and each
component. Check the IDE cables and SATA cables, which are
connected to the hard drive, CD or DVD drive. Check both ends
of each cable and make sure they are firmly attached to the
component and the motherboard. Turn on the computer and test
to see if this resolves the issue.  
Contingency Questions

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 219
DR. CECILIO PUTONG NATIONAL HIGH SCH.
5. What would you do if the computer stops during testing?
Answer:

• Restart the computer


• pull the computer's power plug or flip the switch on the
power strip. Instead, simply hold the computer's power
button for 5 to 10 seconds and it will restart with less
disruption than a complete power loss.
• There are a few things that can happen next when your
computer comes back on.
 
6. What will you do if accidentally, water spilled on the computer
which you are currently using?
 
Answer:
Power off the unit immediately, wipe with dry cloth the external
parts and blow dry to ensure that internal portions are completely
dry before turning the power on.
Job Role/Environment Questions  
7. How can you contribute for environmental safety in using
computer?
Answer:
Environmental safety in using computer by reduce glare on your
computer screen by adjusting its placement and tilt, using a glare
guard or using window blinds and light filters. Rest eyes
intermittently by focusing on distant objects. Take visual breaks.
Remember to blink often when viewing the monitor  
8. How will you extend the usage of the computer? Answer:

• Extend by Pick the model with the best processor you can
afford, choose as large a hard drive as possible, choose solid
state drives later Don’t max out on RAM, properly maintaining
your computer
• Keep your computer clean (and therefore, cool)
• Download program and hardware updates
• Spring clean your computer
• Do a disk check
• Do a clean install of Windows or MacOS
• Upgrade the RAM  
Rules and Regulations  

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 220
DR. CECILIO PUTONG NATIONAL HIGH SCH.
9. What are the laws of software privacy?
Answer:
There are no separate laws dealing with software piracy. Software
is considered to be part of standard copyright. It is part of literary
right. Therefore, any act of software piracy is dealt under copyright
act. Such violation attracts civil and criminal process. That is you
will be facing financial cost-fines/damages and also prison term if
unlucky  
10. Why is it considered a crime?
Answer:
Software piracy is the unauthorized use, copying or distribution of
copyrighted software. Gaining illegal access to protected
software, also known as "cracking" Reproducing and/or
distributing counterfeit or otherwise unauthorized software, often
over the Internet.  
The candidate’s underpinning
knowledge was:  Satisfactory  Not Satisfactory

References: https://technet.microsoft.com/en-us/library/jj200124(v=ws.11).aspx
https://www.gcflearnfree.org/computerbasics/setting-up-a-computer/1/
https://www.lifewire.com/how-to-install-a-windows-operating-system-2624925
https://www.computerhope.com/jargon/b/bootdevi.htm
https://www.examcollection.com/certification-training/a-plus-install-
configurecomputer-peripheral-devices.html
https://it.ucsf.edu/how_do/update-operating-system
https://corporate.findlaw.com/business-operations/software-computer-piracy-andyour-
business.html

COMPUTER SYSTEM Date Developed: Document No.:


SERVICING NC II September 19, 2016

Issued by:
INSTALLING AND CONFIGURING Developed by: Page
COMPUTER SYSTEM Engr. Floridel C. Pelin Revision No.:0 221
DR. CECILIO PUTONG NATIONAL HIGH SCH.

You might also like