1 Install and Configure Computer Systems
1 Install and Configure Computer Systems
1 Install and Configure Computer Systems
Welcome to the Module “INSTALL AND CONFIGURE COMPUTER SYSTEMS”. This module
contains training materials and activities for you to complete.
The unit of competency “Installing and Configuring Computer Systems” contains knowledge,
skills and attitudes required for a Computer System Servicing NC II course.
You are required to go through a series of learning activities in order to complete each of the
learning outcomes of the module. In each learning outcome there are Information Sheets, Task
Sheets, and Job Sheets. Follow these activities on your own and answer the Self-Check at the end of
each learning activity.
You may already have some of the knowledge and skills covered in this module because you
have:
o Been working for some time
o Already have completed training in this area.
If you can demonstrate to your Trainer that you are competent in a particular skill or skills, talk
to him/her about having them formally recognized so you don’t have to do the same training again. If
you have a qualification or Certificate of Competency from previous trainings show it to your teacher. If
the skills you acquired are still current and relevant to this module, they may become part of the
evidence you can present for RPL. If you are not sure about the currency of your skills, discuss it with
your Trainer.
After completing this module ask your Trainer to assess your competency. Result of your
assessment will be recorded in your competency profile. All the learning activities are designed for you
to complete at your own pace.
Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more than one learning
activity.
1
Program/Course : COMPUTER SYSTEMS SERVICING NC II
Unit of Competency : INSTALL AND CONFIGURE COMPUTER SYSTEMS
Module : INSTALLING AND CONFIGURING COMPUTER
SYSTEMS
INTRODUCTION:
This module contains information and suggested learning activities on Computer System
Servicing NCII. It includes activities and materials on Install and Configure Computer Systems
Completion of this module will help you better understand the succeeding module on the
Installing and Configuring Computer Systems.
This module consists of 5 learning outcomes. Each learning outcome contains learning activities
supported by each instruction sheets. Before you perform the instructions, read the information sheets
and answer the self- check and activities provided to ascertain to yourself and your trainer that you
have acquired the knowledge necessary to perform the skill portion of the particular learning outcome
Upon completion of this module, report to your trainer for assessment to check your
achievement of knowledge and skills requirement of this module. If you pass the assessment, you will
be given a certificate of completion.
LEARNING EXPERIENCES
LEARNING OUTCOME 1
Assemble Computer Hardware
2
INFORMATION SHEET CO1.1-1
“Safe Handling of Computer Hardware”
Learning Objectives:
Safety Procedures
To prevent static electricity from damaging vital components of your computer, remember to
always attach an anti-static wrist strap/bracelet from your wrist to your computer case or you
can discharge static energy by holding or grabbing.
Computer cases were not meant to be opened by the everyday user and thus are not made with
the safety of the user in mind. Be careful for sharp edges in the casing that can cut your fingers
and/or hands.
Never remove a component or open a computer case while the power is on and the power cable
attached. Always remove all connecting cables before opening your case.
Do not work on equipment or cables during periods of lightning activity
Be careful when using the Crimping tool, it has sharp parts that can cut your skin
Wear a Protective eye when working with wires
Wear Shoes with rubber sole to prevent ground electricity because rubber is a good Electric
Insulator
Always follow the instructions given
Be sure you are in your normal state of mind before working.
Always check the cables/wire attached to the computer for any damages before turning the unit
it on to prevent any untoward incident.
Use the right tools for specific tasks
Be sure you are in your normal state of mind when working
Enumeration: List down at least 6 Safety procedures before assembling computer hardware
1.
2.
3.
4.
5.
6.
Enumeration:
3
INFORMATION SHEETS CO1.1-2
“Proper use, functions & settings of tools, materials, equipments & testing devices”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify Different tools, materials, equipment and testing devices use in Assembling
Computer Hardware
2. Learn the proper uses and functions of the different tools, materials, equipment and testing
devices use in Assembling Computer Hardware
- Torx Screwdriver Set- used to drive or fasten six pointed star screws. In modern electrical
appliances, they use screws with heads of non-standard shape to prevent users of the device
from easily disassembling them.
-
- Hex (Allen Wrench) – used to drive or fasten hexagonal screws. The head has a hexagonal hole
turned by an allen key. An Allen key is a hexagonal shaped wrench bent in let ter-L. The Allen
key may have been invented by American, Gilbert F. Heublein,
- Jeweler's
Screwdriver Set – is a set of small screw drivers composed of slotted and Philips screwdrivers.
Also known as Precision Screwdrivers.
4
Socket Wrench – A socket wrench is a type of wrench that has a socket attached at one end, usually
used to turn a fastener. The most prevalent form is the ratcheting socket wrench, often called a ratchet.
A ratchet is a hand tool in which a metal handle is attached to a ratcheting mechanism, which attaches
to a socket, which in turn fits onto a type of bolt or nut. This ratcheting action allows the fastener to be
rapidly tightened or loosened in small increments without disconnecting the tool from the fastener. A
switch is built into the ratchet head that allows the user to apply the ratcheting action in either
direction, as needed, to tighten or loosen a fastener.
Soldering Tools
Soldering Iron - is a hand tool used in soldering. It supplies heat to melt solder so that it can flow
into the joint between two work pieces. A soldering iron is composed of a heated metal tip and an
insulated handle. Heating is often achieved electrically, by passing an electric current (supplied
through an electrical cord or battery cables) through a resistive heating element. Cordless irons can
be heated by combustion of gas stored in a small tank, often using a catalytic heater rather than a
flame. Simple irons less commonly used than in the past were simply a large copper bit on a handle,
heated in a flame.
- Soldering Tool Stand – is a place of the soldering iron to keep them away from flammable
materials. The stand often also comes with a sponge and flux pot for cleaning the tip.
- Desoldering Sucker – is the removal of solder and components from a circuit for
troubleshooting, repair purposes and to salvage components. Electronic components are often
mounted on a circuit board and it is usually desirable to avoid damaging the circuit board,
surrounding components, and the component being removed.
- Mechanical Pliers – also known as Linesman Pliers or combination pliers are a type of pliers used
by electricians and other tradesmen primarily for gripping, twisting, bending and cutting wire and
cable. Linemen's pliers owe their effectiveness to their plier design, which multiplies force through
leverage
5
- Long Nose – is used for holding, bending and stretching the lead of electronic component or
connecting wire.
- Side Cutter - is a wire-cutting plier, though they are not used to grab or turn anything, but are
used to cut wire.
- Cross cutter - are pliers intended for the cutting of wire (they are generally not used to grab or
turn anything).
- Wire Stripper - is a pair of opposing blades much like scissors or wire cutters. The addition of a
center notch makes it easier to cut the insulation without cutting the wire. This type of wire
stripper is used by rotating it around the insulation while applying pressure in order to make a
cut around the insulation. Since the insulation is not bonded to the wire, it then pulls easily off
the end.
Viewing tools
- Magnifying Glass - (called a hand lens in laboratory contexts) is a convex lens that is used to
produce a magnified image of an object. The lens is usually mounted in a frame with a handle.
6
- Flash light - A flashlight (torch in Commonwealth English) is a portable hand-held electric light.
Usually, the source of the light is a small incandescent light bulb or light-emitting diode (LED). A
typical flashlight consists of a light bulb mounted in a reflector, a transparent cover (sometimes
combined with a lens) to protect the light source and reflector, a battery, and a switch. These are
supported and protected by a case.
Cleaning tools
- Paint Brush – made of bristles set in handle, use for cleaning dirty parts of a circuit or an object.
- Power Blower – is a powerful blower capable of cleaning different types of electrical appliances
in few time.
7
Materials
- Solder Paste - is essentially powdered metal solder suspended in a thick medium called flux.
Flux is added to act as a temporary adhesive, holding the components until the soldering
process melts the solder and makes a stronger physical connection. The paste is a gray, putty-
like material. The composition of the solder paste varies, depending upon its intended use.
- Soldering Lead/wire - is a fusible metal alloy used to join together metal workpieces and
having a melting point below that of the workpiece(s). Soft solder is typically thought of when
solder or soldering is mentioned, with a typical melting range of 90 to 450 °C (190 to 840 °F). It
is commonly used in electronics, plumbing, and assembly of sheet metal parts. Manual
soldering uses a soldering iron or soldering gun. Alloys that melt between 180 and 190 °C (360
and 370 °F) are the most commonly used. Soldering performed using alloys with a melting
point above 450 °C (840 °F) is called 'hard soldering', 'silver soldering', or brazing.
- Thermal Paste/Grease - (also called thermal gel, thermal compound, thermal paste, heat
paste, heat sink paste, thermal interface material, grey goo, or heat sink compound) is a kind
of thermally conductive (but usually electrically insulating) adhesive, which is commonly used
as an interface between heat sinks and heat sources (e.g., high-power semiconductor devices).
The grease gives a mechanical strength to the bond between the heat sink and heat source,
but more importantly, it eliminates air (which is a thermal insulator) from the interface area.
- Contact Cleaner - Electrical contact cleaner is simply compressed air with a cleaning agent that
evaporates, such as isopropyl alcohol. It is useful for cleaning electric components that have food,
grease, or oils on them. It can dislodge foreign elements and clean components.
8
Self-Check CO1.1-2
“Proper use, functions & settings of tools, materials, equipments &
testing devices”
1. Slotted Screwdriver A.
3. Digital Multimeter
C.
4. Paint Brush D.
5. Soldering Iron E.
9
INFORMATION SHEET CO1.1-3
“Computer Hardware and their corresponding parts, functions and setting”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify different types of Computer
2. Identify different computer hardware characteristics, parts, functions and setting
1. Workstation
2. Desktop Computer
4. Nettop Computer
10
5. Laptop Computer
A laptop or a notebook is a portable personal computer
with a clamshell form factor, suitable for mobile use.
There was a difference between laptops and notebooks in
the past, but nowadays it has gradually died away.
Laptops are commonly used in a variety of settings,
including at work, in education, and for personal
multimedia.
6. Netbook Computer
A netbook is a device that can perform the majority of the
functions of a desktop or laptop, but is extremely mobile.
Netbooks look like miniature laptops, with screens rarely
exceeding 10 or 12 inches. Netbooks have been around
since 2008 (although there are some disputes regarding
what actually constituted the first netbook) and are
generally characterized by a distinct dependency on
connecting to a network, or the highlighted ability to
connect to a network.
7. Tablet Computer
A tablet computer is a mobile computer with a
touchscreen display, circuitry and battery in a single
unit. Tablets come equipped with sensors, including
cameras, a microphone and an accelerometer, and the
touchscreen display uses finger or stylus gestures
substituting for the use of computer mouse and
keyboard. They usually feature on- screen, pop-up
virtual keyboards for typing. Tablets may include
physical buttons for basic features such as speaker
volume and power, and ports for network
communications and battery charging. Tablets are
typically larger than smartphones or personal digital
assistants at 7 inches (18 cm) or larger, measured
diagonally.
8. Pocket PC
A Pocket PC (P/PC, PPC) was also known by
Microsoft as a 'Windows Mobile Classic device'. It is a
hardware specification for a handheld-sized
computer, personal digital assistant (PDA), that runs
the Microsoft 'Windows Mobile Classic' operating
system. It has some of the abilities of modern
desktop PCs.
11
9. Ultra-Mobile Computer
1. System Unit
The system unit, like the one above is the case that contains
all the electronic components of any computer system. Holds
all the Input and Output devices of the PC.
2. Monitor
A monitor or display (sometimes called a visual display unit) is an
electronic visual display for computers. The monitor comprises
the display device, circuitry, and an enclosure. The display device
in modern monitors is typically a thin film transistor liquid
crystal display (TFT-LCD) thin panel, while older monitors use a
cathode ray tube about as deep as the screen size.
The Primary Output of a Personal Computer
3. Keyboard
12
4. Mouse
5. Speakers
An output device of a PC
Other Devices
Inputs
Scanner
Mic
Finger Scanner
Web Cam
Digicam
Pen Tab
Output
Projector
Printer
13
Familiarization with the various computer systems components and peripherals
PS/2 Port
The PS/2 connector is a 6-pins Mini-DIN connector used for connecting some keyboards and mice
to a PC compatible computer system
Serial Port
A serial port is a serial communication physical interface with 9 pins through which information
transfer
Parallel Port
A parallel port is a type of interface found on computers with 25 pins (personal and otherwise) for
connecting various peripherals. In computing, a parallel port is a parallel communication physical
interface. It is also known as a Printer port or Centronics port
USB Port
Universal Serial Bus (USB) is a specification to establish communication between devices and a host
controller (usually a personal computer), USB has effectively replaced a variety of interfaces such as
serial and parallel ports.
14
Sound Port / Audio Port
Facilitates the input and output of audio signals to and from a computer under control of computer
programs.
Game Port
The game port was the traditional connector for video game input devices. It has 15 pins.
Firewire Port
High Performance Serial Bus, for connecting devices to your personal computer. FireWire provides a
single plug-and-socket connection on which up to 63 devices can be attached with data transfer
speeds up to 400 Mbps (megabits per second)
A Video Graphics Array (VGA) connector is a three-row 15-pin DE-15 connector. The 15-pin VGA
connector is found on many video cards, computer monitors, and some high definition television sets.
On laptop computers or other small devices, a mini-VGA port is sometimes used in place of the full-
sized VGA connector.
15
DVI Port
The Digital Visual Interface (DVI) is a video interface standard covering the transmission of video
between a source device (such as a personal computer) and a display device. The DVI standard has
achieved widespread acceptance in the PC industry, both in desktop PCs and monitors. It has 24 pins
but some has only 18 pins
HDMI Port
HDMI (High-Definition Multimedia Interface) is a compact audio/video interface for transmitting
uncompressed digital data. It is a digital alternative to consumer analog standards, such as radio
frequency (RF) coaxial cable, composite video, S- Video, SCART, component video, D-Terminal, or VGA
DP PORT
Display Port is a digital display interface developed by the Video Electronics Standards Association
(VESA). The interface is primarily used to connect a video source to a display device such as a
computer monitor, though it can also be used to carry audio, USB, and other forms of data.
S-VIDEO PORT
Super Video Port can be use to connect the system unit display to the ordinary TV. 7 pins for the PC
and 4 pins for the TV
16
USB 3.0 PORT
USB 3.0 is the third major version of the Universal Serial Bus (USB) standard for computer connectivity.
First introduced in 2008, USB 3.0 adds a new transfer mode called "SuperSpeed," (distinguishable from
USB 2.0 by either the blue colour of the port or the initials SS) capable of transferring data at up to 5
Gbit/s – more than ten times as fast as the 480 Mbit/s top speed of USB 2.0.
Ethernet is the most common type of connection computers use in a local area network (LAN). An
Ethernet port looks much like a regular phone jack, but it is slightly wider. This port can be used to
connect your computer to another computer, a local network, or an external DSL or cable modem.
A slot where RAM (Random Access Memory) is inserted or place. SDR SDRAM, DDR1 SDRAM, DDR2
SDRAM, DDR3 SDRAM, DDR4 SDRAM.
AGP Slot
The Accelerated Graphics Port (often shortened to AGP) is a high-speed point- to-point channel for
attaching a video card to a computer's motherboard, primarily to assist in the acceleration of 3D
computer graphics. Dedicated to serve a AGP Video Card only.
17
PCIe x 16 Slot
PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe, is a computer
expansion card standard designed to replace the older PCI, PCI-X, and AGP bus standards. Dedicated to
serve a PCIe x16 Video Card only.
ISA Slot
Industry Standard Architecture (ISA) is a computer bus standard for IBM PC compatible computers
introduced with the IBM Personal Computer to support its Intel 8088 microprocessor's 8-bit external
data bus and extended to 16 bits for the IBM Personal Computer/AT's Intel 80286 processor.
PCI Slots
Conventional PCI (PCI is an initialism formed from Peripheral Component Interconnect part of the
PCI Local Bus standard and often shortened to PCI) is a computer bus for attaching hardware
devices in a computer.
CNR Slot
Communications and Network Riser (CNR) is an interface on a computer motherboard for interfacing a
communication device or peripheral.
18
AMR Slot
The audio/modem riser, also known as an AMR slot, is a riser expansion slot found on the motherboards
of some Pentium III, Pentium 4, Duron, and Athlon personal computers. It was designed by Intel to
interface with chipsets and provide analog functionality, such as sound cards and modems, on an
expansion card.
PCIe x 1 Slot
PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe, is a computer
expansion card standard designed to replace the older PCI.
Slot 1 refers to the physical and electrical specification for the connector used by some of Intel's
microprocessors, including the Pentium Pro, Celeron, Pentium II and the Pentium III. Both single
and dual processor configurations were implemented.
19
IDE Connector
The port where the PATA / IDE (Parallel Advance Technology Attachment / Integrated Device/Drive
Electronic) Connector is inserted or placed.
FDD Connector
The port where the FDD (Floppy Disk Drive) Connector is inserted or placed.
SATA Connector
Serial ATA (SATA or Serial Advanced Technology Attachment) is a computer bus interface for
connecting host bus adapters to mass storage devices such as hard disk drives and optical drives
ATX (Advance Technology Extended) power connectors are the specific types of connectors designed
to connect a computer's power supply to an ATX motherboard.
20
Auxiliary Power Connector / 4 pin 12 volt
It supplies power to the CPU Voltage Regulator Module or VRM, sometimes called PPM (processor
power module), is a buck converter that provides a microprocessor the appropriate supply voltage,
converting +5 V or +12 V to a much lower voltage required by the CPU, allowing processors with
different supply voltage to be mounted on the same motherboard.
Connection between the button and the led lights of the front panel to the motherboard to activate them.
CMOS Battery
Northbridge Chipset NB
The northbridge has historically been one of the two chips in the core logic
chipset on a PC motherboard, the other being the southbridge.
Increasingly these functions have migrated to the CPU chip itself,
beginning with memory and graphics controllers.
Southbridge Chipset SB
The southbridge is one of the two chips in the core logic chipset on a
personal computer (PC) motherboard, the other being the northbridge. The
southbridge typically implements the "slower" capabilities of the
motherboard in a northbridge/southbridge chipset computer architecture.
The BIOS software is built into the PC, and is the first code run by a PC
when powered on ('boot firmware'). The primary function of the BIOS is to
set up the hardware and load and start an operating system. When the PC
starts up, the first job for the BIOS is to initialize and identify system
devices such as the video display card, keyboard and mouse, hard disk
drive, optical disc drive and other hardware.
21
CPU Socket
This is where the power connector of the CPU fan with heat sink is
inserted
CDROM / DVDROM
Optical Drive
Both CDROM / DVDROM and the HDD connects to the Motherboard via the IDE / PATA and SATA Cable
SDR DDR4
22
EXPANSION CARDS
Modem Card
Video Card
The video card is an expansion card that allows the computer to send
graphical information to a video display device such as a monitor or
projector.
With the increasing use of the computers and the networking the local area
network of the LAN is one such network type which links the two
computers in a connection.
For this connection a Local area network card or the LAN card is required
which enables the connection of the computers in a network. It is a piece of
hardware which is connected inside the PC linking the computer network.
Sound Card
You can insert your cable or antenna here to make your PC a television.
23
Parallel Port Expansion Card
Low-profile PCI riser card designed to horizontally position a PCI card over
the mainboard. Compatible with VIA EPIA mainboards.
24
Self-Check CO1.1-3
“Computer Hardware and their corresponding parts, functions and setting”
a. Keyboard
b. Mouse
c. Monitor
d. Printer
Multiple Choice:
1. D
2. A
3. C
4. C
5. D
25
Perform Task Sheet CO1.1-4
Steps/Procedure:
1. Assemble and connect the entire Internal devices, components of a System Unit.
2. Connects all cables, wires etc.
3. Connect the different major components of a PC
Assessment Method:
Demonstration
Interview
CRITERIA
YES NO
Did you….
1. Follow the proper procedure of Assembly process
26
INFORMATION SHEET CO1.1-5
BIOS/CMOS configuration
Learning Objectives:
The fundamental purposes of the BIOS are to initialize and test the system hardware components, and
to load a boot loader or an operating system from a mass memory device. The BIOS additionally
provides an abstraction layer for the hardware, i.e. a consistent way for application programs and
operating systems to interact with the keyboard, display, and other input/output devices. Variations in
the system hardware are hidden by the BIOS from programs that use BIOS services instead of directly
accessing the hardware. MS-DOS (PC DOS), which was the dominant PC operating system from the
early 1980s until the mid-1990s, relied on BIOS services for disk, keyboard, and text display functions.
MS Windows NT, Linux, and other protected mode operating systems in general ignore the abstraction
layer provided by the BIOS and do not use it after loading, instead accessing the hardware components
directly.
Every BIOS implementation is specifically designed to work with a particular computer or motherboard
model, by interfacing with various devices that make up the complementary system chipset. Originally,
BIOS firmware was stored in a ROM chip on the PC motherboard; in modern computer systems, the
BIOS contents are stored on flash memory so it can be rewritten without removing the chip from the
motherboard. This allows easy updates to the BIOS firmware so new features can be added or bugs can
be fixed, but it also creates a possibility for the computer to become infected with BIOS rootkits.
Unified Extensible Firmware Interface (UEFI) was designed as a successor to BIOS, aiming to address
its technical shortcomings. As of 2014, new PC hardware predominantly ships with UEFI firmware.
basic input/output system, the built-in software that determines what a computer can do without
accessing programs from a disk. On personal computers (PCs), the BIOS contains all the code required
to control the keyboard, display screen, disk drives, serial communications, and a number of
miscellaneous functions.
The BIOS is typically placed in a ROM chip that comes with the computer (it is often called a ROM
BIOS). This ensures that the BIOS will always be available and will not be damaged by disk failures. It
also makes it possible for a computer to boot itself. Because RAM is faster than ROM, though, many
computer manufacturers design systems so that the BIOS is copied from ROM to RAM each time the
computer is booted. This is known as shadowing.
Many modern PCs have a flash BIOS, which means that the BIOS has been recorded on a flash memory
chip, which can be updated if necessary.
PC BIOS Standardization
The PC BIOS is fairly standardized, so all PCs are similar at this level (although there are different BIOS
versions). Additional DOS functions are usually added through software modules. This means you can
upgrade to a newer version of DOS without changing the BIOS.
PC BIOSes that can handle Plug-and-Play (PnP) devices are known as PnP BIOSes, or PnP-aware
BIOSes. These BIOSes are always implemented with flash memory rather than ROM.
27
Computers manufactured in the last few years allow you to enter the BIOS setup using one of the five
keys shown below during the boot process.
Setup keys are to be pressed as the computer is booting up. Most users will see a message similar to
the example below upon startup. Some older computers may also display a flashing block to indicate
when to press the F1 or F2 keys.
If your computer is new and you are unsure of what key to press when the computer is booting, try
pressing and holding one or more keys on the keyboard to cause a stuck key error. Once you get
this error, you should have the option to continue or enter setup.
Once you have successfully entered the CMOS setup, you should see a screen similar to the
example below. Your CMOS setup may look a little different, depending on the manufacturer, but
should still have most of the same options in the menu on the left or along the bottom of the screen.
28
Perform Job Sheet C01.1-5
Tools & Equipment : Testing tools, Driving Tools, Cutting tools, Soldering tools and
a Working PC
Steps/Procedure:
1. Practice OHS like discharging static energy before starting the demonstration
2. Assemble and connect the entire Internal devices, components of a System Unit
3. Connect different wires/cables and connectors inside the System unit
4. Connect the different I/O of major components of the PC
5. Testing different components, devices of the PC
6. Enter the BIOS for configuration
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
1. Practice OHS
2. Follow the proper procedure of Assembly process
3. Connect the entire internal devices and components of a System Unit
4. Connect wires/cables and connectors inside the system unit
5. Test different devices and components of the PC
6. Enter and configure BIOS
LEARNING EXPERIENCES
LEARNING OUTCOME 2
Prepare Installer
Learning Activities Special Instructions
Answer Self Check CO1.2-2 in The output of this Learning Outcome is the
Image creators for Bootable following.
drive/disc
Different bootable devices
Read Information Sheet CO1.2-3 in
Different Operating Systems
Image creators for Bootable drive/disc
Different Operating System
Answer Self Check CO1.2-3 in
Show your output to your trainer for his feedback as
Different Operating System
you accomplish them.
29
INFORMATION SHEETS CO1.2-1
“Different Bootable Device”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify different bootable device
Bootable device
A boot device is any device or drive that has the required boot files that allows the computer to start.
For example, a Zip Drive, Floppy disk drive, Optical Disk drive, Internal / External Hard Disk drive USB
Flash Solid State drive drive are all considered bootable devices. However, unless the necessary boot
files are stored on the drive, diskette, or disc the computer will not be able to boot from that device.
The most commonly used boot device or boot drive is the hard drive. When an operating system such as
Microsoft Windows installed onto the hard drive it copies the boot files and drivers required to load
Windows on the computer. When installing a new operating system, troubleshooting the computer, or
booting from another drive such as the CD-ROM drive, a bootable disc or setup disc is inserted into the
drive. If the boot sequence is setup properly in CMOS setup and the bootable disc is inserted the
computer, it will load from the disc instead of the hard drive.
Hard Disk
DVDROM
(Optical Disk Drive)
A.
B.
C.
D.
4. Flash Drive
E.
31
INFORMATION SHEETS CO1.2-2
“Image Creators for Bootable drive/disc” Learning
Objectives:
This guide will outline making a bootable USB flash drive with Windows XP, Vista, or 7. Before we
begin, it is important to note that the computer you want to use your bootable USB drive must have the
ability of booting to a USB drive. Most computers built since Windows Vista was released are capable of
booting to a USB device. Prior to the Windows Vista time frame, it's hit or miss with motherboards.
To determine if a computer is capable of booting to a USB device, access the computer's BIOS and check
the bootable device list. If a USB device is listed, set the USB drive to be the first boot device. If you do
not see a USB device in the list of bootable devices, your BIOS is not capable of booting to a USB device.
Note: You may need to have your USB flash drive plugged in when you access the BIOS).
To make a bootable USB drive for Windows Vista or Windows 7, you need to have Windows Vista or 7
installed on your computer. It is recommended that you have a flash drive of at least 4 GB in size, in
order to store all the necessary files.
Tip: Before you start, plug in the USB drive and backup any files you have stored on the USB drive. The
drive will be formatted during this process and all files on it will be deleted.
Note: You need to have a Windows Vista or Windows 7 DVD for these instructions to be successful.
1. Open an elevated Windows command line window by clicking Start, typing in cmd in the search text
field, then pressing CTRL + Shift + Enter on your keyboard (at the same time). You can also access this
by navigating to Start, All Programs, Accessories, right-click with your mouse on the Command Prompt
menu item and select Run as Administrator.
2. At the command prompt, type cd c:\windows\system32 to change the directory to the Windows
system32 directory. Ensure your USB drive is plugged in, type DISKPART, then press Enter. Type LIST
DISK and press Enter.
See our diskpart command page for additional information on this command.
3. You will see a listing of the disk drives connected to your computer. Find the disk number of your
USB drive and type SELECT DISK [USB disk #], where "[USB disk #]" is the disk # for your USB drive. It
should now state that your USB drive is the selected disk. If you're not sure what disk is the USB disk,
eject the USB drive, perform step number 2 again, connect the USB drive again, and compare the
results. Usually the USB drive will be the last drive.
4. Type in the following commands, one by one, pressing Enter after each command.
CLEAN
CREATE PARTITION PRIMARY SELECT
PARTITION 1
ACTIVE
FORMAT FS=NTFS
(may take a couple minutes, depending on the USB drive size) ASSIGN
EXIT
32
Keep the command prompt window open, but you can minimize it for a little bit.
5. You will now need your Windows Vista or 7 Installation DVD. Put the DVD in your computer's DVD
drive. Open up My Computer and note which drive letter is assigned to your DVD Drive and your USB
flash drive.
6. Go back to the command prompt window and type in D: CD BOOT (substitute your DVD drive letter
for "D:", if necessary) and press Enter. Type CD BOOT again and press Enter. Lastly, type
BOOTSECT.EXE /NT60 H: (substitute your USB flash drive letter for "H:", if necessary) and press Enter.
7. The last step is to copy the entire contents of the Windows DVD to your USB flash drive. To do this,
in the My Computer window (opened in step 5 above), right-click on the DVD drive and select Open to
view the contents of the DVD. Copy all the files and folders on the DVD to the USB flash drive.
Your USB flash drive is now set up to be a bootable USB drive for Windows Vista or 7.
Windows XP users
To make the bootable USB drive for Windows XP, it is recommended that you have a flash drive of at
least 4 GB in size, in order to store all the necessary files. You also need to download Windows Server
2003 SP1 and a program called PE Builder (also known as Bart PE).
Tip: Before you start, plug in the USB drive and backup any files you have stored on the USB drive. The
drive will be formatted during this process and all files on it will be deleted.
Note: You need to have a Windows XP Professional CD for these instructions to be successful. This will
not work for Windows XP Home Edition.
1. Install PE Builder on your computer. For the sake of ease, install the program to a C:\PEBuilder
folder. After you've installed PE Builder, create a folder titled SRSP1 in the PEBuilder folder.
2. Now you need to extract two files from Windows Server 2003 SP1. The filename is quite long, so it is
recommended that you rename the file to something shorter, like WS-SP1.exe. Open a command prompt
(Start > Run, type cmd and press Enter) and use the cd command to change to the folder where you
downloaded the Windows Server 2003 SP1 file to (i.e. cd c:\downloads to change to the c:\downloads
folder). Then, type W S-SP1. exe
-x to extract the files. A window should open asking where to extract the files. You can enter the same
folder where the file was downloaded.
3. A new folder titled i386 will be created by the extraction process. Type cd i386 to change to that
folder. You now need to copy the setupldr.bin file to the SRSP1 folder you created in the PE Builder
folder. Type copy setupldr.bin c:\PEBuilder\SRSP1 to copy the file.
4. You also need to expand the ramdisk.sys file to the SRSP1 folder. Type expand -r
ramdisk.sy_ c:\PEBuilder\SRSP1
5. Open My Computer and navigate to the c:\PEBuilder\SRSP1 folder and verify the two files are there.
6. Next, you need to create a compressed version of Windows XP using PE Builder. Make sure the
Windows XP Professional CD is in your computer's CD drive, then launch the PE Builder program. In
the Source field, type in the drive letter assigned to your CD Drive (you can check in My Computer if
you are not sure) (e.g. "d:"). In the Output field, type BartPE. Make sure the None option is selected in
the Media output section. Then click the Build button.
33
7. Now, you can create the bootable USB flash drive. Open a command prompt again and type cd
c:\PEBuilder to change to the PEBuilder folder. Make sure your USB drive is plugged in to your
computer and type pe2usb - f e: (change "e:" to the drive letter assigned to your USB flash drive, if
necessary) to create the bootable drive. When prompted to begin the process, type YES. When the
process is complete, press any key to exit the program.
Your USB flash drive is now set up to be a bootable USB drive for Windows XP using the Bart PE
interface.
To create a Bootable CD/DVD disc we need to use a Third Party Software that can extract a ISO or
Image either by CD to CD base or from a image file to CD/DVD disc
There are lots of Application Software use to create a bootable drive and Disc easily and faster.
11. 7 Burn
22. ISOCreator Beta
34
INFORMATION SHEETS CO1.2-3
“Different Operating Systems”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify different Operating Systems
2. Familiarize with the different Windows OS for Servers and Client PC
An operating system (OS) is software that manages computer hardware and software resources and
provides common services for computer programs. The operating system is an essential component of
the system software in a computer system. Application programs usually require an operating system to
function.
Time-sharing operating systems schedule tasks for efficient use of the system and may also include
accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as
an intermediary between programs and the computer hardware, although the application code is
usually executed directly by the hardware and frequently makes system calls to an OS function or be
interrupted by it. Operating systems are found on many devices that contain a computer—from cellular
phones and video game consoles to web servers and supercomputers.
There are different kinds of OS for Computers. Here are the most famous OS use worldwide.
1. Windows by Microsoft
Is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft. It consists of
several families of operating systems, each of which cater to a certain sector of the computing industry.
Active Windows families include Windows NT, Windows Embedded and Windows Phone; these may
encompass subfamilies, e.g. Windows Embedded Compact (Windows CE) or Windows Server. Defunct
Windows families include Windows 9x and Windows Mobile.
Microsoft introduced an operating environment named Windows on November 20, 1985 as a graphical
operating system shell for MS-DOS in response to the growing interest in graphical user interfaces
(GUIs). Microsoft Windows came to dominate the world's personal computer market with over 90%
market share, overtaking Mac OS, which had been introduced in 1984. However, since 2012, it sells
less than Android, which became the most popular operating system in 2014, when counting all of the
computing platforms Windows runs on (same as Android); in 2014, the number of Windows device sold
were less than 25% of Android devices sold.
As of April 2014, the most recent versions of Windows for personal computers, smartphones, server
computers and embedded devices are respectively Windows 8.1, Windows Phone 8.1, Windows Server
2012 R2 and Windows Embedded 8. A specialized version of Windows runs on the Xbox One game
console.
The next version of Windows is Windows 10 and is currently available as a technical preview; it is set for
release for phones, tablets, laptops, and PCs in mid-2015. The next server version of Windows is
Windows Server 2016, which is expected to be released in early 2016.
History of Windows
The history of Windows dates back to September 1981, when Chase Bishop, a computer scientist,
designed the first model of an electronic device and project Interface Manager was started. It was
announced in November 1983 (after the Apple Lisa, but before the Macintosh) under the name
"Windows", but Windows 1.0 was not released until November 1985.
Windows 1.0
Was to compete with Apple's operating system, but achieved little popularity. Windows 1.0 is not a
complete operating system; rather, it extends MS-DOS. The shell of Windows 1.0 is a program known as
the MS- DOS Executive. Components included Calculator, Calendar, Cardfile, Clipboard viewer, Clock,
Control Panel, Notepad, Paint, Reversi, Terminal and Write. Windows 1.0 does not allow overlapping
windows. Instead all windows are tiled. Only modal dialog boxes may appear over other windows.
Windows 2.0
Was released in December 1987 and was more popular than its predecessor. It features several
improvements to the user interface and memory management. Windows 2.03 changed the OS from tiled
35
windows to overlapping windows. The result of this change led to Apple Computer filing a suit against
Microsoft alleging infringement on Apple's copyrights. Windows 2.0 also introduced more sophisticated
keyboard shortcuts and could make use of expanded memory.
Windows 2.1
Was released in two different versions: Windows/286 and Windows/386. Windows/386 uses the virtual
8086 mode of Intel 80386 to multitask several DOS programs and the paged memory model to emulate
expanded memory using available extended memory. Windows/286, in spite of its name, runs on both
Intel 8086 and Intel 80286 processors. It runs in real mode but can make use of the high memory area.
In addition to full Windows-packages, there were runtime-only versions that shipped with early
Windows software from third parties and made it possible to run their Windows software on MS-DOS
and without the full Windows feature set.
The early versions of Windows are often thought of as graphical shells, mostly because they ran on top
of MS-DOS and use it for file system services. However, even the earliest Windows versions already
assumed many typical operating system functions; notably, having their own executable file format and
providing their own device drivers (timer, graphics, printer, mouse, keyboard and sound). Unlike MS-
DOS, Windows allowed users to execute multiple graphical applications at the same time, through
cooperative multitasking. Windows implemented an elaborate, segment-based, software virtual memory
scheme, which allows it to run applications larger than available memory: code segments and resources
are swapped in and thrown away when memory became scarce; data segments moved in memory when
a given application had relinquished processor control.
Windows 3.0
Released in 1990, improved the design, mostly because of virtual memory and loadable virtual device
drivers (VxDs) that allow Windows to share arbitrary devices between multi-tasked DOS applications.
[citation needed] Windows 3.0 applications can run in protected mode, which gives them access to
several megabytes of memory without the obligation to participate in the software virtual memory
scheme. They run inside the same address space, where the segmented memory provides a degree of
protection. Windows 3.0 also featured improvements to the user interface. Microsoft rewrote critical
operations from C into assembly. Windows 3.0 is the first Microsoft Windows version to achieve broad
commercial success, selling 2 million copies in the first six months.
Windows 3.1
Made generally available on March 1, 1992, featured a facelift. In August 1993, Windows for
Workgroups, a special version with integrated peer-to- peer networking features and a version number
of 3.11, was released. It was sold along Windows 3.1. Support for Windows 3.1 ended on December 31,
2001
Windows 3.2
Released 1994, is an updated version of the Chinese version of Windows 3.1. The update was limited to
this language version, as it fixed only issues related to the complex writing system of the Chinese
language. Windows 3.2 was generally sold by computer manufacturers with a ten-disk version of MS-
DOS that also had Simplified Chinese characters in basic output and some translated utilities.
Windows 95
Was released on August 24, 1995. While still remaining MS-DOS-based, Windows 95 introduced
support for native 32-bit applications, plug and play hardware, preemptive multitasking, long file names
of up to 255 characters, and provided increased stability over its predecessors. Windows 95 also
introduced a redesigned, object oriented user interface, replacing the previous Program Manager with
the Start menu, taskbar, and Windows Explorer shell. Windows 95 was a major commercial success for
Microsoft; Ina Fried of CNET remarked that "by the time Windows 95 was finally ushered off the market
in 2001, it had become a fixture on computer desktops around the world." Microsoft published four
OEM Service Releases (OSR) of Windows 95, each of which was roughly equivalent to a service pack.
The first OSR of Windows 95 was also the first version of Windows to be bundled with Microsoft’s web
browser, Internet Explorer. Mainstream support for Windows 95 ended on December 31, 2000 and
extended support for Windows 95 ended on December 31, 2001.
36
Windows 98
On June 25, 1998, which introduced the Windows Driver Model, support for USB composite devices,
support for ACPI, hibernation, and support for multi-monitor configurations. Windows 98 also included
integration with Internet Explorer 4 through Active Desktop and other aspects of the Windows Desktop
Update (a series of enhancements to the Explorer shell which were also made available for Windows 95).
Release in May 1999, an updated version of Windows 98. Windows 98 SE added Internet Explorer 5.0
and Windows Media Player 6.2 amongst other upgrades. Mainstream support for Windows 98 ended on
June 30, 2002 and extended support for Windows 98 ended on July 11, 2006.
Release on September 14, 2000, the last DOS-based version of Windows. Windows ME incorporated
visual interface enhancements from its Windows NT-based counterpart Windows 2000, had faster boot
times than previous versions (which however, required the removal of the ability to access a real mode
DOS environment, removing compatibility with some older programs), expanded multimedia
functionality (including Windows Media Player 7, Windows Movie Maker, and the Windows Image
Acquisition framework for retrieving images from scanners and digital cameras), additional system
utilities such as System File Protection and System Restore, and updated home networking tools.
However, Windows ME was faced with criticism for its speed and instability, along with hardware
compatibility issues and its removal of real mode DOS support. PC World considered Windows ME to be
one of the worst operating systems Microsoft had ever released, and the 4th worst tech product of all
time.
Windows NT
Early versions
In November 1988, a new development team within Microsoft (which included former Digital Equipment
Corporation developers Dave Cutler and Mark Lucovsky) began work on a revamped version of IBM and
Microsoft's OS/2 operating system known as "NT OS/2". NT OS/2 was intended to be a secure, multi-
user operating system with POSIX compatibility and a modular, portable kernel with preemptive
multitasking and support for multiple processor architectures. However, following the successful release
of Windows 3.0, the NT development team decided to rework the project to use an extended 32-bit port
of the Windows API known as Win32 instead of those of OS/2. Win32 maintained a similar structure to
the Windows APIs (allowing existing Windows applications to easily be ported to the platform), but also
supported the capabilities of the existing NT kernel. Following its approval by Microsoft's staff,
development continued on what was now Windows NT, the first 32-bit version of Windows. However,
IBM objected to the changes, and ultimately continued OS/2 development on its own.
The first release of the resulting operating system, Windows NT 3.1 (named to associate it with Windows
3.1) was released in July 1993 with versions for desktop workstations and servers. Windows NT 3.5 was
released in September 1994, focusing on performance improvements and support for Novell's NetWare,
and was followed up by Windows NT 3.51 in May 1995, which included additional improvements and
support for the PowerPC architecture. Windows NT 4.0 was released in June 1996, introducing the
redesigned interface of Windows 95 to the NT series. On February 17, 2000, Microsoft released Windows
2000, a successor to NT 4.0. The Windows NT name was dropped at this point in order to put a greater
focus on the Windows brand.
Windows XP
The next major version of Windows, was released on October 25, 2001. The introduction of Windows XP
aimed to unify the consumer-oriented Windows 9x series with the architecture introduced by Windows
NT, a change which Microsoft promised would provide better performance over its DOS-based
predecessors. Windows XP would also introduce a redesigned user interface (including an updated Start
menu and a "task-oriented" Windows Explorer), streamlined multimedia and networking features, Internet
Explorer 6, integration with Microsoft's .NET Passport services, modes to help provide compatibility with
software designed for previous versions of Windows, and Remote Assistance functionality.
At retail, Windows XP was now marketed in two main editions: the "Home" edition was targeted towards
37
consumers, while the "Professional" edition was targeted towards business environments and power users,
and included additional security and networking features. Home and Professional were later accompanied
by the "Media Center" edition (designed for home theater PCs, with an emphasis on support for DVD
playback, TV tuner cards, DVR functionality, and remote controls), and the "Tablet PC" edition (designed
for mobile devices meeting its specifications for a tablet computer, with support for stylus pen input and
additional pen-enabled applications). [27] [28] [29] Mainstream support for Windows XP ended on April
14, 2009. Extended support ended on April 8, 2014.
After Windows 2000, Microsoft also changed its release schedules for server operating systems; the
server counterpart of Windows XP, Windows Server 2003, was released in April 2003. It was followed in
December 2005 by Windows Server 2003 R2.
Windows Vista
After a lengthy development process, Windows Vista was released on November 30, 2006 for volume
licensing and January 30, 2007 for consumers. It contained a number of new features, from a
redesigned shell and user interface to significant technical changes, with a particular focus on security
features. It was available in a number of different editions, and has been subject to some criticism.
Vista's server counterpart, Windows Server 2008 was released in early 2008.
Windows 7
Release on July 22, 2009 together with Windows Server 2008 R2, as RTM (release to manufacturing)
while the former was released to the public 3 months later on October 22, 2009. Unlike its predecessor,
Windows Vista, which introduced a large number of new features, Windows 7 was intended to be a more
focused, incremental upgrade to the Windows line, with the goal of being compatible with applications
and hardware with which Windows Vista was already compatible. Windows 7 has multi-touch support,
a redesigned Windows shell with an updated taskbar, a home networking system called Home Group,
and performance improvements.
Windows 8
The successor to Windows 7, was released generally on October 26, 2012. A number of significant
changes were made on Windows 8, including the introduction of a user interface based around
Microsoft's Metro design language with optimizations for touch-based devices such as tablets and all-
in-one PCs. These changes include the Start screen, which uses large tiles that are more convenient
for touch interactions and allow for the display of continually updated information, and a new class of
apps which are designed primarily for use on touch-based devices. Other changes include increased
integration with cloud services and other online platforms (such as social networks and Microsoft's
own SkyDrive and Xbox Live services), the Windows Store service for software distribution, and a new
variant known as Windows RT for use on devices that utilize the ARM architecture.
Windows 8.1
An update to Windows 8, was released on October 17, 2013, and includes features such as new live
tile sizes, deeper SkyDrive integration, and many other revisions.
Windows 10
On September 30, 2014, Microsoft announced Windows 10 as the successor to Windows 8.1. It will be
released in late 2015 and addresses shortcomings in the user interface first introduced with Windows
8. Changes include the return of the Start Menu, a virtual desktop system, and the ability to run
Windows Store apps within windows on the desktop rather than in full- screen mode.
Windows Servers
OS Rele Editions
as
e
Da
Windows Server 2012 R2 Foundation
te Windows Server 2012 R2 Essentials
Windows Server 2013
Windows Server 2012 R2 Standard
2012 R2
Windows Server 2012 R2 Datacenter
Windows Server 2012 Foundation
Windows Server 2012 Essentials
38
Windows Server 2012 Windows Server 2012 Standard
2012 Windows Server 2012 Datacenter
Windows MultiPoint Server 2012
Windows Server 2008 R2 Foundation
Windows Server 2008 R2 Standard
Windows Server 2008 R2 Enterprise
Windows Server 2008 R2 Datacenter
Windows Server 2008 R2 for Itanium-based Systems
Windows Web Server 2008 R2
Windows Server 2010 Windows Storage Server 2008 R2
2008 R2 Windows HPC Server 2008 R2
Windows Small Business Server 2011
Windows MultiPoint Server 2011
Windows Home Server 2011
Windows MultiPoint Server 2010
Windows Server 2008 Standard
Windows Server 2008 Enterprise
Windows Server 2008 Datacenter
Windows Server 2008 for Itanium-based Systems
Windows Server Foundation 2008
Windows Server 2008 Windows Essential Business Server 2008
2008 Windows HPC Server 2008
Windows Small Business Server 2008
Windows Storage Server 2008
Windows Web Server 2008
Windows Small Business Server 2003 R2
Windows Server 2003 R2 Web Edition
Windows Server 2003 R2 Standard Edition
Windows Server 2006
Windows Server 2003 R2 Enterprise Edition
2003 R2 Windows Server 2003 R2 Datacenter Edition
Windows Compute Cluster Server 2003 (CCS)
Windows Storage Server
Windows Home Server
Windows Small Business Server 2003
Windows Server 2003 Web Edition
Windows Server 2003
Windows Server 2003 Standard Edition
2003 Windows Server 2003 Enterprise Edition
Windows Server 2003 Datacenter Edition
Windows Storage Server
Windows 2000 Server
Windows 2000 Advanced Server
Windows 2000 2000
Windows 2000 Datacenter Server
Windows 2000 Server
Windows 2000 Advanced Server
Windows NT 4.0 1996
Windows 2000 Datacenter Server
Windows NT 3.51 1995 Windows NT 3.51 Server
Windows NT 3.5 1994 Windows NT 3.5 Server
Windows NT 3.1 1993 Windows NT 3.1 Server
39
Windows Client
OS Release Editions
Date
Windows 10 Home
Windows 10 Pro
Windows 10 Enterprise
Windows 10 2014
Windows 10 Education
Windows 10 Mobile
Windows 10 Mobile Enterprise
Windows 10 IoT Core
Windows 8.1
Windows 8.1 Pro
Windows 8.1 2013
Windows 8.1 Enterprise
Windows 8
Windows 8 2012 Windows 8 Pro
Windows 8 Enterprise
Windows 7 Home Basic
Windows 7 Home Premium
Windows 7 2009
Windows 7 Professional
Windows 7 Enterprise
Windows 7 Ultimate
Windows Vista Home Premium
Windows Vista Business
Windows Vista 2007
Windows Vista Enterprise
Windows Vista Ultimate
WindowsXP 2005 N/P
Professional x64 bit
Windows XP Starter
Windows XP Home
Windows XP 2001
Windows XP Professional
Windows XP 64-bit Edition
Windows Fundamentals for Legacy PCs
Windows ME 2000 N/A
Windows 2000 2000 Professional
Windows 98 1998 Windows 98
Windows 98 Second Edition
Windows NT 4.0 1996 Windows NT 4.0 Workstation
Windows 95
Windows 95 SP1 (31 December 1995)
Windows 95 OSR1 (14 February 1996)
Windows 95 1995 Windows 95 OSR2 (24 August 1996)
Windows 95 USB Supplement to OSR2 (27 August 1997)
Windows 95 OSR2.1 (27 August 1997)
Windows 95 OSR2.5 (26 November 1997)
Windows NT 3.51 1995 Windows NT 3.51 Workstation
Windows NT 3.5 1994 Windows NT 3.5 Workstation
Windows NT 3.2 1993 Simplified Chinese Only
Windows NT 3.1 1993 Windows NT 3.1
Windows 3.1 1992 Windows 3.1
Windows 3.0 1990 N/A
Windows 2.11 1989 Windows/286
Windows/386
Windows 2.10 1988 Windows/286 Windows/386
Windows 2.0 1987 N/A
Windows 1.04 1987 N/A
Windows 1.03 1986 N/A
Windows 1.01 1985 N/A
40
2. Linux
Linux (pronounced Listeni/ˈlɪnəks/ LIN-uk] or, less frequently, /ˈlaɪnəks/ LYN-uks) is a Unix-like and
mostly POSIX-compliant [6] computer operating system (OS) assembled under the model of free and
open-source software development and distribution. The defining component of Linux is the Linux
kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds. The Free
Software Foundation uses the name GNU/Linux to describe the operating system, which has led to
some controversy.
Linux was originally developed as a free operating system for personal computers based on the Intel
x86 architecture, but has since been ported to more computer hardware platforms than any other
operating system. [ Android, that is built on top of the Linux kernel, has the largest installed base of
all general-purpose operating systems made so by its dominance on smartphones. Linux, in its
original form, is also the leading operating system on servers and other big iron systems such as
mainframe computers and supercomputers, but is used on only around 1.5% of desktop computers.
Linux also runs on embedded systems, which are devices whose operating system is typically built
into the firmware and is highly tailored to the system; this includes mobile phones, tablet computers,
network routers, facility automation controls, televisions and video game consoles.
The development of Linux is one of the most prominent examples of free and open-source software
collaboration. The underlying source code may be used, modified, and distributed—commercially or
non-commercially—by anyone under licenses such as the GNU General Public License. Typically, Linux
is packaged in a form known as a Linux distribution, for both desktop and server use. Some popular
mainstream Linux distributions include Debian, Ubuntu, Linux Mint, Fedora, openSUSE, Arch Linux,
and the commercial Red Hat Enterprise Linux and SUSE Linux Enterprise Server. Linux distributions
include the Linux kernel, supporting utilities and libraries and usually a large amount of application
software to fulfill the distribution's intended use.
Distributions oriented toward desktop use typically include X11, a Wayland implementation or Mir as
the windowing system, and an accompanying desktop environment such as GNOME or the KDE
Software Compilation. Some of such distributions may include a less resource intensive desktop such
as LXDE or Xfce, for use on older or less powerful computers. Distributions intended to run on servers
may omit all graphical environments from the standard install, and instead include other software to set
up and operate a solution stack such as LAMP. Because Linux is freely redistributable, anyone may
create a distribution for any intended use.
3. MAC OS X
OS X (pronounced /ˌoʊ ɛs ˈtɛn/;] originally Mac OS X) is a series of Unix- based graphical interface
operating systems developed and marketed by Apple Inc. It is designed to run on Macintosh computers,
having been pre- installed on all Macs since 2002. It was the successor to Mac OS 9, released in 1999,
the final release of the "classic" Mac OS, which had been Apple's primary operating system since 1984.
The first version released was Mac OS X Server 1.0 in 1999, and a desktop version, Mac OS X v10.0
"Cheetah" followed on March 24, 2001. Previous releases of OS X were named after big cats; for
example, OS X v10.8 was referred to as "Mountain Lion". However, with the announcement of OS X
Mavericks in June 2013, this was dropped in favor of Californian landmarks. Within the market of
desktop, laptop and home computers, and by web usage, OS X is the second most widely used OS after
Windows.
OS X, whose X is the Roman numeral for 10 and is a prominent part of its brand identity, is built on
technologies developed at NeXT between the second half of the 1980s and Apple's purchase of the
company in late 1996. The 'X' is also used to emphasize the relatedness between OS X and UNIX. UNIX
03 certification has been achieved for versions 10.5 for Intel CPUs, and versions 10.6 through 10.10.
iOS, the mobile OS for the iPhone, iPod Touch, [16] iPad, and the 2nd and 3rd generation Apple TV,
shares the Unix- based Darwin core and many frameworks with OS X. An unnamed variant of v10.4
powers the first generation Apple TV.
The first releases of Mac OS X from 1999 to 2006 can run only on the PowerPC based Macs of the period.
After Apple announced it would shift to using Intel x86 CPUs from 2006 onwards, Tiger and Leopard were
released in versions for Intel and PowerPC processors. Snow Leopard is the first version released only for
Intel Macs. Since the release of Mac OS X 10.7 "Lion", OS X has dropped support for 32-bit Intel
processors as well. It now runs exclusively on 64-bit Intel CPUs.
41
Apple offers an application suite for OS X called OS X Server, for use on servers. It includes tools to
facilitate management of workgroups of OS X machines, and to provide network services. It is sold
separately through the Mac App Store as a single item; it remained available until 2014 preinstalled on
dedicated server computers. Before the release of Mac OS X 10.7 "Lion", a separate edition of Mac OS X,
called Mac OS X Server, with additional tools bundled with the operating system was sold and was
preinstalled on servers.
The latest version of OS X is 10.10 "Yosemite", which was released to the public on October 16, 2014.
4. UNIX
A term coined by Brian Kernighan, Unix or UNIX (not an acronym) is an operating system that was
developed by some of the members of the MULTICS team at the Bell Laboratories starting in the late
1960's, many of who also helped create the C programming language. Today, Unix is not just the work
of a couple of programmers; organizations, institutes, and other individuals have contributed significant
additions to Unix and its variants, making it a widely used and popular operating system.
Unix is primarily a command line oriented operating system you can get additional applications such as
X-Window, which allows you to have a graphic oriented operating system similar to Windows. Since
Unix is often used from the command line there are various shells. A shell is a large add- on or
modification of the Unix operating system, to determine the shell you can type echo $shell at the Unix
prompt. When typing this command, a response such as "/bin/csh" is displayed, which indicates you
are logged into is a C shell. Bourne shell is "/bin/sh" and Korn shell which is "/bin/ksh."
When first introduced, UNIX was a trademark of Bell Laboratories (AT&T), which is now owned by The
Open Group who obtained the trademark in 1993. Today, Unix and UNIX are accepted as correct and
interchangeable when referring to the operating system. However, if you are referring to the trademark,
it would be more appropriate to use UNIX instead of Unix.
There are dozens of Unix distributions that have been released since its initial release. Below is a few of
the distributions we have currently listed on our site.
ULTRIX
Xenix
42
5. Chrome OS
Chrome OS is an operating system based on the Linux kernel and designed by Google to work with web
applications and installed applications. Initially, Chrome OS was almost a pure web thin client
operating system, with only a handful of "native" applications, but Google gradually began encouraging
developers to create "packaged applications", some of which can work offline. In 2014, Google upgraded
its Play Store standards for packaged applications, requiring that these applications work offline.
Around the same time, Google also announced that Chrome OS would gain the ability to run Android
applications natively, by late 2014. In September 2014, App Runtime for Chrome (beta) was launched
together with four Android applications being able to run on Chrome OS.
Chrome OS is built upon the open source project called Chromium OS which, unlike Chrome OS, can
be compiled from the downloaded source code. Chrome OS is the commercial version installed on
specific hardware from Google's manufacturing partners. The launch date for retail hardware featuring
Chrome OS was delayed from late 2010 to June 15, 2011, when "Chromebooks" from Samsung, and
then Acer shipped in July.
Google announced Chrome OS on July 7, 2009, describing it as an operating system in which both
applications and user data reside in the cloud. To ascertain marketing requirements, the company
relied on informal metrics, including monitoring the usage patterns of some 200 Chrome OS machines
used by Google employees. Developers also noted their own usage patterns. Matthew Papakipos, former
engineering director for the Chrome OS project, put three machines in his house and found himself
logging in for brief sessions: to make a single search query or send a short email.
On November 19, 2009, Google released Chrome OS's source code as the Chromium OS project. As with
other open source projects, developers can modify the code from Chromium OS and build their own
versions, whereas Chrome OS code is only supported by Google and its partners and only runs on
hardware designed for the purpose. Unlike Chromium OS, Chrome OS is automatically updated to the
latest version.
At a November 19, 2009 news conference, Sundar Pichai, the Google vice president overseeing Chrome,
demonstrated an early version of the operating system. He previewed a desktop which looked very
similar to the Chrome browser, and, in addition to the regular browser tabs, also had application tabs,
which take less space and can be pinned for easier access. At the conference, the operating system
booted up in seven seconds, a time Google said it would work to reduce.
Also on November 19, 2009, Chris Kenyon, vice president of OEM services at Canonical Ltd, announced
that Canonical was under contract to contribute engineering resources to the project with the intent to
build on existing open source components and tools where feasible.
By February 2010, Google switched its development Linux distribution for Chrome from Ubuntu to
Gentoo Linux in order to use that distribution's Portage package management system, which, according
to sources at Google, is used with "Google's own take on the vanilla Linux kernel".
1. Windows ME
6. Windows XP
2. Windows 98 1st edition
7. Windows Vista
3. Windows 98 second edition
8. Windows 7
4. Windows 95
9. Windows 8
5. Windows 3.11 etc.
10. Windows 10 etc.
43
LEARNING EXPERIENCES
LEARNING OUTCOME 3
44
INFORMATION SHEETS CO1.3-1
“Operating Systems Installation Procedures”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the procedures on how to go to OS set up
2. Install OS in a Personal Computer
“Once setup has started wait until the screen goes like this”
45
“Now Start choosing your OS Language to install followed by the Time Zone then press next”
“Now Choose whether you like to install a 32bit (x86) or 64bit (x64) OS version and what edition
of the OS your license is qualified”
“Now tick on the box I accept the license terms and then click the next button”
46
“Now choose Custom Advance”
“Now it’s up to you to choose if how many partitions are you going to create especially if you are
planning to create a Dual Boot System”
“For now all you have to do is wait until it finishes copying and installing all the requires
windows setup to your HDD”
47
“Now your Fresh copy of Windows 7 is ready for first use”
“Check to see if your computer is compatible with Windows 7. The Windows 7 Upgrade Advisor
scans your computer to see if you can upgrade it to Windows 7”
48
“Now prepare your computer to install Windows”
Scan your computer for malware. Malware can prevent Windows from installing correctly.
Disable or uninstall any antivirus software because they may interfere with the Windows
installation.
Uninstall some unnecessary programs to speed up the upgrade. You can install them after
Windows 7 has finished.
Update Windows with Windows Update.
Delete some unnecessary files to speed up the upgrade.
Back up your hard drive in case the installation fails and you lose your files. (optional).
“After the following procedures where done you may now insert your Windows 7 installation
disc into the computer at this point”
“You may now choose whether you like to go online for further latest updates or not”
49
“Now tick on the box I accept the license terms and then click the next button”
“This time choose the Upgrade option and then just wait until it finishes installing your new
upgraded version of OS”
50
Perform Task Sheet C01.3-1
Supplies/Materials : CD OS Installer
Tools & Equipment : Set of PC, Flash Driver with OS installer, External ODD
Steps/Procedure:
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
51
INFORMATION SHEET C01.3-2
Installation of Device Driver Procedures
Learning Objectives:
To see which drivers are installed properly and which driver weren’t go to;
Control Panel > Systems and Security > Systems > Device Manager Or simply go to My Computer, right
click and go to manage:
In case a yellow sign with a Question mark in it is seen in this part. You may need to install or find a
driver for it.
You may need to install the Driver CD included in your motherboard package like in this picture.
ATI
NVIDIA
While adding a device in your computer via I/O interface a driver should also be installed so that
the hardware will run properly. Like in the case of a Printer
A computer printer does not work until you install the included drivers and software. If you have lost the
CD for your printer, you can always download the drivers for your printer and use the drivers to install
your printer.
Procedure
Connect the printer to the computer either using a USB cable, parallel port cable, or SCSI cable and
then connect the power plug to a power outlet. Today, most all home computer printers are using a USB
cable and newer manufactured printer may also be connected via LAN or WIFI.
Every printer should come with the software used to install a printer in Windows or your operating
system.
53
Follow the installation wizard and at times need to agree with the license agreement
At the middle of the setup it will require you to turn on the Printer
Once the printer was detected by the system the setup will continue once completed your
software is installed.
Test the printer to make sure it is working via test printing.
Installing a Scanner
Before you can scan documents into your computer with a scanner, you need to install the scanner
driver so that your scanner and computer can communicate. Start by connecting the scanner to your
computer’s USB port (see your scanner manual for information about how it connects to your
computer).
Some scanners use Plug and Play, a technology that Windows uses to recognize equipment and
automatically install and set it up. If your scanner is Plug and Play-enabled, Windows 7 shows a Found
New Hardware message in the Taskbar notification area (in the lower-right corner). Most Plug and Play
devices will then automatically install, the message will change to verify the installation is complete, and
that’s all you have to do.
Turn the scanner on.
If you’re not using a Plug and Play device or Windows doesn’t have the driver for that
device, you see the Found New Hardware message.
Click the Found New Hardware message, click Yes, This Time Only, and then click Next again.
You only need to do this step if you don’t permit Windows 7 to automatically connect to
Windows Update. Otherwise, you don’t see the Found New Hardware Wizard.
If you have a CD for the scanner, insert it in your CD drive and click Next.
Windows 7 searches for your scanner driver software and installs it.
Choose Start→Control Panel and type scanners in the Search box.
Windows returns a set of links.
Click the View Scanners and Cameras link.
The Scanners and Cameras window appears.
Click the Add Device button and then click Next.
The Scanner and Camera Installation Wizard window appears. When you click Next, the
next screen of the wizard appears.
o
Click a Manufacturer in the list on the left and then click a model in the list on the right.
Now it’s just a matter of following the wizard directions based on the model of scanner
you choose and whether you have a manufacturer’s disc (a CD- or DVD-ROM). If you
don’t have a disc, Windows can help you download software from the Internet.
When you reach the end of the wizard, click Finish. The installation is complete.
54
Installing a PC Webcam
Webcams come in all shapes and sizes, and vary from basic models to more complicated ones that
come with extra gadgets such as motion detectors. Prices vary a lot, too. Make sure that the one you
choose has a built-in microphone if you want to use your webcam for chatting to friends and
relatives.
Carefully read the installation instructions before attempting to install the webcam. Instructions
may vary with different models and manufacturer.
Make sure you have everything to hand that you’ll need to complete your installation. The webcam
should come with a USB cable that will connect it to your computer (except if you have a wireless
version).
The webcam package includes a CD containing important software. Insert this into your computer’s
CD drive. The set-up program should run automatically, but if it doesn’t, click Start and then My
Computer. Double-click on the disk drive as this will prompt the files to run on the CD.
Make sure that you follow the steps of the software program, you’ll be installing the drivers that
allow your computer to communicate with the webcam. It may be important to plug in the webcam
in a certain order with other cables and equipment, so only plug it in when prompted to do so.
Now position your webcam. If it has a monitor clip, attach it securely to the top of your screen
pointing at your face. Adjust it so that that people at the other end can see your whole face and not
just your forehead.
Once you’ve adjusted it to your satisfaction, don’t fiddle with it during a call – there’s nothing more
irritating to the person you’re talking to than to spend a call looking, first, at the light fitting and
then at the carpet while you’re chatting.
If your webcam doesn’t have a clip, make sure it’s sitting firmly on a flat surface so that your web
pictures are level. The tops of older-style CRT monitors are perfect for webcams to sit on.
Remember that everyone will see whatever is behind you, so keep it tidy – and think about getting
dressed!
Now you’ve completed the set-up, it’s time to see the results! Click Start again and find your
webcam program. Double-click on it and the program will open up.
55
Perform Task Sheet CO1.3-2
Performance Objective : Given (tools, equipment & materials), you should be able to
Install Device Drivers Procedures
Supplies/Materials : CD Installer
Tools & Equipment : Printer, Scanner, Webcam, 1 Set of PC with OS
and flash drive with different downloaded drivers
Steps/Procedure:
3. Install printer
4. Install scanner
5. Install webcam
Assessment Method:
Demonstration
Interview
CRITERIA
YES NO
Did you….
1. Inserted the ink cartridge correctly
56
INFORMATION SHEET C01.3-3
Installation of OS and Driver updates/patches
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the importance of Installing OS updates
2. Learn the importance of Installing Driver updates/patches
3. Install updates
Downloading and installing the latest software updates, particularly security updates, quickly and
consistently on your PC is vital to maintain both its security and its proper functioning. For network
administrators, applying updates on computers across your organization—small, medium, or large— is
a crucial measure for keeping your systems secure and running properly.
We all get them from time to time- those little windows that pop up, notifying us that there are software
updates available for our computer. Chances are, these always seem to present themselves right when
we are in the middle of doing something seemingly important, so it’s all too convenient to click on that
“Remind Me Later” button. Later eventually rolls around, and our little pop-up friend is back once
again, nagging us to install these updates and restart our computer. And just like during their last visit,
we’re right in the middle of something, and the cycle continues. However, that notification is not there
just to pester us. There is actually significant importance in updating our software.
Why Should I Install Updates?
Software updates perform a myriad of tasks. They are available for both our operating system and
individual software programs. Performing these updates will deliver a multitude of revisions to your
computer, such as adding new features, removing outdated features, updating drivers, delivering bug
fixes, and most importantly, fixing security holes that have been discovered.
The Dangers of Software Vulnerabilities
A software vulnerability is usually a security hole or weakness found in an operating system or software
program. Hackers exploit this weakness by writing code to target a specific vulnerability, which is
packaged into malware. These exploits can infect your computer with no action on your part other than
viewing a website, opening a compromised message, or playing infected media.
Once it infects your computer, this malware can then steal data, allow the attacker to gain control over
your computer, and even use software in a way that it was not originally intended. A recent example of
an attack via software vulnerabilities is the “Shellshock” attacks on Mac OSX and Linux.
So even though these software updates seem like a hassle, think of it as a preventative measure for
your Internet safety. Next time that message comes up to update, resist procrastination and go ahead
and hit that “Install Now” button.
Here are the easy steps on how to update the OS and Device Driver (e.g. Win 7)
57
Read and accept the license terms, and then click Finish if the update requires it. Administrator
permission required If you're prompted for an administrator password or confirmation, type the
password or provide confirmation.
Note: If language packs are available, install only the languages that you use.
Some updates might require that you restart your computer to finish installing. Save and close
all your programs before restarting to prevent data loss.
Performance Objective : Given (tools, equipment & materials), you should be able to
Install OS and driver updates/patches
Supplies/Materials : Internet Connection
Steps/Procedure:
1. Prepare the necessary tools and equipment
2. Start the computer.
3. Download and Install OS updates
4. Download and Install Driver updates
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
1. Found right website for the OS updates
58
INFORMATION SHEET C01.3-4
Compatibility Issues
Learning Objectives:
It is not necessarily to install every hardware we might think is good for our computer. Sometimes
installing or adding some hardware to our system might just make our system to run slower or worst
will create further problem. Upgrading system hardware will require compatibility before you may able
to install or run them. Keep in mind that hardware with a higher version of specification needs also
hardware associates with the same level of performance.
The Computer OS will not allow you to install any Application Software if it is not compatible with it. For
example, you will not be able to install an Application Software intended only for Windows OS in a MAC
OS computer, vice versa. And sometimes some application software intended only for Windows OS
doesn’t mean it is compatible to every windows base PC. For example, running a 32 bit windows will not
allow you to install application software intended for 64bit windows base. Some software may require
you to install other programs or software first before you may continue the installation.
Driver software also not exempted with this compatibility issues. Different CD drivers has their
complete set of drivers depends on the OS of the computer.
There are different compatibility issues that surrounds between the hardware and software. For
example, installing an OS in a PC needs some requirement specifically the speed of the hardware
installed before installing the OS so it will run properly and smoothly. Same thing when installing an
Application Software, it will require and recommend for a right specification of the hardware before you
will be able to install it.
This different compatibility issues can also be corrected by different OS. For example, Windows OS has
a program known as “Program Compatibility Assistant”. Program Compatibility is a mode that allows
you to run programs that were written for earlier versions of Windows. The Program Compatibility
Assistant detects compatibility issues and allows you to reinstall using the recommended settings.
Self-Check C01.3-4
Compatibility Issues
True or False:
1. Different compatibility issues can also be corrected by different OS?
2. There are different compatibility issues that surrounds between the hardware and software?
3. The Computer OS will allow you to install any Application Software if it is not compatible with it?
4. We can always install any hardware we want in our computer?
5. Driver software are exempted with compatibility issues?
59
LEARNING EXPERIENCES
LEARNING OUTCOME 4
60
INFORMATION SHEET C01.4-1
Different Categories of Application Software
Learning Objectives:
Application Software
Application software (an application) is a set of computer programs designed to permit the user to
perform a group of coordinated functions, tasks, or activities. Application software cannot run on itself
but is dependent on system software to execute. Examples of an application include a word processor, a
spreadsheet design and management system, an aeronautical flight simulator, a console game, a
drawing, painting, and illustrating system, or a library management system.
The term is used to distinguish such software from system software, which manages and integrates a
computer's capabilities but does not directly perform tasks that benefit the user, and utility software,
which is directly concerned with altering or managing the computer's operating environment.
Examples of types of application software may include accounting software, media players, and office
suites. Many application programs deal principally with documents. Applications may be bundled with
the computer and its system software or published separately, and may be coded as e.g. proprietary,
open-source or university projects.
User-written software tailor’s systems to meet the user's specific needs. User-written software includes
spreadsheet templates, word processor macros, scientific simulations, graphics and animation scripts.
Even email filters are a kind of user software. Users create this software themselves and often overlook
how important it is.
The delineation between system software such as operating systems and application software is not
exact, however, and is occasionally the object of controversy. For example, one of the key questions in
the United States v. Microsoft antitrust trial was whether Microsoft's Internet Explorer web browser was
part of its Windows operating system or a separable piece of application software. As another example,
the GNU/Linux naming controversy is, in part, due to disagreement about the relationship between the
Linux kernel and the operating systems built over this kernel. In some types of embedded systems, the
application software and the operating system software may be indistinguishable to the user, as in the
case of software used to control a VCR, DVD player or microwave oven. The above definitions may
exclude some applications that may exist on some computers in large organizations. For an alternative
definition of an app: see Application Portfolio Management.
There are many different ways to divide up different types of application software, and several are
explained here.
Since the development and near-universal adoption of the web, an important distinction that has
emerged has been between web applications — written with HTML, JavaScript and other web-native
technologies and typically requiring one to be online and running a web browser, and the more
traditional native applications written in whatever languages are available for one's particular type of
computer. There has been contentious debate in the computing community regarding web applications
replacing native applications for many purposes, especially on mobile devices such as smart phones
and tablets. Web apps have indeed greatly increased in popularity for some uses, but the advantages of
applications make them unlikely to disappear soon, if ever. Furthermore, the two can be
complementary, and even integrated.
Application software can also be seen as being either horizontal or vertical. Horizontal applications are
more popular and widespread, because they are general purpose, for example word processors or
databases. Vertical applications are niche products, designed for a particular type of industry or
business, or department within an organization. Integrated suites of software will try to handle every
specific aspect possible of, for example, manufacturing or banking systems, or accounting, or customer
61
service.
Utility Software - is system software designed to help analyze, configure, optimize or maintain a
computer. Usually focuses on how the computer infrastructure (including the computer hardware,
operating system, software and data storage) operates. Utility software, along with operating system
software, is a type of system software, distinguishing it from application software.
Enterprise Software - addresses the needs of an entire organization's processes and data flows, across
several departments, often in a large distributed environment. Examples include enterprise resource
planning systems, customer relationship management (CRM) systems and supply chain management
software. Departmental Software is a sub-type of enterprise software with a focus on smaller
organizations and/or groups within a large organization. (Examples include travel expense management
and IT Helpdesk.)
Information Worker Software - lets users create and manage information, often for individual projects
within a department, in contrast to enterprise management. Examples include time management,
resource management, analytical, collaborative and documentation tools. Word processors,
spreadsheets, email and blog clients, personal information system, and individual media editors may
aid in multiple information worker tasks.
Content Access Software - is used primarily to access content without editing, but may include
software that allows for content editing. Such software addresses the needs of individuals and groups to
consume digital entertainment and published digital content. (Examples include media players, web
browsers, and help browsers.)
Educational Software - is related to content access software, but has the content and/or features
adapted for use in by educators or students. For example, it may deliver evaluations (tests), track
progress through material, or include collaborative capabilities.
Simulation Software - simulates physical or abstract systems for either research, training or
entertainment purposes.
Media Development Software - generates print and electronic media for others to consume, most often
in a commercial or educational setting. This includes graphic-art software, desktop publishing software,
multimedia development software, HTML editors, digital-animation editors, digital audio and video
composition, and many others.
Product Engineering Software - is used in developing hardware and software products. This includes
computer-aided design (CAD), computer- aided engineering (CAE), computer language editing and
compiling tools, integrated development environments, and application programmer interfaces.
Entertainment Software - can refer to video games, screen savers, programs to display motion pictures
or play recorded music, and other forms of entertainment which can be experienced through use of a
computing device.
Virtualization Software - allows a single host computer to create and run one or more virtual
environments. It is most often used to emulate a complete computer system in order to allow a guest
operating system to be run, for example allowing Linux to run as a guest on top of a PC that is natively
running a Microsoft Windows operating system (or the inverse, running Windows as a guest on Linux).
Storage virtualization refers to the process of abstracting logical storage from physical storage.
62
Self-Check CO1.4-1
Different Categories of Application Software
Multiple Choice: Choose the letter of the correct answer.
1. Is used primarily to access content without editing, but may include software that allows for
content editing?
a. Content Access
b. Information
c. Anti-virus
d. Simulation
2. Consists of multiple applications bundled together. They usually have related functions, features
and user interfaces, and may be able to interact with each other?
a. Information Worker
b. Simulation
c. Anti-virus
d. Application Suit
3. Sometimes known as anti-malware software, is computer software used to prevent, detect and
remove malicious software?
a. Educational
b. Utility
c. Anti-virus
d. Entertainment
4. Is related to content access software, but has the content and/or features adapted for use in by
educators or students?
a. Utility
b. Educational
c. Virtualization
d. Media Development
Multiple Choice:
1. A
2. D
3. C
4. B
5. A
63
INFORMATION SHEET C01.4-2
Application Software’s Installation Procedures
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the procedures in Installing Application Software
2. Install different Application Software
Installation Procedure
A software generally refers to any type of executable code that can be launched in a computer system. It
is designed to implement and complete specific functions that are required by the user in his activities.
Software can be developed and distributed freely (freeware) by programmers in various communities
and forums, or they can be sold commercially either online or in computer stores by software companies
like Microsoft, Adobe, and Sony among others. Some computer experts believe that software can be
categorized as general application (can be installed and used by any organization) or customized
(developed to cater to the specific needs of a particular group or enterprise). General application
software like the Microsoft Office Productivity Suite for example can also be customized and tailor fitted
to the needs of a specific organization. This is done by using macro commands and a bit of
programming.
Materials Needed:
- Computer - Installation disc - Web browser
- CD or DVD drive - Internet connection
2. If No Autorun Feature
- Open My Computer.
Within the My Computer window, open the drive that contains the installation files. For example, if
the files are on the CD-ROM drive open the D: drive or letter of your CD-ROM drive.
Setup.exe Within the drive that contains your files, locate either the executable setup or install file.
Double-clicking on this file starts the installation process. If you see multiple setup or install files, try to
locate the Application file or double-click each of the setup or install files until you find the file that
starts the installation. Many times the icons associated with the installation files have the same name.
Once the files are extracted, double click the setup to install.
4. MS-DOS users
Users installing a program from Microsoft DOS should have a basic understanding of the MS-DOS
commands. If you are unfamiliar with any of the commands listed below, click the link to get additional
information on that specific command.
Before installing a program in MS-DOS, you must switch to the drive or directory that contains the
installation files. If you are installing a program from a CD or diskette, switch to that drive. If the
installation files are located in a different directory, use the dir command to list the directories and the cd
command to switch into the appropriate directory.
64
Once you are in the directory or drive that contains the installation files, run the executable for setup.
Many times this can be done by typing setup or install at the prompt to start the installation. If both of
these commands give a bad command or file name error message, type dir *.exe or dir *.com or dir
*.bat. These commands list any executable files; if any files are listed, execute these files to run the
installation or setup of the program. If no files are listed when typing all three of the above commands,
you are in the incorrect directory or drive letter for that program.
Step 2
Since programs in general are written to be Operating System dependent, make sure that the version of
the application you are installing corresponds to the Operating System platform running on your
machine.
Step 3
Aside from the general hardware requirements, some computer programs also have software
requirements prior to installation. Double check if y o u need to update or upgrade your Operating
System or if there is a need to download other tools or utilities.
Step 4
Once all the initial requirements have been met, make sure that there are no unnecessary programs
running before beginning the installation procedure. In some instances, applications may require that
the antivirus programs be disabled. Make sure that you are installing a legitimate application before
disabling your protection software.
Step 5
Software installation can be done either from the Internet (skip to step 8) or from an installation disc
provided by the software manufacturer. To install from the disc, simply open the CD or DVD drive and
insert the installer.
Step 6
A setup wizard window should be launched. In case there is none, open the Explorer and navigate to
the optical drive. Double click on either the Autorun or Setup file.
Step 7
Once the wizard is running, simply follow the prompts until the installation process is completed. For
novice users, accept the default values to minimize potential problems during the procedure. Jump to
step 10.
Step 8
For installation from the Web, launch your browser application and download the setup file to your
hard drive.
Step 9
After completion of the downloading process, run the setup program to execute the setup wizard that
will handle the automatic installation of the software. Do step 7.
Step 10
After the installation procedure has been completed and the setup wizard has terminated, reboot your
machine before launching the newly installed software.
65
Perform Task Sheet CO1.4-2
Performance Objective : Given (tools, equipment & materials), you should be able to
Install different Application Software
Supplies/Materials : CD installers
Tools & Equipment : 1 Set of PC with OS, External / Flash drive with
different Application Software
Steps/Procedure:
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
66
INFORMATION SHEET C01.4-3
Software Updates requirements
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Importance of Application software updates
2. Download and install different Application Software updates
Software updates (sometimes known as "Patches" or "Service Packs") are computing data that improve
usability, performance, and security vulnerabilities within a piece of pre-existing software. Releasing
software to the public is a system that involves planning new software updates every so often (be it per
month, week, or year) for new content and changes to the current software being used by the public.
67
If any updates are found, click Install updates. If you are prompted for an administrator
password or confirmation, type the password or provide confirmation.
Note: Make sure that you install all available updates so that Internet Explorer can install
successfully.
Restart your computer.
Now, you can install Internet Explorer 8. To do this, follow these steps:
Go to the following webpage: Internet Explorer 8: Worldwide sites
Follow the instructions to download and install Internet Explorer 8.
Restart your computer.
Software Update is a software tool by Apple Inc. that installs the latest version of Apple software on
computers running OS X. It was originally introduced to Mac users in Mac OS 9. A Windows version
has been available since the introduction of iTunes 7, under the name Apple Software Update. Software
Update automatically informs users of new updates.
Software Update is a software tool by Apple Inc. that installs the latest version of Apple software on
computers running OS X. It was originally introduced to Mac users in Mac OS 9. A Windows version
has been available since the introduction of iTunes 7, under the name Apple Software Update. Software
Update automatically informs users of new updates.
True or False
1. The most prominent source of software updates today comes directly from our operating system?
2. The best reason to update software is to get the best performance from your computer, gaming
system or other device?
3. It is not good to look at your software you use day to day, and check if it is updated?
4. Latest Update is the update tool use by Mac OS computer?
5. You can enjoy new features of the application you use even without updating them?
True or False
1. True
2. True
3. False
4. False
5. False
68
LEARNING EXPERIENCES
LEARNING OUTCOME 5
69
INFORMATION SHEET C01.5-1
Peripheral and Application Testing
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn how to test different devices/peripherals (hardware)
2. Learn how to test Application Software (software)
It is important to test your devices/peripherals (hardware) and application software for performance if it
is indeed compatible with your existing system. Can it run efficiently and smoothly according to your
requirement and for future usage.
Testing different hardware devices that are connected to our system should be done after installing or
connecting them. If their I/O interface connection comes with a USB connector try connecting it to all
the USB port in the front panel and in the back panel, our system should detect it anywhere we connect
it. There are also some devices in our system that can be connected to different port e.g. the Monitor.
The monitor can be connected through a VGA port, DVI port, HDMI port etc., try using different cables
from this different port if our Monitor can run properly.
While Testing Different Application Software involves the execution of a software component or system
component to evaluate one or more properties of interest.
meets the requirements that guided its design and development,
responds correctly to all kinds of inputs,
performs its functions within an acceptable time,
is sufficiently usable,
can be installed and run in its intended environments, and
achieves the general result its stakeholders desire.
As the number of possible tests for even simple software components is practically infinite, all software
testing uses some strategy to select tests that are feasible for the available time and resources. As a
result, software testing typically (but not exclusively) attempts to execute a program or application with
the intent of finding software bugs (errors or other defects).
Software testing can provide objective, independent information about the quality of software and risk of
its failure to users and/or sponsors.
Software testing can be conducted as soon as executable software (even if partially complete) exists. The
overall approach to software development often determines when and how testing is conducted. For
example, in a phased process, most testing occurs after system requirements have been defined and
then implemented in testable programs. In contrast, under an Agile approach, requirements,
programming, and testing are often done concurrently.
If you're a gamer, stress testing your graphics card is a no-brainer, especially since graphics cards tend
to fail under heavier loads—you know, like the ones generated by top-end games. Another bonus:
Graphic torture tests usually coax underpowered or faulty power supplies into giving up the ghost, so
you're stressing two birds with one stone. Yay efficiency!
Benchmarking tools abound, but FurMark was designed specifically to give your GPU a stress-inducing
workout and punishes graphics cards much harder than the average game. This bad boy uses real-time
renderings of furry objects undulating in front of groovy backgrounds to push your graphics card to its
limits, complete with antialiasing and resolution options. Stick to the standard burn-in test, but keep
an eye on HWMonitor and/or SpeedFan—FurMark gets your GPU very hot, very quickly. You won't need
to run FurMark for long. If your graphics card is going to crash or start tossing out funky visual
artifacts, it will do so within 15 to 30 minutes.
70
Alternatively, Uningine—the makers of the popular Heaven graphics benchmark—recently released
"Valley," a new GPU stress-testing tool that's a lot prettier and more peaceful-looking than Furmark.
Once your GPU passes its primary stress test, I like to run some benchmarks derived from actual games
to see how the graphics card holds under real-life usage. My favorite software for doing that is the Alien
vs. Predator and S.T.A.L.K.E.R benchmarking tools, both of which are freely available.
71
Testing the Scanner Installed
After the Scanner is installed, you can use Windows to check if your scanner is properly installed and
ready for use.
To check to see if your scanner is properly installed, open the Device Stage. Choose Start→Devices and
Printers. If Windows doesn’t automatically find your scanner, you can manually add it in the Devices
and Printers window by clicking the Add a Device button in the toolbar and following the wizard’s
commands.
2. Click the Scan button in the Navigation pane, then click the New Scan button on the toolbar.
The New Scan dialog box for your scanner opens.
4. Click the Preview button to see what your document will look like.
Make any last minute changes.
After the Webcam is installed, you can use the application that comes to its driver CD to check if your
camera is working and was installed properly. In case your camera was installed by generic driver by
your OS you can check your camera if installed properly thru the help of third party application from
the internet.
For a software solution native to Windows, check out AMcap, webcam software built by Microsoft. The
software is quite lightweight and its able to access your webcam using DirectX functions.
After installing AMcap, a small dialog window will load that will automatically detect your webcam. This
is what the main interface will look like before detecting your webcam, with five menu options at the top
of the window: “File, Devices, Options, Capture and Help.”
It will only take a few seconds for AMcap to activate your webcam. Once it does, you can take photos
with this software by going to “Capture” and selecting “Take picture.”
72
When you click to take a picture, the image will be opened straight away in Windows Explorer, and from
here all you have to do to save the image is open your favorite graphics program via “Open” in Windows
Explorer.
e.g. Yawcam
Yawcam, standing for Yet Another Webcam software, is free webcam software that’s written in java. This
software can take photo snapshots, as well as do video streaming.
After installing this software, this is what the main interface will look like; two dialog windows – one to
display your webcam, the other to access menu controls. To get Yawcam to detect your webcam, click
the “Settings” and select “Detect webcam.
Open the Start button – All programs – find your antivirus – execute the program – click scan
Once the scanning has finished either the program will detect if your system is virus free.
Then your program is ok
73
Testing Application Suite software (Microsoft Office)
Open the Start button – All programs – Microsoft Office – Microsoft Word –
type anything you desire
Open the Start button – All programs – Video LAN – VLC Player – then browse any video file in your
system - play
Open the Start button – All programs – Choose desired game – execute the applications –
Once the game has started, the Program is ok.
74
INFORMATION SHEET C01.5-2
Stress Test Procedures
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Purpose and Importance of doing the Stress Test
2. Learn the procedure of stress test
3. Do the Stress Test
Purpose of Stress Testing
Stress testing (sometimes called torture testing) is a form of deliberately intense or thorough testing
used to determine the stability of a given system or entity. It involves testing beyond normal operational
capacity, often to a breaking point, in order to observe the results. Reasons can include:
to determine breaking points or safe usage limits
to confirm intended specifications are being met
to determine modes of failure (how exactly a system fails)
to test stable operation of a part or system outside standard usage
Reliability engineers often test items under expected stress or even under accelerated stress in order to
determine the operating life of the item or to determine modes of failure.
The term "stress" may have a more specific meaning in certain industries, such as material sciences,
and therefore stress testing may sometimes have a technical meaning – one example is in fatigue testing
for materials.
Stress testing, in general, should put computer hardware under exaggerated levels of stress in order to
ensure stability when used in a normal environment. These can include extremes of workload, type of
task, memory use, thermal load (heat), clock speed, or voltages. Memory and CPU are two components
that are commonly stress tested in this way.
There is considerable overlap between stress testing software and benchmarking software, since both
seek to assess and measure maximum performance. Of the two, stress testing software aims to test
stability by trying to force a system to fail; benchmarking aims to measure and assess the maximum
performance possible at a given task or function.
When modifying the operating parameters of a CPU, such as temperature, overclocking, underclocking,
overvolting, and undervolting, it may be necessary to verify if the new parameters (usually CPU core
voltage and frequency) are suitable for heavy CPU loads. This is done by running a CPU- intensive
program for extended periods of time, to test whether the computer hangs or crashes. CPU stress
testing is also referred to as torture testing. Software that is suitable for torture testing should typically
run instructions that utilise the entire chip rather than only a few of its units. Stress testing a CPU over
the course of 24 hours at 100% load is, in most cases, sufficient to determine that the CPU will function
correctly in normal usage scenarios such as in a desktop computer, where CPU usage typically
fluctuates at low levels (50% and under).
Hardware stress testing and stability are subjective and may vary according to how the system will be
used. A stress test for a system running 24/7 or that will perform error sensitive tasks such as
distributed computing or "folding" projects may differ from one that needs to be able to run a single
game with reasonably reliability.
While the computer could be stable enough to run normally, you never know if it's stable enough to run
properly. It could give out on you at the worst time.
Also, it's to test temperatures, running it at 100% lets you know how much temperature head room you
have, how capable your cooling is. Gotta factor in running video cards at 100% also to make sure your
case can dispense heat.
To ensure the reliability and stability of your system. Even if a computer boots up and performs well
under normal usage, fickle hardware can cause woes when you step up to heftier tasks, such as gaming
or video editing. Stress-testing software places your components under an intense workload to simulate
a worse-case scenario; if a component crashes, hangs, or otherwise fails a dedicated stress test, there's
a good chance that it won't be reliable under a heavy everyday load. It's best to uncover unstable
75
components sooner rather than later, while they're still under warranty.
Running stress tests can also let you know if you need additional cooling in your computer. If a
graphics card or overclocked CPU consistently overheats and shuts down during a stress test, it's time
to dump the stock cooler, add a few case fans, and possibly even consider liquid cooling.
1. HeavyLoad
HeavyLoad is a utility that aims to stress the main component areas of a PC, namely processor,
memory, hard drive and graphics. It can also run these tests individually or altogether which is
obviously the time maximum stress will be placed of the system hardware and also the power supply.
The Disk space and Free memory tests are not really there to put undue stress on those components,
but rather continually writes a large file to the drive and allocates / deallocates memory to the system
simulating heavy load when all major components are utilized.
There is an option though to add more stress to the hard drive by using Jam software’s other popular
included tool Treesize Free to simulate more heavy disc access. HeavyLoad is available as portable and
installer versions and is a very useful overall system stability tester to keep in the USB toolkit.
2. FurMark
Furmark is a stability and stress testing tool designed especially for graphics cards and runs a very
intensive “Fur” rendering algorithm which is very good at pushing the GPU to its absolute limits. There
are a few settings that can be changed such as resolution, full screen mode and anti-aliasing, and a few
presets are available such as running in the HD resolutions of 720 / 1080, or running a burn-in test for
15 minutes. The benchmark’s default run time and an alarm for the maximum allowable temperature
for the graphics card is found via the Settings window.
76
Benchmark scores can be compared or viewed online. FurMark is compatible with Windows XP and
above.
3. StressMyPC
This is a simple, tiny and portable utility of around 20KB that can run a stability test on your single,
multi core or multi-threaded processor. In addition, it can also perform a couple of other tests such as
a simple GPU graphics test and also one for the hard drive. The “Paint-Stress” GPU test is enabled by
default and the “HD-test” and a more aggressive CPU test which will push your processor towards
100% (the standard test used about 60% of a dual core CPU during testing) can be enabled by the
buttons at the top of the window. StressMyPC works on all versions of Windows 2000 and above,
including 64-bit.
System Stability Tester works by simply using the well-known and famous method of telling the
computer to calculate the value of Pi up to 128 million digits. This will completely consume your
processor for as long as the test runs and can also be used as a basic benchmarking tool to see how
long it takes your CPU to calculate the specified number of digits. The range can be between 128
thousand up to 128 million and can be run continuously up to
50 times using up to 32 threads. There are 2 methods to choose from, Borwein and Gauss-Legendre
which is also used by the classic SuperPi tool.
Works on Windows XP and above, portable and installer versions are available.
77
5. IntelBurnTest
Despite the name, IntelBurnTest actually works fine for testing on AMD processors as well, and is
called as such because it makes use of the Intel Linpack libraries which Intel themselves use to
stress test CPU’s. Usage is easy and all you have to do is set the number of times to run the test,
the number of threads to use and the test stress level. This can be Standard, High, Very High or
Maximum and if your available RAM is less than what the test requires, choose Custom and set
the amount of memory to use accordingly.
Known as a hardware information and benchmarking tool, Sandra also has the option to run a Burn-in
test from the Tools options. This is achieved by simply running a number of the benchmark tests
continuously placing good amounts of stress on the system. Several tests are available including a
number of processor, graphics, memory, physical disk, optical drive and network tests. These tests can
then be executed for a set time or for a specified number of loops. The stability testing component of
Sandra is certainly powerful but also slightly complicated if you just want to run a quick and simple
test. Works on all Windows from 2000 to 8.
78
7. OCCT
OCCT is a tool that is known to put serious amounts of stress on your system components, and is
especially good at severely stressing your power supply. There are rumors it can even kill poor quality or
cheap PSU’s so is obviously a utility to be used with great care. CPU tests include an OCCT test and a
LinPack test similar to IntelBurnTest, a GPU test and the mentioned power supply test. There is also a
useful temperature and voltage monitoring window where you can keep an eye on the values during any
of the tests.
Comprehensive suite for stress and stability testing a number of different system components. These
include processor, hard disc drives, memory, optical drives, sound cards, 2D /3D / video graphics,
network connection and printers. The more expensive Pro version uses plugins that can also test
keyboards, ports (parallel, Firewire and USB etc) and modems.
79
9. Prime95
Prime95 is a tool used extensively by users who overclock their systems and is often run for several
hours pushing the CPU to its limits during that time. This is due to Prime95’s high reliance on the
CPU’s Floating Point Unit for most of its running which keeps the stress levels and temperatures very
high during use. On starting the tool, it will ask if you want to run a torture test and what intensity if
so. This ranges from Small FFT which stresses mainly the CPU, to the Blend test that puts a good deal
of stress on most related hardware components. Prime95 often needs to be used for at least 10 hours to
get the best results. It’s portable and works on Windows 95 and newer.
10. LinX
LinX is another small and portable tool that runs a stress test on your processor using Intels LinPack
libraries. Just set the problem size to the desired value and the amount of memory to be allocated will
be automatically set. Or for maximum stress simply press the All button to allocate all available memory
to the task. Then set the Run value which can be either number of runs or minutes. LinX can also grab
some temperatures, voltages and fan speeds from Everest and SpeedFan if they are installed. LinX is
portable and has separate 32-bit and 64-bit versions in the archive.
Important:
Stress testing your computer components is not something that should be performed often and is only
really meant to help identify hardware faults by placing excessive stress on them. Or it is used to fully
stress a new build or system to make sure all components are working 100% reliably. This does mean a
computer is more likely to encounter shutdowns, reboots or crashes during a stress / stability test as
any weaknesses are uncovered and components are pushed to their limits.
It’s also NOT a good idea to test a hard drive if you suspect it has any kind of problem because a stress
test will increase the speed at which the drive might fail. Backing up is therefore recommended before
running tests on any drives that hold important data. A hardware monitoring utility is important to use
as well so you can monitor system temperatures, fan speeds and voltages while the stability tests are
being performed, and you can stop the test if you identify a heat or fan problem etc.
80
Perform Task Sheet CO1.5-2
Tools & Equipment : 1 Set of PC with OS, External / Flash drive with
different Application Software
Steps/Procedure:
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
1. Prepare the necessary tools and equipment
81
INFORMATION SHEET C01.5-3
Tools, Materials, Equipments & Testing Devices Maintenance
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Importance of Maintaining the Tools & Equipment, Materials, and Testing device.
2. Do the Maintenance protocol
Importance of Maintaining the Tools & Equipment, Materials and Testing Devices
It is part of our responsibility to secure every Tools & Equipment, Materials, and Testing device well,
organized and maintained them in good working condition. They should be stored in a separate secure
place so that they are safe and easy to find. This is usually best done in a place which is separate from
the office like a tool room.
Lost tools are expensive to replace and much time can be wasted if they are not available and ready to
use when needed.
It is usual for those who have responsibility for looking after tools, equipment and materials to keep an
inventory (list) of these things.
We should check off the inventory regularly and if any items have been loaned out and not returned,
he/she must get them back. Breakages and losses and materials which have been used up should be
reported to superiors and requests made to replace them.
It is a good idea to have a tool box equipped with the necessary partitions for the tools and materials
(screws of different types etc.) ready to be picked up and taken to a job.
Driving tools
With simple regular maintenance, damage to screw heads can be minimized and damage to watch
plates and cocks will not occur due to screwdrivers slipping off screw heads. Every week or two of
regular use, examine the tips of your screwdrivers under a strong loupe. Any distortion or chipping will
be immediately evident. Often, only a simple touch-up on the oilstone is all that is needed to bring them
back to good condition. Such regular inspections and repairs will mean much longer screwdriver life, no
damaged screws, and a sense of pride in working to a high standard.
The general rule in selecting the correct screwdriver for any particular screw is to choose one with a
blade width equal to the diameter of the screw. That way, the torque is distributed across as much slot
as possible, minimizing the possibility of burring up the slot and disfiguring it.
Finally, only use your screwdrivers for the purpose they were intended and they will serve you well!
Soldering Tools
Most iron tips today are a copper core surrounded by iron, hence the term ‘iron clad’ that is then nickel
or chrome plated. Because solder won’t stick to nickel or chrome the plating on the chisel end of the tip,
(where you melt the solder) is removed to expose the iron cladding. Solder does stick to iron. To keep the
tip from rusting you must keep it coated with a layer of tin, hence the term tinning. This is why solders
used in stained glass are a mixture of tin and other metals (generally lead).
:You will extend the life and improve the performance of your soldering iron and tips
by following a few simple guidelines
Always place your soldering iron in a stable iron stand whether it is being used or not.
Make sure you plug the iron into the correct type of outlet with the proper voltage.
Try not to use an extension cord. If you must, use a heavy duty one.
Regularly check the cord for burns or cracks and have a professional electrician replace worn
cords before using. Make sure that the cord is not hanging in such a way that it comes under
the hot tip or can be pulled off the work surface and pull the iron with it.
Don’t drop or bang the iron. Ceramic heaters are especially easy to crack or break.
Do not allow the iron to idle at operating temperatures for extended periods. This could burn out
the element or even the iron. If you are using a rheostat, turn it down to a low “idle” setting. If
not, unplug the iron.
82
Occasionally, remove the tip and lightly tap the barrel of wire wound heater irons to remove debris.
If you will not be using your iron and tips for an extended period of time, you may want to store it
(after it has fully cooled) in a reseal able bag to protect it from corrosion and humidity.
Using a quality solder will go a long way to keeping your tip working properly. Impurities in the
metals used to make the solder will collect on the iron tip as you work. This causes the tip to work
less efficiently, degrades the surface, and requires more frequent cleaning.
Keep the tip clean while you work. Have a damp sponge handy to occasionally wipe your tip on
while soldering to remove residues that collect. A properly cleaned tip is bright and shiny. Keeping
the tip clean is important but constantly wiping it on a wet sponge can cause early tip failure.
Excessive wiping causes the tip temperature to repeatedly rise and fall (cycle) and the different
metal layers in the tip to repeatedly expand and contract. This leads to metal fatigue and ultimately
tip failure where the copper core bubbles out. There are brass wool coils that are used like a sponge
to wipe the tip off on as you solder and will not cool the tip.
If your tip becomes blackened and will not come clean after wiping on a damp sponge or brass pad,
you might try a tinning block or a soft brass brush or brass wool. A tinning block (sal-ammoniac) is
used by placing a small amount of flux on the block and rubbing the tip of your hot iron in it then
wipe the tip on a damp sponge to remove debris. You may need to repeat this several times if your
tip is very dirty. Once the tip is clean reflush it with a high tin content solder.
Care should be taken as the block is abrasive and excessive use can wear away the iron cladding,
exposing the copper core and make the tip unusable. You can try brass wool or a soft brass brush
as an alternative.
Avoid the practice of dipping your tip into flux in order to clean it. Flux is corrosive.
Never use sandpaper or any abrasive material to clean a tip. The best way to minimize your tip
maintenance is to use a good quality solder, one that has a high tin content and high metal purity.
At the end of a soldering session, wipe the tip clean, flood the tip with solder (63/37 or 60/40 is
best), wipe it again and then unplug the iron. This will flush and re-tin your tip, protecting it
from oxidation and corrosion.
Prevent the tip from seizing (becoming stuck) in the barrel by loosening the nut or screw that
secures it. This is an especially good practice when storing your iron. If you find the tip has become
stuck in the iron barrel it is best to return it to the manufacturer for removal as you can easily
damage the irons heating element trying to remove it.
Splicing Tools
It’s just simple and easy to maintain different Splicing and Wire Cutters pliers. Just make sure that the
toothed jaws are clean and sharp. Greasy or worn down jaws can result in compromised safety. Such
tools also require increased force to hold the work piece which, in turn, increases the risk of muscular
fatigue and repetitive strain injuries.
Oil pliers and wire cutters regularly. A drop of oil on the hinge will make the tools easier to use. You can
also use WD40 for best result.
Do not use pliers to do another tool’s job. We’re all probably guilty of using pliers as a hammer
at some point, but doing so may lead to damaging your tools and your work, as well as
potentially injuring yourself.
Never try to use pliers beyond their ability. Trying to bend stiff wire with light-duty pliers may
spring or break them. Stronger, blunt nose pliers are more suitable for this task. Also, don’t
exceed the length of the pliers’ handles. Larger pliers may be needed if the handles do not extend
as far as the task calls for.
Do not expose pliers to excessive heat. Because pliers are sensitive to high heat, your tool may
be destroyed if placed under direct flames.
Always cut at right angles, not side to side. By rocking the pliers from side to side when cutting
wire or bending the wire against the cutting knives, you may dull or nick the cutting edges. If
you have trouble cutting, try sharpening the knives or using pliers with greater leverage.
Be sure the type of pliers match the application. Unless your pliers are specifically designed to
cut hardened wire, do not use ordinary pliers to do so.
Always protect your eyes before cutting wire or metal. Wearing approved eye wear such as
goggles, a face mask, or another protective device is a must when using pliers for cutting wire.
Do not use pliers on live electrical circuits. Comfort grips or plastic- dipped handles are not
designed to protect the user from electric shock. If there is a chance that the tool will touch an
energized source, be sure to only use insulated tools.
Oil pliers to maintain life and value. You can lengthen the life of your tool by occasionally
putting a drop of oil at the joint of the pliers. This will also allow for easy operation.
83
Cutting Tools
Cutting tools of all types need to be cleaned to remove any bacteria forming, and remain sharp enough
for their intended use. They require special handling and care, depending on the type of cutting tools
and their various uses.
Wipe the knife clean right after each use. Don't let any stain dry on the blade. Lay the blame on a flat
surface. With a cloth dump into hot, carefully wipe one side, then flip the knife over and wipe the other
side until no traces of stains is seen. Remember to dry the knife off completely to avoid rusting or you
may use oil wipe onto the blade to prevent it from rusting.
Place the item you wish to cut on a flat, stable surface. Be sure the object will not slip or wobble
because that can cause you to lose control of the knife and cut yourself.
Press the button down on the knife and slide to expose the blade to your desired length. Always
point the knife away from you when you are exposing the blade. Do not expose more of the blade
than necessary when you are cutting because the pressure on the blade can cause it to snap.
Stabilize the item you are cutting with your non-cutting hand. Do not put your hand near the
area where you will be using the blade to avoid cutting yourself. Keep the item you are cutting
stable so that the blade does not slip, causing you to accidentally cut yourself.
Press the button and retract the blade. The blade should not be exposed when you are not using
it.
Testing Devices
An Analog Multimeter Tester as long as it has not been abused it should last indefinitely. You need to
replace the batteries periodically, and before they leak. Checking calibration against a known accurate
meter and making some adjustments if necessary is a good idea. Just always keep it in a proper place
away from any liquid.
Cleaning Materials
Just always keep them away from your Tools, Equipment and Testing Devices especially if it is made of
liquid. Right after using them wipe and close the lid and store them in a proper place.
84
Perform Task Sheet CO1.5-3
Steps/Procedure:
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
1. Prepare the necessary tools and equipment
85
INFORMATION SHEET C01.5-4
Findings and Recommendation Documentation
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Document any Findings and Recommendation as observe to the assembled computer
system as per PC
Steps/Procedure:
Assessment Method:
Demonstration
Interview
CRITERIA YES NO
Did you….
1. Prepare the necessary tools and equipment
87
COMPUTER
SYSTEMS
SERVICING NC II
1
INSTALL AND
CONFIGURE
COMPUTER
SYSTEMS
_________________
______________
88