Grade 9 ICT CSS LAS
Grade 9 ICT CSS LAS
COPYRIGHT PAGE
INFORMATION AND COMMUNICATIONS TECHNOLOGY
Computer Systems Servicing NCII
Learning Activity Sheets
(Grade 9)
Copyright © 2020
DEPARTMENT OF EDUCATION
Regional Office No. 02 (Cagayan Valley)
Regional Government Center, Carig Sur, Tuguegarao City, 3500
“No copy of this material shall subsist in any work of the Government of the
Philippines. However, prior approval of the government agency or office wherein the
work is created shall be necessary for exploitation of such work for profit.”
Developer Team
Writers : MARK ANTHONY M. FERNANDEZ, Teacher I, Maddela CHS
: JIMMY F. CABUNGCAL, Teacher II, Maddela CHS
Content Editor : ELIZABETH C. SORIANO, Principal IV, Maddela CHS
Language Editor : SHERLY C. CAINGUITAN PhD, Education Program Supervisor - English, SDO Quirino
: FE G. BUCCAHAN PhD, Education Program Supervisor -Filipino, SDO Quirino
: RONNIE F. TEJANO, Education Program Supervisor-CLMD, English, DepEd R02
Illustrators
Layout Artists : MARK ANTHONY M. FERNANDEZ, Teacher I, Maddela CHS
: JIMMY F. CABUNGCAL, Teacher II, Maddela CHS
: RODERIC B. GUINUCAY, Education Program Supervisor-CLMD, ALS, DepEd R02
Focal Persons : LESLIE S. DOMINGO, Education Program Supervisor–CLMD, EPP/TLE, DepEd R02
: RIZALINO G. CARONAN, Education Program Supervisor–CLMD, LRMDS, DepEd R02
: ESPERANZA T. VALDEZ PhD, Education Program Supervisor–MAPEH, SDO Quirino
: FELIMENDO M. FELIPE, SEPS, HRD, OIC LR Supervisor, SDO Quirino
ii
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: ___________________________________________ Level: _______________
Section: ___________________________________________ Date: _______________
1
Note: Practice Personal Hygiene protocols at all times.
While you work, periodically touch an unpainted metal surface on the computer
chassis to dissipate any static electricity that might harm internal components.
Also, it is recommended that you periodically review the safety instructions in your
System Information Guide.
➢ Plan unit assembly to ensure OHS policies and procedures are followed in accordance
with systems requirements.
➢ Prepare unit assembly to ensure OHS policies and procedures are followed in
accordance with accordance with systems requirements.
2
Note: Practice Personal Hygiene protocols at all times.
Activity 1
Direction. Read the following statements carefully and write response on the space
provided.
1) While you are working in a Computer Laboratory at school, what do you think is
the most common Occupational Health and Safety (OHS) policies and procedures
that may apply while you are working in the computer laboratory?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
2) Why do you need to follow the basic safety guidelines in your Computer Laboratory?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
3
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. See the warning below and think of Occupational Health and Safety policies and
procedures when encountered such event in your daily task or routine. Write your answer on
the space provided.
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
Activity 3
Direction. Write TRUE if the statement is correct otherwise write FALSE if the statement is
incorrect. Write your answer on the space provided.
_____________1. Computer equipment can be dangerous to you and others, it can
injure or even kill you if you do not follow proper safety guidelines
when working along with PC’s.
_____________2. Before touching anything inside your computer. Touch a painted
metal surface on the chassis, such as the metal around the card-slot
openings at the back of your computer can not discharge static
energy.
_____________ 3. When you are working inside any computer- related equipment, it is
necessary to remove all jewelry to prevent electric shocked.
____________4. You do not need to use brush, compressed air, or blower in cleaning
the computer system.
_____________5. Wearing shoes with conductive rubber soles to help reduce the
chance of being shocked or seriously injured in an electrical accident.
4
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that ___________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
References:
5
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
1. Answers may vary
✓ Do not work alone so that there is someone who can take care of you in case of
emergency.
✓ Always power off the computer and unplug the computer before working on it.
✓ Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.
✓ Be careful with tools that may cause short circuit.
✓ Always wear personal protective equipment (PPE) in accordance with the
organization's OHS procedures and practices.
✓ Contingency measures during workplace accidents, fire and other emergencies are
recognized.
Activity 2
Answers may vary
Activity 3
1.TRUE
2.FALSE
3.TRUE
4.FALSE
5.FALSE
Prepared by:
6
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: ___________________________________________ Level: _______________
Section: ___________________________________________ Date: _______________
After reading this information, you must be able to identify the Basic Terms,
Concepts, Functions, and Characteristics of PC Hardware Components.
Types of Computer Systems
IMAGE
DESCRIPTION
1. A workstation is a high-end personal computer
designed for technical or scientific applications.
Intended primarily to be used by one person at a
time, they are commonly connected to a local area
network and run multi-user operating systems.
7
Note: Practice Personal Hygiene protocols at all times.
5. Netbooks are mini notebooks that are rapidly
evolving category of small, light, and inexpensive
laptop computers suited for general computing and
accessing web-based applications. These are often
marketed as "companion devices," that augment a
user's other computer access.
8
Note: Practice Personal Hygiene protocols at all times.
Computer Hardware and Peripherals
Scanner Speakers
Motherboard Printer
Computer case
A computer case is the enclosure that
contains the main components of a
computer. Cases are usually constructed
from steel or aluminum, although other
materials such as wood and plastic have
been used. Cases can come in many
different sizes, or form factors.
9
Note: Practice Personal Hygiene protocols at all times.
Processor
The central processing unit, or CPU, is that
part of a computer which executes software
program instructions. In older computers this
circuitry was formerly on several printed
circuit boards, but in PCs is a single
integrated circuit. Nearly all PCs contain a
type of CPU known as a microprocessor.
with a fan attached via heat sink.
Motherboard
The motherboard, also referred to as
system board or mainboard, is the
primary circuit board within a personal
computer.
Main memory
A PC's main memory is fast storage that is
directly accessible by the CPU and is used to
store the currently executing program and
immediately needed data.
Hard disk drive
Mass storage devices store programs
and data even when the power is off;
they do require power to perform read
and write functions during usage.
Although flash memory has dropped in
cost, the prevailing form of mass storage
in personal computers is still the hard
disk.
Video Card
The video card - otherwise called a graphics
card, graphics adapter or video adapter -
processes and renders the graphics output
from the computer to the computer display,
and is an essential part of the modern
computer.
Visual display unit
A visual display unit (or monitor) is a
piece of electrical equipment, usually
separate from the computer case, which
displays viewable images generated by a
computer without producing a
permanent record.
10
Note: Practice Personal Hygiene protocols at all times.
Keyboard
In computing, a keyboard is an arrangement
of buttons that each correspond to a
function, letter, or number. They are the
primary devices of inputting text.
Mouse
A Mouse on a computer is a small,
slidable device that users hold and slide
around to point at, click on, and
sometimes drag objects on screen in a
graphical user interface using a pointer
on screen.
Other Components
Mass storage
All computers require either fixed or
removable storage for their operating
system programs and user generated
material.
Formerly the 5¼ inch and 3½ inch floppy
drive were the principal forms of
removable storage for backup of user files
and distribution of software.
Computer Communications
• Internal Modem Card
• External Modem
• Network Adapter Card
• Router
• Wifi Router
LAN Card – is a network interface card.
This is a computer circuit board or card
that is installed in a computer so that it
can be connected to a network.
MODEM - (MOdulator-DEModulator)
The modem is a device that allows a given
computer to share data or otherwise a
device which let computers exchange
information
11
Note: Practice Personal Hygiene protocols at all times.
A wireless router is a device that
performs the functions of a router and also
includes the functions of a wireless access
point. It is used to provide access to the
Internet or a private computer network.
Depending on the manufacturer and
model, it can function in a wired local area
network, in a wireless-only LAN, or in a
mixed wired and wireless network.
12
Note: Practice Personal Hygiene protocols at all times.
Flash drive – is a small, ultra-portable
storage device which, unlike an optical
drive or a traditional hard drive, has no
moving parts. Flash drives connect to
computers and other devices via a built-in
USB Type-A or USB-C plug, making a
flash drive a kind of combination USB
device and cable.
Video Camera - camera using
videotape: a camera that records onto
videotape
13
Note: Practice Personal Hygiene protocols at all times.
Barcode reader - (or barcode scanner) is
an optical scanner that can read printed
barcodes, decode the data contained in
the barcode and send the data to a
computer. Like a flatbed scanner, it
consists of a light source, a lens and a
light sensor translating for optical
impulses into electrical signals.
There are still other peripherals or hardware that can be attached to computer
systems. You can also attach smartphone or other gadgets wirelessly to computer
systems.
Activity 1
Direction. Rearrange the jumbled words and describe them in your own words.
1.
__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
2.
__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
3.
__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
14
Note: Practice Personal Hygiene protocols at all times.
4.
__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
5.
__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
Activity 2
15
Note: Practice Personal Hygiene protocols at all times.
Activity 3
Direction. Put an arrow to an object which do you think it belongs inside the Tower
Case of Computer System.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
16
Note: Practice Personal Hygiene protocols at all times.
2. I need to know more about ______________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
___________________________________________________________________
References:
17
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
1. WORKSTATION - they are commonly connected to a local area network and run
multi-user operating systems.
2. LAPTOP - a small personal computer designed for portability.
3. HOME THEATER - a television-sized computer displays
and is often used as a digital photo, music, video player, TV receiver and digital
video recorder.
4. NETTOP - a low-cost, lean-function, desktop computers.
5. POCKET PC - a handheld-sized computer (personal digital assistant) that runs the
Microsoft
Activity 2
Answers may vary
1. The difference between the two PC is All-in-one pc integrates the computer
case and system components into the monitor so that the entire PC is
contained all in one unit Desktop pc has large vertical tower cases to small
form factor models that can be tucked behind an LCD monitor.
2. An ultra-mobile pc is a small and a low voltage form factor of tablet PCs. It
has keyboard, trackpad and camera.
3. Most widely used pc nowadays is LAPTOP/DESKTOP due to less
expensive, easy to use, and easy to maintain.
Activity 3
Prepared by:
18
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________
19
Note: Practice Personal Hygiene protocols at all times.
Cutter- a tool used in cutting wires.
8.
20
Note: Practice Personal Hygiene protocols at all times.
Activity 1
Direction. Read the statement carefully, choose the right answer and write the
correct letter on the space provided.
_____1. John is measuring a voltage of a power supply, what tool should he used to
measure the voltage?
a. Soldering Pencil b. Desoldering tool
c. Thermal paste d. Multimeter
_____ 2. Anton is cleaning a motherboard, what appropriate tool he needs to use?
a. Lens Cleaner b. Magnifier
c. Paint Brush d. Goggles
_____ 3. What tool is used to unsolder unwanted parts or component in the
circuit with the support of soldering pencil is called __________________.
a. Soldering Pencil b. Desoldering tool
c. Thermal Paste d. Pliers
_____ 4. Jim is cutting wires to use for network cabling, what proper tool used for
cutting or trimming of connecting wires or terminal leads in the circuit board
a. Pliers b. Soldering pencil
c. Side cutter pliers d. Long nose pliers
_____ 5. Which tool you need to used when you fasten a negative slotted screw?
a. Flat Screw Driver b. Philips Screw Driver
c. Tweezer d. Plier
_____ 6. What Protective tool will you use when you are cleaning dust?
a. Gloves b. Anti-static wrist strap
d. Goggles d. Paint Brush
_____ 7. When you removing component of a computer, what tool should you use
to hold the small parts?
a. Pliers b. Tweezer
b. Side Cutter d. Long nose plier
_____ 8. Nico has problem seeing small objects, what appropriate tool should he
used?
a. Flashlight b. Goggles
b. Tweezer d. Magnifier
_____ 9. When you seating back the processor, what material you used to
dissipate the heat of processor.
a. Lens Cleaner b. Spray
c. Thermal Paste d. Soldering pencil
_____ 10. What is the appropriate tool used to eliminate the static charge when
holding computer parts?
a. Anti-static Mat b. Anti-static Wrist strap
b. Goggles d. Gloves
21
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. Identify and give the usage of appropriate tool used for
troubleshooting a computer components. Write your answer on the space
provided in the table.
2. DVD ROM
3. Graphics Card
4. Processor
Activity 3
Direction. Answer the following questions.
2. Explain why you need to use anti-static tool when holding electronic parts of
a computer system?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
22
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
23
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
1. D
2. C
3. B
4. C
5. A
6. D
7. B
8. D
9. C
10. A
Activity 2
1. Paint Brush - use for cleaning sensitive parts of a computer components.
2. Lens cleaner – use for cleaning optical media, such as DVD- ROMS and
CD-writers.
3. Anti-static wrist strap, mat - are used to eliminate electrostatic discharge
4. Thermal paste- a paste used for heat dissipation for your processor.
Activity 3
Answers may vary
1. When putting a thermal paste to the processor, it will dissipate the heat of
processor.
2. We need to use anti-static tool, to eliminate the static charge and prevent
damage when holding electronic computer parts.
Prepared by:
24
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________
26
Note: Practice Personal Hygiene protocols at all times.
Install RAM
RAM provides temporary data storage for the
CPU while the computer is operating. RAM should be
installed in the motherboard before the motherboard is
placed in the computer case.
RAM installation steps:
1. Align the notches on the RAM module to the
keys in the slot and press down until the side
tabs click into place.
2. Make sure that the side tabs have locked the
RAM module and visually check for exposed
contacts.
Install Motherboard
1. Install standoffs in the computer case.
2. Align the I/O connectors on the back of the
motherboard with the openings in the back of
the case.
3. Align the screw holes of the motherboard with
the standoffs.
4. Insert all the motherboard screws.
5. Tighten all screws on the motherboard
Note: Drill a hole as needed for the screw.
The Motherboard
The motherboard is now ready to install in the
computer case.
Plastic and metal standoffs are used to mount the
motherboard and to prevent it from touching the metal
portions of the case.
Install only the standoffs that align with the holes
in the motherboard.
Installing any additional standoffs may prevent
the motherboard from being seated properly in the
computer case.
Drives that are installed in internal bays are called
internal drives.
A hard disk drive (HDD) is an example of an
internal drive.
HDD installation steps:
1. Position the HDD so that it aligns with the 3.5-
inch drive bay.
2. Insert the HDD into the drive bay so that the
screw holes in the drive line up with the screw
holes in the case.
Secure the HDD to the case using the proper
screws.
27
Note: Practice Personal Hygiene protocols at all times.
Install Drives in External Bays
Drives, such as optical drives (CD and DVD) and
floppy drives, are installed in drive bays that are
accessed from the front of the case.
Optical drives and floppy drives store data on
removable media.
Drives in external bays allow access to the media
without opening the case
28
Note: Practice Personal Hygiene protocols at all times.
Install the Network Interface Card (NIC)
A NIC enables a computer to connect to a network.
NICs use PCI and PCIe expansion slots on the
motherboard.
NIC installation steps:
1. Align the NIC to the appropriate slot on the
motherboard.
2. Press down gently on the NIC until the card is
seated.
Secure the NIC PC mounting bracket to the case
with the appropriate screw.
Install the Wireless NIC
A wireless NIC enables a computer to connect to a
wireless network. Some wireless NICs are installed
externally with a USB connector.
Wireless NIC installation steps:
1. Align the wireless NIC to the appropriate
expansion slot on the motherboard.
2. Press down gently on the wireless NIC until the
card is fully seated.
Secure the mounting bracket to the case with the
appropriate screw.
Install the Video Adapter Card
A video adapter card is the interface between a
computer and a display monitor. An upgraded video
adapter card can provide better graphic capabilities for
games and graphic programs.
Video adapter card installation steps:
1. Align the video adapter card to the appropriate
expansion slot on the motherboard.
2. Press down gently on the video adapter card
until the card is fully seated.
Secure the video adapter card PC mounting
bracket to the case with the appropriate screw.
29
Note: Practice Personal Hygiene protocols at all times.
Motherboard Power Connections
The Advanced Technology Extended (ATX) main
power connector has either 20 or 24 pins.
The power supply may also have a 4-pin or 6-pin
Auxiliary (AUX) power connector that connects to the
motherboard.
A 20-pin connector will work in a motherboard
with a 24-pin socket.
Connect Power Cables
• ATA Power Connectors use a 15-pin connector
to connect to hard disk drives, optical drives, or
any devices that have a SATA power socket.
• Molex Power Connectors are used by hard disk
drives and optical drives that do not have SATA
power sockets.
• CAUTION: Do not use a Molex connector and
a SATA power connector on the same drive at
the same time.
• 4-pin Berg Power Connector supplies power to
a floppy drive.
Power Connector Installation Steps
1. Plug the SATA power connector into the HDD.
2. Plug the Molex power connector into the optical
drive.
3. Plug the 4-pin Berg power connector into the
FDD.
4. Connect the 3-pin fan power connector into the
appropriate fan header on the motherboard,
according to the motherboard manual.
Plug the additional cables from the case into the
appropriate connectors according to the motherboard
manual.
PATA Cables
• Drives connect to the motherboard using data
cables.
• Types of data cables are PATA, SATA, and
floppy disk.
• The PATA cable (sometimes called a ribbon
cable) is wide and flat and can have either 40 or
80 conductors.
• A PATA cable usually has three 40-pin
connectors.
• If multiple hard drives are installed, the master
drive will connect to the end connector.
30
Note: Practice Personal Hygiene protocols at all times.
• The slave drive will connect to the middle
connector.
• Many motherboards have two PATA cable
sockets, which provides support for a maximum
of four PATA drives.
SATA Cables
• The SATA data cable has a 7-pin connector.
• One end of the cable is connected to the
motherboard.
• The other end is connected to any drive that has
a SATA data connector.
33
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. PA-HELP - How to build a PC - Part 1 - Choosing the parts (IN TAGALOG!)
https://www.youtube.com/watch?v=34vFyKWC7cE
6. PA-HELP - How to build a PC - Part 2 (IN TAGALOG!)
https://www.youtube.com/watch?v=5Tkgac1W79Q
7. How to Upgrade CPU Cooler // How to Replace CPU Cooler or Heatsink
https://www.youtube.com/watch?v=TiHZoyqINgw
34
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
Answers may vary
1. If you do not follow the standard procedure, you might be damaging
because of mismatch parts.
2. The most common parts that is sensitive to electrostatic discharge is the
CPPU and MOTHERBOARD.
Activity 2
1. 2
2. 1
3. 4
4. 3
5. 5
6. 7
7. 8
8. 6
Activity 3
1. CPU 8. Optical drive
2. Power Supply 9. RAM
3. SATA 10. Antistatic mats
4. Monitor
5. Floppy drive
6. Motherboard
7. Wireless NICs
Prepared by:
35
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________
Configuring BIOS
In the previous list, you saw that the BIOS checks the CMOS Setup for custom
settings. Here is what you do to change those settings.
To enter the CMOS Setup, you must press a certain key or combination of keys
during the initial startup sequence. Most systems use "Esc," "Del," "F1," "F2," "Ctrl-
Esc" or "Ctrl-Alt-Esc" to enter setup. There is usually a line of text at the bottom of
the display that tells you "Press Setup to enter." Once you have entered setup, you will
36
Note: Practice Personal Hygiene protocols at all times.
see a set of text screens with number of options. Some of these are standard, while
others vary according to the BIOS manufacturer. Common options include:
• System Time/Date - Set the system time and date
• Boot Sequence - The order that BIOS will try to load the operating
system
• Plug and Play - A standard for auto-detecting connected devices;
should be set to "Yes" if your computer and operating system both
support it
• Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard,"
"Auto-Detect Mouse"...
• Drive Configuration - Configure hard drives, CD-ROM, and floppy
drives
• Memory - Direct the BIOS to shadow to a specific memory address
• Security - Set a password for accessing the computer
• Power Management - Select whether to use power management, as well
as set the amount of time for standby and suspend
• Exit - Save your changes, discard your change, or restore default
settings
Be very careful when making changes to setup. Incorrect settings may keep
your computer from booting. When you are finished with your changes, you should
choose "Save Changes" and exit. The BIOS will then restart your computer so that
the new settings take effect.
The BIOS uses CMOS technology to save any changes made to the computer's
settings. With this technology, a small lithium or Ni-Cad battery can supply enough
power to keep the data for years. In fact, some of the newer chips have a 10-year, tiny
lithium battery built right into the CMOS chip.
Activity 1
Direction: Answer the following questions based on how you understand the BIOS.
1. Define in your own word BIOS?
_________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
Activity 2
Direction. Based on the picture below, draw the missing keyboard keys or
combination of keys which is used during the initial startup sequence when entering
a CMOS Set up.
Activity 3
Direction. Study the figure below. Write the number of the missing items in the box
inside a Bios Set-up. Choose your answer from the table.
38
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. PC BIOS Settings - https://www.youtube.com/watch?v=ezubjTO7rRI
39
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
Answers may vary
1. BIOS (basic input/output system) is the program a personal computer's
microprocessor uses to get the computer system started after you turn it on.
2. The BIOS uses CMOS technology to save any changes made to the computer's
settings.
3. BIOS manages data flow between the computer's operating system and attached
devices such as the hard disk, video adapter, keyboard, mouse and printer.
Activity 2
Most systems use "Esc," "Del," "F1," "F2," "Ctrl-Esc" or "Ctrl-Alt-Esc" to enter setup.
Activity 3
Prepared by:
40
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________
Insert your Windows DVD into the optical drive. From the command prompt, enter
the following:
• g: <enter> (Where "g" is your DVD drive letter)
• cd boot <enter> (changes to boot directory)
• G:\boot boot sect /nt60 d: <enter> (Where "d" is your USB drive letter)
Copy all files from the Windows CD to the USB flash drive using copy
• cd\ <enter>
• G:\xcopy g:\*. * /s/h/f f:\ <enter>
This will copy the Windows installation files onto the USB flash drive, it may take
several minutes.
Copy switches are as follows:
• /s - Copies directories and subdirectories except empty ones.
• /h - Copies hidden and system files.
• /f - Displays full source and destination filenames while copying.
• To display the full list of switches, type copy /? <enter>
This will make the USB drive bootable and when selected at start up, will boot
straight into the Windows installation.
42
Note: Practice Personal Hygiene protocols at all times.
Another procedure for copying files is in file explorer
Copy the operating system. Once the USB drive has been made bootable, you
can copy over the installation files for the operating system you want to install. You
can do this by dragging and dropping using your preferred file manager/explorer.
Note: You can also create a bootable USB Drive using a third-party software.
Copy over any drivers you might need during the operating system installation to
make the process much smoother. You can also create a bootable USB Drive using a
third-party software.
43
Note: Practice Personal Hygiene protocols at all times.
Activity 1
Direction. Using the diskpart method in windows command prompt complete the
cmd command for creating portable bootable flash drive. Write your answer on the
space provided.
1. _______________________________ 5. ____________________________
2. _______________________________ 6. ____________________________
3. _______________________________ 7. ____________________________
4. _______________________________ 8. ____________________________
Activity 2
Direction. Arrange the steps in creating a USB flash drive using Rufus.
______ Open the Rufus program from where you downloaded it to run it.
______ Download Rufus . Rufus is a standalone program and does not require
installation.
______ Under "Boot selection", select Disk or ISO image (Please select), if it isn't
already chosen, and then click SELECT to choose the .iso file you
downloaded
______ From the Device drop-down menu, select your USB drive, if it isn't
automatically selected.
______ Leave "Partition scheme" set to GPT.
______ Leave "Image option" set to Standard Windows installation.
44
Note: Practice Personal Hygiene protocols at all times.
______ Under "Format Options", to ensure the flash drive is compatible with UEFI,
select FAT32 for "File System".
______ For "Target system", select UEFI (non CSM).
______ When you are finished selecting options, click Start. When prompted,
confirm that you want to erase the flash disk.
______ To create the flash drive with the "Press any key to boot from USB" prompt
at startup, under the "Advanced format" options, select Create extended label
and icon files.
______ The .iso files will start copying to the flash drive; the process can take
several minutes. When Rufus is done, close the program and eject and
remove the flash drive.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
45
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
Answer key
1. diskpart
2. list disk
3. select
4. clean
5. create
6. active
7. format
8. assign
Activity 2
1. 2
2. 1
3. 4
4. 3
5. 6
6. 5
7. 8
8. 7
9. 10
10. 9
11. 11
Prepared by:
46
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________
47
Note: Practice Personal Hygiene protocols at all times.
VLC Media Player
Listening to songs and watching movies is one of the most
important things we do in our PC. So, we need a good media
player which can play almost all formats of audio and video files.
So VLC Media Player comes 2nd in the list.
48
Note: Practice Personal Hygiene protocols at all times.
Adobe Reader
uTorrent
uTorrent is a light weight and very efficient torrent client.
Adobe Photoshop/GIMP
Adobe Photoshop is a great software for editing photos, but it’s
sadly not for free, I have an alternative for this called GIMP, which
is free and very similar to Adobe Photoshop. It can also be sued to
make gifs for whoever is interested.
Reva Uninstaller
Reva Uninstaller is a freeware innovative uninstall utility
much faster than Windows Add/Remove applet. With its advanced
and fast algorithm, Reva Uninstaller performs a scan before and after
you uninstall an application.
Malware Bytes: -
Malware Bytes is a tool that quarantines and removes malicious
and infected files on your Personal Computer, and it can optimize your
PC’s performance.
49
Note: Practice Personal Hygiene protocols at all times.
Team Viewer
Team Viewer is the best software for remote desktop viewing.
You can share your desktop from anywhere in this world with this
software.
Notepad++
Notepad++ is a free source and one of the best text editors for
several programming languages under the Windows environment.
Folder Lock
Folder locker allows you to store all your files with a protected
password.
Sandboxes
This is a must have software for virus testers. If you
download any application from internet just run it in Sandboxes to
check whether it’s infected or not.
Key scrambler
In this world of the internet, you can’t always know when a
keylogger gets installed on your PC and makes you lose your
confidential passwords. Key scrambler software scrambles your keys
and helps to stay safe even if a keylogger gets installed somehow.
WinRAR
-is a 32-bit / 64-bit Windows version of RAR Archiver, the powerful
archiver and archive manager.
File Opener
File Opener is a software which can open different formats of
files. This software can fulfill the need of 10 other programs for
opening files.
VMWARE WORKSTATION
VMware helps us in installing
multiple Operating Systems over one
single Operating System. Puzzled?
Well, to simplify things, VMware
allows us to run multiple Operating
Systems (called slaves) on our
computer. Say you are having Windows
7 installed on your computer as the
main Operating System. VMware runs
as an application on Windows 7 and allows us to install other Operating Systems like
50
Note: Practice Personal Hygiene protocols at all times.
Windows XP, Linux and 20 other types of Operating Systems. So, you do not need to
boot your computer to change your OS. One VMware Workstation can
accommodate 20 such OSes.
VMware helps us in installing multiple Operating Systems over one single
Operating System. Puzzled? Well, t o simplify things, VMware allows us to run
multiple Operating Systems (called slaves) on our computer. Say you are having
Windows 7 installed on your computer as the main Operating System. VMware runs
as an application on Windows 7 and allows us to install other Operating Systems
like Windows XP, Linux and 20 other types of Operating Systems. So, you do not
need to boot your computer to change your OS. One VMware Workstation
can accommodate 20 such OSes.
DEEP FREEZE
- is a reboot to restore software application available for the
Microsoft Windows, and macOS operating systems which allows
system administrators to protect the core operating system and
configuration files on a workstation or server by restoring a computer
back to the saved configuration, each time the computer is restarted.
CYBERGHOST VPN
Are you banned from any forum? Try out this software. If you
want to surf anonymously on the web without displaying your real IP
address, you use this VPN – Cybergoth VPN. There are many other
proxy software programs on web. But none of them gives total
protection for your computer. Also, most of them are restricted to only
browser activities.
Activity 1
Direction. Name each software logo and give a short description. Write you answer
on the space provided.
1. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
2. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
3. __________________________________
____________________________________________________________________
____________________________________________________________________
___________________________________________________________________
4. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
5. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
52
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. Answer the following questions based on your knowledge.
2. What other application software are being used. List them down.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
Reflection:
Complete the statement.
What I learned in this activity_____________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
ANSWER KEY
53
Note: Practice Personal Hygiene protocols at all times.
Activity 1
1. TeamViewer - for remote desktop viewing
2. Malwarebytes - it can optimize your PC’s performance
3. Adobe Photoshop - great software for editing photos
4. Registry Cleaners/Tune up Utilities - cleans registry errors and junk files from
your PC
5. Adobe Flash Player - to watch flash videos on your computer
Activity 2
Answer may vary
1. Software is the programs that are needed to accomplish the input, processing,
output, storage, and control activities of information systems.
2. WPS office …
3. YES/NO …
Prepared by:
54
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________
55
Note: Practice Personal Hygiene protocols at all times.
And, lastly, installed programs take up space on your computer, which could
potentially cause it to run slower. By using portable apps, you’re clearing up space on
your computer and enabling every bit of your downloaded software to run faster.
Creating a portable application using Winrar
The example application I’m going to make portable is Audacity, an open source
audio editing program. You can download your own file or follow along using Audacity
(recommended for your first time) before you try this method on your own applications.
56
Note: Practice Personal Hygiene protocols at all times.
Step 5: Pack all the files into an archive
Highlight every file in that folder, right click on them, and click “Add to archive” in
the contextual menu.
In the resulting dialogue box, name your archive “Audacity Portable” or whatever
you prefer. Under compression method, select “Best”, and be sure to check “Create SFX
archive”.
Next, click the ‘Advanced’ tab and click “SFX Options…”. In “Run after
extraction” field, input the name of the .exe file that you located in Step 4. In my case, the
name was “audacity.exe”.
57
Note: Practice Personal Hygiene protocols at all times.
Head on over to the ‘Modes’ tab and select “Unpack to temporary folder” and “Hide
all”
Lastly, go to the ‘Update’ tab and select “Overwrite all files”. Now go ahead and hit
OK, and watch WinRAR generate an application file.
58
Note: Practice Personal Hygiene protocols at all times.
4. Apache OpenOffice Portable (Office Suite)
Apache OpenOffice app, which is also available for Windows, is one of the
most impressive alternatives to the Office suite, offering a word processor, spreadsheet,
presentation tool, and more. It supports many different languages including Chinese,
French, German, Italian, Portuguese, and Spanish. Best of all, it’s free, so you save
money by using it instead of the Office alternative.
5. Stickies Portable (Stickie Notes)
I’m willing to bet you already know the usefulness of sticky notes, either virtual
or physical -- when you need a quick reminder or to jot down some random thoughts,
they can’t be beat. The Portable version supplies sticky notes that can store text and
images, and you can attach a sticky note to a website or document so you can minimize
them until you need it.
Portable Apps for Mac
6. VLC Media Player Portable (Media Player)
VLC is one of the most popular media players around, largely due to its ability
to play almost any audio or video format, including WMV, MPEG-1, DivX, ogg, as
well as DVDs. Since it can handle files from almost any location, including local drives,
network storage, and streams, it’s a good idea to download the portable app for any
time you’re having trouble displaying an audio or video file on your computer. This
app is also available for Windows.
7. XMind (Mindmapping Tool)
XMind offers a variety of helpful productivity and decision-making tools for
mindmapping and diagramming, including organizational charts, tree charts, and logic
charts. Along with brainstorming templates, XMind also lets you create business charts
and presentations. It has an intuitive interface and provides easy-to-use templates.
8. Gimp (Photo Editor)
One of the most comparable alternatives to Photoshop, Gimp provides an
impressive array of photo-editing tools. Since editing and exporting images takes up a
lot of storage space, you might opt for Gimp’s portable app version to edit your photos
-- plus, it’s free. You can use it to create new designs using the paint program, or simply
convert image formats. It’s also available for Windows.
9. Inkscape (Vectors Graphic Editor)
Inkscape is essentially identical in function to Adobe Illustrator, and is an
impressive free alternative. Inkscape portable offers advanced features including alpha
blending, markers, and trace bitmaps, and has an intuitive interface. If you’re a
freelance designer, it’s not a bad idea to carry Inkscape portable around on a USB, so
you’ve got the tools for for vector graphics, creating illustrations, charts, and logos at
your disposal at all times.
Portable Apps for Windows
10. LibreOffice Portable (Office Suite)
LibreOffice, a notable Office alternative, offers many of the same features as
Office including a word processor, spreadsheets, presentations, vector drawing, and
databases. It performs most of the necessary functions you’d require from Office, but
it’s free and you can carry it around with you on an external drive or via the cloud. It
supports over ten languages.
59
Note: Practice Personal Hygiene protocols at all times.
11. CCleaner Portable (Software Cleaner)
It seems contradictory to download a large software file just to clear up space
on your computer, so it makes sense you’d use CCleaner’s portable version to clean up
your files and ensure your computer’s protected from viruses. Along with clearing up
space, CCleaner cleans out cookies and files that could put your privacy at risk.
12. Foobar2000 (Audio Player)
Foobar2000 is a media player that supports most popular audio formats, and lets you
rip audio CDs, create playlists, and play natively from within the app. It also touts an
easily customizable user interface with advanced tagging capabilities and customizable
keyboard shortcuts, allowing you to customize your user experience more than you
could with iTunes or Spotify.
13. Geek Uninstaller (Software Cleaner)
If you uninstall something using Windows' add/remove button, it isn’t
completely eliminated from your computer -- there are still junk files or folders left
behind. Geek Uninstaller permanently rids your computer of unwanted files, including
any unintentional residue left over. The app also offers a “Force removal” button for
difficult-to-remove programs. Plus, since it’s portable, it doesn't contribute to clutter.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
2. What are some issues or questions you would like to explore further?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. https://en.wikipedia.org/wiki/Portable_application
6. www.makeuseof.com/tag/create-portable-app-flash-drive
7. https://blog.hubspot.com/marketing/portable-apps
61
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
1. b
2. d
3. a
4. d
5. c
Activity 2
1. 2
2. 4
3. 6
4. 1
5. 3
6. 5
Prepared by:
62
Note: Practice Personal Hygiene protocols at all times.