0% found this document useful (0 votes)
1K views65 pages

Grade 9 ICT CSS LAS

Uploaded by

Angelito Tomas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views65 pages

Grade 9 ICT CSS LAS

Uploaded by

Angelito Tomas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

9

Republic of the Philippines


Department of Education

COPYRIGHT PAGE
INFORMATION AND COMMUNICATIONS TECHNOLOGY
Computer Systems Servicing NCII
Learning Activity Sheets
(Grade 9)
Copyright © 2020
DEPARTMENT OF EDUCATION
Regional Office No. 02 (Cagayan Valley)
Regional Government Center, Carig Sur, Tuguegarao City, 3500

“No copy of this material shall subsist in any work of the Government of the
Philippines. However, prior approval of the government agency or office wherein the
work is created shall be necessary for exploitation of such work for profit.”

This material has been developed for the implementation of K to 12 Curriculum


through the Curriculum and Learning Management Division (CLMD). It can be
reproduced for educational purposes and the source must be acknowledged.
Derivatives of the work including creating an edited version, an enhancement of
supplementary work are permitted provided all original works are acknowledged and
the copyright is attributed. No work may be derived from this material for commercial
purposes and profit.
Consultants
Regional Director : ESTELA L. CARIÑO EdD, CESO IV, DepEd R02
Assistant Regional Director : RHODA T. RAZON EdD, CESO V, DepEd R02
Schools Division Superintendent : FLORDELIZA C. GECOBE PhD, CESO VI, SDO Quirino
Asst. Schools Division Superintendent : MARY JULIE A. TRUS PhD, SDO Quirino
Chief Education Supervisor, CLMD : OCTAVIO V. CABASAG PhD, DepEd R02
Chief Education Supervisor, CID : JORGE G. SADDUL, EdD, SDO Quirino.

Developer Team
Writers : MARK ANTHONY M. FERNANDEZ, Teacher I, Maddela CHS
: JIMMY F. CABUNGCAL, Teacher II, Maddela CHS
Content Editor : ELIZABETH C. SORIANO, Principal IV, Maddela CHS
Language Editor : SHERLY C. CAINGUITAN PhD, Education Program Supervisor - English, SDO Quirino
: FE G. BUCCAHAN PhD, Education Program Supervisor -Filipino, SDO Quirino
: RONNIE F. TEJANO, Education Program Supervisor-CLMD, English, DepEd R02
Illustrators
Layout Artists : MARK ANTHONY M. FERNANDEZ, Teacher I, Maddela CHS
: JIMMY F. CABUNGCAL, Teacher II, Maddela CHS
: RODERIC B. GUINUCAY, Education Program Supervisor-CLMD, ALS, DepEd R02
Focal Persons : LESLIE S. DOMINGO, Education Program Supervisor–CLMD, EPP/TLE, DepEd R02
: RIZALINO G. CARONAN, Education Program Supervisor–CLMD, LRMDS, DepEd R02
: ESPERANZA T. VALDEZ PhD, Education Program Supervisor–MAPEH, SDO Quirino
: FELIMENDO M. FELIPE, SEPS, HRD, OIC LR Supervisor, SDO Quirino

Printed by: Curriculum and Learning Management Division


DepEd, Carig Sur, Tuguegarao City

Note: Practice Personal Hygiene protocols at all times. i


Table of Contents
COMPETENCIES PAGE NUMBER
1. Planning and Preparing Computer ………………… 1-6
Hardware Assembly
➢ Plan unit assembly to ensure OHS
policies and procedures are followed
in accordance with systems
requirements.
➢ Prepare unit assembly to ensure OHS
policies and procedures are followed
in accordance with accordance with
systems requirements.
2. Identifying and Obtaining Materials ………………… 7-19
Necessary in Computer Hardware Assembly
➢ Identify materials necessary to
complete the work in accordance with
established procedures and check
against system requirements
➢ Obtain materials necessary to
complete the work in accordance with
established procedures and check
against system requirements.
3. Obtaining Tools, Equipment and Testing ………………… 20-24
Devices in Computer Hardware Assembly
➢ Obtain tools, equipment and testing
devices needed to carry out installation
work in accordance with established
procedures and check for correct
operation and safety.
4. Assembling Computer Hardware in …………………. 25-35
Accordance with Established Procedures and
System Requirements
5. Performing Bios Configuration in …………………. 36-40
Accordance with Hardware Requirements
6. Creating Portable Bootable Devices in …………………. 41-46
Accordance with Software Manufacturer
Instruction
7. Preparing Customized Installers in …………………. 47-54
Accordance with Software Utilization Guide
and End User Agreement

8. Carrying Out Installation of Portable …………………. 55-62


Applications in Accordance with Software
User Guide and Software License

ii
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: ___________________________________________ Level: _______________
Section: ___________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS


Planning and Preparing Computer Hardware Assembly
Background Information for Learners:
After reading this information, you must be able to identify and apply OHS policies
and procedures in Computer Systems Servicing.
Occupational Health and Safety Policy
The occupational safety and health policy define the goals for the occupational health
and safety work in the workplace and for activities that promote the working capacity of the
staff. The policy also describes occupational health and safety responsibilities and the way of
organizing the cooperation measures. The preparation of the occupational safety and health
policy is based on the Occupational Safety and Health Act. The policy is employer-specific
and applies to all employers.
Safety practices should be learned early and always adhered to when working with
any electrical device, including personal computers and peripherals. This is for the protection
of not only the people working with them, but also for the devices themselves. The basis for
this process begins with your Occupational Health and Safety Policies.

Personal Safety While Working Along with PC’s


While working inside your computer, do not attempt to service the computer except
as explained in this guide and elsewhere in the product documentation. Always follow the
instructions closely.
Computer equipment can be dangerous, and you or others can be injured or even killed
if you do not follow proper safety guidelines when working along PC’s. The following are
some precautionary measures to take before working with any computer equipment:
Before you start to work on the computer, perform the following steps in the sequence
indicated:
1. Turn off the computer and all peripherals.
2. Touch an unpainted metal surface on the computer chassis, such as the metal around the
card-slot openings at the back of your computer, before touching anything inside your
computer.
3. Disconnect the computer and peripherals from their electrical outlets. Doing so reduces
the potential for personal injury or shock. Also, disconnect any telephone or
telecommunication lines from the computer. Note that before disconnecting a
peripheral from the system or removing a component from the system board, verify that
the standby power light-emitting diode (LED) on the system board has turned off.

1
Note: Practice Personal Hygiene protocols at all times.
While you work, periodically touch an unpainted metal surface on the computer
chassis to dissipate any static electricity that might harm internal components.

Also, it is recommended that you periodically review the safety instructions in your
System Information Guide.

Occupational Health and Safety Policies and Procedures


OHS or Occupational Health and Safety refers to the legislation, policies, procedures,
and activities that aim to protect the health, safety, and welfare of all people at the workplace.
1. Do not work alone so that there is someone who can take care of you in case of
emergency.
2. Always power off the computer and unplug the computer before working on it.
3. Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.
4. Be careful with tools that may cause short circuit.
5. Always ground or discharge yourself before touching any part of the computer.
6. Do not use excessive force if things do not quite slip into place.
7. Clean the area before and after using it to maintain sanitation and prevent accidents.
8. Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.
9. Always wear personal protective equipment (PPE) in accordance with the organization's
OHS procedures and practices.
10. Make sure that the pins are properly aligned when connecting a cable connector.
11. Contingency measures during workplace accidents, fire and other emergencies are
recognized.
12. Use brush, compressed air or blower in cleaning the computer system.
13. Wear shoes with non-conductive rubber soles to help reduce the chance of being
shocked or seriously injured in an electrical accident.
14. Do not work on components that are plugged into their power source.
15. Do not remove expansion cards from a computer when it is turned on.
16. Remove all jewelry when working inside any computer related equipment.
17. Be sure not to mix electronic components and water.
18. When you shut down your computer, be sure to shut it down properly.
19. Do not turn it off with the case switch.
20. Do not eat or drinks while working.

Learning Competency with Code: Assemble Computer Hardware. (TLE_IACSS9-12ICC_Ia-


e-28)

➢ Plan unit assembly to ensure OHS policies and procedures are followed in accordance
with systems requirements.
➢ Prepare unit assembly to ensure OHS policies and procedures are followed in
accordance with accordance with systems requirements.

2
Note: Practice Personal Hygiene protocols at all times.
Activity 1

Direction. Read the following statements carefully and write response on the space
provided.
1) While you are working in a Computer Laboratory at school, what do you think is
the most common Occupational Health and Safety (OHS) policies and procedures
that may apply while you are working in the computer laboratory?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

2) Why do you need to follow the basic safety guidelines in your Computer Laboratory?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________

3
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. See the warning below and think of Occupational Health and Safety policies and
procedures when encountered such event in your daily task or routine. Write your answer on
the space provided.
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________
• ___________________________________

Activity 3
Direction. Write TRUE if the statement is correct otherwise write FALSE if the statement is
incorrect. Write your answer on the space provided.
_____________1. Computer equipment can be dangerous to you and others, it can
injure or even kill you if you do not follow proper safety guidelines
when working along with PC’s.
_____________2. Before touching anything inside your computer. Touch a painted
metal surface on the chassis, such as the metal around the card-slot
openings at the back of your computer can not discharge static
energy.
_____________ 3. When you are working inside any computer- related equipment, it is
necessary to remove all jewelry to prevent electric shocked.
____________4. You do not need to use brush, compressed air, or blower in cleaning
the computer system.
_____________5. Wearing shoes with conductive rubber soles to help reduce the
chance of being shocked or seriously injured in an electrical accident.

4
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that ___________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

2. I need to know more about ______________________________________


__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

References:

1. Competency-Based Learning Module for Computer Systems Servicing NCII


2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. itopick.wordpress.com
6. Occupational safety and health-
https://en.wikipedia.org/wiki/Occupational_safety_and_health

5
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY

Activity 1
1. Answers may vary
✓ Do not work alone so that there is someone who can take care of you in case of
emergency.
✓ Always power off the computer and unplug the computer before working on it.
✓ Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.
✓ Be careful with tools that may cause short circuit.
✓ Always wear personal protective equipment (PPE) in accordance with the
organization's OHS procedures and practices.
✓ Contingency measures during workplace accidents, fire and other emergencies are
recognized.

2. Answers may vary


Basic safety guidelines should be followed to prevent cuts, burns, electrical shock,
and damage to eyesight and not to harm others.

Activity 2
Answers may vary

Activity 3
1.TRUE
2.FALSE
3.TRUE
4.FALSE
5.FALSE

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

6
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: ___________________________________________ Level: _______________
Section: ___________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS


Identifying and Obtaining Materials Necessary in Computer
Hardware Assembly
Background Information for Learners:

After reading this information, you must be able to identify the Basic Terms,
Concepts, Functions, and Characteristics of PC Hardware Components.
Types of Computer Systems
IMAGE
DESCRIPTION
1. A workstation is a high-end personal computer
designed for technical or scientific applications.
Intended primarily to be used by one person at a
time, they are commonly connected to a local area
network and run multi-user operating systems.

2. Desktop computers come in a variety of styles


ranging from large vertical tower cases to small form
factor models and usually intended to have the
display screen placed on top to save space on the
desktop. Most modern desktop computers have
separate screens and keyboards

3. Nettop is a subtype of desktop that was introduced


by Intel in February 2008 and described as low-cost,
lean-function desktop computers.

4. A laptop computer is sometimes called a notebook


computer, it usually comes in small size and
designed for portability.

7
Note: Practice Personal Hygiene protocols at all times.
5. Netbooks are mini notebooks that are rapidly
evolving category of small, light, and inexpensive
laptop computers suited for general computing and
accessing web-based applications. These are often
marketed as "companion devices," that augment a
user's other computer access.

6. A tablet PC is a notebook or slate-shaped mobile


computer that was first introduced by Pen computing
in the early 90s with their Peng Tablet Computer and
popularized by Microsoft. Its touchscreen allows the
user to operate the computer with a stylus or digital
pen, or a fingertip, instead of a keyboard or mouse.

7. The ultra-mobile PC (UMPC) is a small form


factor of tablet PCs that was developed by
Microsoft, Intel, and Samsung. It typically features
the Windows XP, Windows Vista, Windows 7, or
Linux operating system and low-voltage Intel Atom
or VIA C7-M processors.
8. A home theater PC (HTPC) is a convergence
device that combines the functions of a personal
computer and a digital video recorder. It is
connected to a television or a television-sized
computer display and is often used as a digital photo,
music, video player, TV receiver and digital video
recorder.
9. All-in-one PC also known as all-in-one desktops,
integrate the computer case and system components
into the monitor so that the entire PC is contained all
in one unit. All-in-one (AIO) desktop PCs offer the
advantage of a smaller form factor than desktop PCs,
but they often come with several drawbacks as well,
including higher cost, weaker performance, and
limited upgrade options.
The all-in-one computer design debuted with the
Apple iMac in 1998. While the early all-in-one PC
computers were expensive and bulky, all-in-one PCs
have become much slimmer, lighter, and cheaper
with the advent of LCD monitors and smaller, less
expensive desktop system components.
10. A pocket PC is a hardware specification for a
handheld-sized computer (personal digital assistant)
that runs the Microsoft Windows Mobile operating
system. It may have the capability to run an
alternative operating system like NetBSD or Linux.
It has many of the capabilities of modern desktop
PCs.

8
Note: Practice Personal Hygiene protocols at all times.
Computer Hardware and Peripherals

An exploded view of a modern personal computer and peripherals:

Scanner Speakers

CPU (Microprocessor) Monitor

Primary storage (RAM) System Software

Expansion cards (graphics cards, etc.) Application Software

Power supply Keyboard

Optical disc drive Mouse

Secondary storage (Hard disk) External Hard Disk

Motherboard Printer

Computer case
A computer case is the enclosure that
contains the main components of a
computer. Cases are usually constructed
from steel or aluminum, although other
materials such as wood and plastic have
been used. Cases can come in many
different sizes, or form factors.

9
Note: Practice Personal Hygiene protocols at all times.
Processor
The central processing unit, or CPU, is that
part of a computer which executes software
program instructions. In older computers this
circuitry was formerly on several printed
circuit boards, but in PCs is a single
integrated circuit. Nearly all PCs contain a
type of CPU known as a microprocessor.
with a fan attached via heat sink.
Motherboard
The motherboard, also referred to as
system board or mainboard, is the
primary circuit board within a personal
computer.

Main memory
A PC's main memory is fast storage that is
directly accessible by the CPU and is used to
store the currently executing program and
immediately needed data.
Hard disk drive
Mass storage devices store programs
and data even when the power is off;
they do require power to perform read
and write functions during usage.
Although flash memory has dropped in
cost, the prevailing form of mass storage
in personal computers is still the hard
disk.
Video Card
The video card - otherwise called a graphics
card, graphics adapter or video adapter -
processes and renders the graphics output
from the computer to the computer display,
and is an essential part of the modern
computer.
Visual display unit
A visual display unit (or monitor) is a
piece of electrical equipment, usually
separate from the computer case, which
displays viewable images generated by a
computer without producing a
permanent record.

10
Note: Practice Personal Hygiene protocols at all times.
Keyboard
In computing, a keyboard is an arrangement
of buttons that each correspond to a
function, letter, or number. They are the
primary devices of inputting text.

Mouse
A Mouse on a computer is a small,
slidable device that users hold and slide
around to point at, click on, and
sometimes drag objects on screen in a
graphical user interface using a pointer
on screen.

Other Components

Mass storage
All computers require either fixed or
removable storage for their operating
system programs and user generated
material.
Formerly the 5¼ inch and 3½ inch floppy
drive were the principal forms of
removable storage for backup of user files
and distribution of software.

Computer Communications
• Internal Modem Card
• External Modem
• Network Adapter Card
• Router
• Wifi Router
LAN Card – is a network interface card.
This is a computer circuit board or card
that is installed in a computer so that it
can be connected to a network.

MODEM - (MOdulator-DEModulator)
The modem is a device that allows a given
computer to share data or otherwise a
device which let computers exchange
information

11
Note: Practice Personal Hygiene protocols at all times.
A wireless router is a device that
performs the functions of a router and also
includes the functions of a wireless access
point. It is used to provide access to the
Internet or a private computer network.
Depending on the manufacturer and
model, it can function in a wired local area
network, in a wireless-only LAN, or in a
mixed wired and wireless network.

Common peripherals and adapter cards

• Headset • Printer • Speakers


• Joystick • Scanner • Webcam
• Microphone • Sound Adapter

Scanner - it is an input device that read


text or illustration printed on paper,
translates the information into a form
that a computer can use.

Printer - it is a piece of hardware that


produces a paper copy (also known as
‘hardcopy’) of the information
generated by the computer.

RAM – Random Access Memory, is a


primary memory. This memory is used
inside the computer to hold programs
and data while it is running.
Basic Input/output System, chip that
controls the most basic functions of the
computer and performs a self-test every
time you turn it on.

USB – Universal Serial Bus, a


hardware interface for low-speed
peripherals such as the keyboard,
mouse, joystick, scanner, printer and
telephony devices.

12
Note: Practice Personal Hygiene protocols at all times.
Flash drive – is a small, ultra-portable
storage device which, unlike an optical
drive or a traditional hard drive, has no
moving parts. Flash drives connect to
computers and other devices via a built-in
USB Type-A or USB-C plug, making a
flash drive a kind of combination USB
device and cable.
Video Camera - camera using
videotape: a camera that records onto
videotape

Sound Card - enhances the computers


sound generating capabilities by allowing
sound to be output through speakers.

Power Cables – it supplies power from


the power supply to the drive. The
power cables are red, yellow and black.
The yellow wire furnishes 12 volts of
power, the red wire furnishes 5 volts of
power, the two black wire are ground
wire for each.
IDE And Floppy Disk Ribbon Cable –
IDE stands for Integrate Device
Electronics. It shows how to connect an
IDE cable to two devices namely the top
device (master) and the bottom device
(slave).
Serial ATA (SATA, abbreviated from
Serial AT Attachment) is a computer
bus interface that connects host bus
adapters to mass storage devices such as
hard disk drives and optical drives.
Headset - combines a headphone with a
microphone. Headsets are made with
either a single-earpiece (mono) or a
double-earpiece (mono to both ears or
stereo). Headsets provide the equivalent
functionality of a telephone handset but
with handsfree operation.
Webcam - is a video camera that feeds
or streams an image or video in real
time to or through a computer to a
computer network, such as the Internet.

13
Note: Practice Personal Hygiene protocols at all times.
Barcode reader - (or barcode scanner) is
an optical scanner that can read printed
barcodes, decode the data contained in
the barcode and send the data to a
computer. Like a flatbed scanner, it
consists of a light source, a lens and a
light sensor translating for optical
impulses into electrical signals.

There are still other peripherals or hardware that can be attached to computer
systems. You can also attach smartphone or other gadgets wirelessly to computer
systems.

Learning Competency with Code: Assemble Computer Hardware. (TLE_IACSS9-


12ICC_Ia-e-28)
➢ Identify materials necessary to complete the work in accordance with
established procedures and check against system requirements
➢ Obtain materials necessary to complete the work in accordance with
established procedures and check against system requirements.

Activity 1
Direction. Rearrange the jumbled words and describe them in your own words.

1.

__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

2.

__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

3.

__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

14
Note: Practice Personal Hygiene protocols at all times.
4.

__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

5.

__________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

Activity 2

Direction. Answer the following questions.

1. How would you differentiate All-in-One PC and Desktop PC?


______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. What are the features of Ultra Mobile PC?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
3. Which computer do you think is widely used PC nowadays? Discuss briefly.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

15
Note: Practice Personal Hygiene protocols at all times.
Activity 3
Direction. Put an arrow to an object which do you think it belongs inside the Tower
Case of Computer System.

Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

16
Note: Practice Personal Hygiene protocols at all times.
2. I need to know more about ______________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
___________________________________________________________________

References:

1. Competency-Based Learning Module for Computer Systems Servicing NCII


2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. itopick.wordpress.com
6. books.google.com.ph
7. https://en.wikipedia.org/wiki/Wireless_router

17
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY

Activity 1

1. WORKSTATION - they are commonly connected to a local area network and run
multi-user operating systems.
2. LAPTOP - a small personal computer designed for portability.
3. HOME THEATER - a television-sized computer displays
and is often used as a digital photo, music, video player, TV receiver and digital
video recorder.
4. NETTOP - a low-cost, lean-function, desktop computers.
5. POCKET PC - a handheld-sized computer (personal digital assistant) that runs the
Microsoft

Activity 2
Answers may vary
1. The difference between the two PC is All-in-one pc integrates the computer
case and system components into the monitor so that the entire PC is
contained all in one unit Desktop pc has large vertical tower cases to small
form factor models that can be tucked behind an LCD monitor.
2. An ultra-mobile pc is a small and a low voltage form factor of tablet PCs. It
has keyboard, trackpad and camera.
3. Most widely used pc nowadays is LAPTOP/DESKTOP due to less
expensive, easy to use, and easy to maintain.

Activity 3

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

18
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS


Obtaining Tools, Equipment and Testing Devices in
Computer Hardware Assembly

Background Information for Learners:


A tool is a handheld device that aids in accomplishing a task. Tools range from
a traditional metal cutting part of a machine to an element of a computer program that
activates and controls functions.
Once selected, use the tool for the purpose for which it was designed. Not all
tools come with detailed instructions, but there are those that do spell out the safety
“Do’s” and “Don’ts” for your safety. If there are set-up/use options, operator judgment
must always be based on what is the safest way to use the tool.
List of Tools and their Purpose
Safety Goggles – A large spectacles, with shields
1. around the rims, for protecting the eyes from dust,
excessive light, wind, etc.

Multimeter - A measuring instrument used by


2. technician for measuring: current, voltage,
resistance.

Flat Screwdriver – a tool used to drive or fasten


3. negative slotted screws

Philips Screwdriver- a tool used to drive or fasten


4. positive slotted screws

Side Cutter Pliers – a tool used for cutting or


5. trimming of connecting wires or terminal leads in
the circuit board

Long nose Pliers – Used for holding, bending and


6. stretching the lead of electronics component or
connecting wire.

Tweezers- a tool use to hold small sensitive part


7.
of a computer.

19
Note: Practice Personal Hygiene protocols at all times.
Cutter- a tool used in cutting wires.
8.

Flashlight - a small electric light, a flash of electric


9.
light used to give light in dark conditions.

Paint Brush- a device made of bristles set in


10. handle, use for cleaning sensitive parts of a
computer.

Magnifier- a device made in glass with handle, to


11. exaggerate or to increase the apparent size of an
object.

Anti-static wrist strap, mat and spray- are used to


12. eliminate electrostatic discharge in your work
area.

Soldering Pencil – a tool used to join two or more


13 metal conductors with the support of soldering
lead melted around it.
Desoldering Tool – a tool used to unsolder
14 unwanted parts or component in the circuit with
the support of soldering pencil

Lens cleaner-is used for cleaning optical media,


15
such as DVD- ROMS and CD-writers.

Thermal paste-is a paste used for heat dissipation


16
for your processor.

Learning Competency with Code: Assemble Computer Hardware. (TLE_IACSS9-


12ICC_Ia-e-28)
➢ Obtain tools, equipment and testing devices needed to carry out installation
work in accordance with established procedures and check for correct
operation and safety.

20
Note: Practice Personal Hygiene protocols at all times.
Activity 1

Direction. Read the statement carefully, choose the right answer and write the
correct letter on the space provided.
_____1. John is measuring a voltage of a power supply, what tool should he used to
measure the voltage?
a. Soldering Pencil b. Desoldering tool
c. Thermal paste d. Multimeter
_____ 2. Anton is cleaning a motherboard, what appropriate tool he needs to use?
a. Lens Cleaner b. Magnifier
c. Paint Brush d. Goggles
_____ 3. What tool is used to unsolder unwanted parts or component in the
circuit with the support of soldering pencil is called __________________.
a. Soldering Pencil b. Desoldering tool
c. Thermal Paste d. Pliers
_____ 4. Jim is cutting wires to use for network cabling, what proper tool used for
cutting or trimming of connecting wires or terminal leads in the circuit board
a. Pliers b. Soldering pencil
c. Side cutter pliers d. Long nose pliers
_____ 5. Which tool you need to used when you fasten a negative slotted screw?
a. Flat Screw Driver b. Philips Screw Driver
c. Tweezer d. Plier
_____ 6. What Protective tool will you use when you are cleaning dust?
a. Gloves b. Anti-static wrist strap
d. Goggles d. Paint Brush
_____ 7. When you removing component of a computer, what tool should you use
to hold the small parts?
a. Pliers b. Tweezer
b. Side Cutter d. Long nose plier
_____ 8. Nico has problem seeing small objects, what appropriate tool should he
used?
a. Flashlight b. Goggles
b. Tweezer d. Magnifier
_____ 9. When you seating back the processor, what material you used to
dissipate the heat of processor.
a. Lens Cleaner b. Spray
c. Thermal Paste d. Soldering pencil
_____ 10. What is the appropriate tool used to eliminate the static charge when
holding computer parts?
a. Anti-static Mat b. Anti-static Wrist strap
b. Goggles d. Gloves

21
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. Identify and give the usage of appropriate tool used for
troubleshooting a computer components. Write your answer on the space
provided in the table.

Computer Tools Usage


Components/
Peripherals
1. Motherboard

2. DVD ROM

3. Graphics Card

4. Processor

Activity 3
Direction. Answer the following questions.

1. What would happen if you put thermal paste in a processor?


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. Explain why you need to use anti-static tool when holding electronic parts of
a computer system?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

22
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. I need to know more about ______________________________________


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

References:

1. Competency-Based Learning Module for Computer Systems Servicing NCII


2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. itopick.wordpress.com
6. books.google.com.ph
7. https://en.wikipedia.org/wiki/Wireless_router

23
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY

Activity 1

1. D
2. C
3. B
4. C
5. A
6. D
7. B
8. D
9. C
10. A

Activity 2
1. Paint Brush - use for cleaning sensitive parts of a computer components.
2. Lens cleaner – use for cleaning optical media, such as DVD- ROMS and
CD-writers.
3. Anti-static wrist strap, mat - are used to eliminate electrostatic discharge
4. Thermal paste- a paste used for heat dissipation for your processor.

Activity 3
Answers may vary
1. When putting a thermal paste to the processor, it will dissipate the heat of
processor.
2. We need to use anti-static tool, to eliminate the static charge and prevent
damage when holding electronic computer parts.

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

24
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS


Assembling Computer Hardware in Accordance with
Established Procedures and System Requirements
Background Information for Learners:
• Computer assembly is a large part of a technician's job.
• Work in a logical, methodical manner when working with computer components
• Improve computer assembly skills dramatically with practice
• In this learning activity the learners may also apply his/her knowledge on the
proper observation of OHS and the use essential materials in performing the
assembly of computer systems
• For actual disassembly and assembly of Computer Systems see reference for
video tutorials links.
Procedures in Disassembly and Assembly of Computer Systems
Open the Case
Prepare the workspace before opening the
computer case:
• Adequate lighting
• Good ventilation
• Comfortable room temperature
• Workbench accessible from all sides
• Avoid cluttering workbench
• An antistatic mat on the table
• Small containers to hold screws and other small
parts
There are different methods for opening cases.
To learn how, consult the user manual or
manufacturer's website.

Install the Power Supply


Power supply installation steps include the
following:
1. Insert the power supply into the case
2. Align the holes in the power supply with the
holes in the case
Secure the power supply to the case using the
proper screws
25
Note: Practice Personal Hygiene protocols at all times.
Attach Components to the Motherboard
As part of an upgrade or repair, a technician may
need to attach components to the motherboard, and then
install the motherboard.
CPU on Motherboard
The CPU and motherboard are sensitive to
electrostatic discharge so use a grounded antistatic mat
and wear an antistatic wrist strap.
CAUTION: When handling a CPU, do not touch the
CPU contacts.
The CPU is secured to the socket on the
motherboard with a locking assembly.
Thermal Compound
Thermal compound helps to keep the CPU cool.
To install a used CPU, clean it and the base of the heat
sink with isopropyl alcohol to remove the old thermal
compound.
Follow manufacturer’s recommendations about
applying the thermal compound.
Heat Sink/Fan Assembly
The Heat Sink/Fan Assembly is a two-part
cooling device. The heat sink draws heat away from
the CPU. The fan moves the heat away from the heat
sink. The heat sink/fan assembly usually has a 3-pin
power connector
Install CPU and Heat Sink/Fan Assembly
1. Align the CPU so that the Connection 1 indicator
is lined up with Pin 1 on the CPU socket.
2. Place the CPU gently into the socket.
3. Close the CPU load plate and secure it by closing
the load lever and moving it under the load lever
retention tab.
4. Apply a small amount of thermal compound to the
CPU and spread it evenly. Follow the application
instructions provided by the manufacturer.
5. Line up the heat sink/fan assembly retainers to the
holes on the motherboard.
6. Place the heat sink/fan assembly onto the CPU
socket, being careful not to pinch the CPU fan
wires.
7. Tighten the heat sink/fan assembly retainers to
secure the assembly in place.
8. Connect the heat sink/fan assembly power cable
to the header on the motherboard.

26
Note: Practice Personal Hygiene protocols at all times.
Install RAM
RAM provides temporary data storage for the
CPU while the computer is operating. RAM should be
installed in the motherboard before the motherboard is
placed in the computer case.
RAM installation steps:
1. Align the notches on the RAM module to the
keys in the slot and press down until the side
tabs click into place.
2. Make sure that the side tabs have locked the
RAM module and visually check for exposed
contacts.
Install Motherboard
1. Install standoffs in the computer case.
2. Align the I/O connectors on the back of the
motherboard with the openings in the back of
the case.
3. Align the screw holes of the motherboard with
the standoffs.
4. Insert all the motherboard screws.
5. Tighten all screws on the motherboard
Note: Drill a hole as needed for the screw.
The Motherboard
The motherboard is now ready to install in the
computer case.
Plastic and metal standoffs are used to mount the
motherboard and to prevent it from touching the metal
portions of the case.
Install only the standoffs that align with the holes
in the motherboard.
Installing any additional standoffs may prevent
the motherboard from being seated properly in the
computer case.
Drives that are installed in internal bays are called
internal drives.
A hard disk drive (HDD) is an example of an
internal drive.
HDD installation steps:
1. Position the HDD so that it aligns with the 3.5-
inch drive bay.
2. Insert the HDD into the drive bay so that the
screw holes in the drive line up with the screw
holes in the case.
Secure the HDD to the case using the proper
screws.
27
Note: Practice Personal Hygiene protocols at all times.
Install Drives in External Bays
Drives, such as optical drives (CD and DVD) and
floppy drives, are installed in drive bays that are
accessed from the front of the case.
Optical drives and floppy drives store data on
removable media.
Drives in external bays allow access to the media
without opening the case

Install Optical Drive


An optical drive is a storage device that reads and
writes information to
CDs or DVDs.
Optical drive installation steps:
1. Position the optical drive to align with the 5.25-
inch drive bay.
2. Insert the optical drive into the drive bay so that
the optical drive screw holes align with the
screw holes in the case.
Secure the optical drive to the case using the
proper screws.

Install Floppy Drive


A floppy disk drive (FDD) is a storage device that
reads and writes information to a floppy disk.
FDD installation steps:
1. Position the FDD so that it aligns with the 3.5-
inch drive bay.
2. Insert the FDD into the drive bay so that the
FDD screw holes align with the screw holes in
the case.
Secure the FDD to the case using the proper
screws.
Install Adapter Cards
Adapter cards are installed to add functionality to
a computer.
Adapter cards must be compatible with the
expansion slot.
Some adapter cards:
1. PCIe x1 NIC
2. PCI Wireless NIC
PCIe x16 video adapter card

28
Note: Practice Personal Hygiene protocols at all times.
Install the Network Interface Card (NIC)
A NIC enables a computer to connect to a network.
NICs use PCI and PCIe expansion slots on the
motherboard.
NIC installation steps:
1. Align the NIC to the appropriate slot on the
motherboard.
2. Press down gently on the NIC until the card is
seated.
Secure the NIC PC mounting bracket to the case
with the appropriate screw.
Install the Wireless NIC
A wireless NIC enables a computer to connect to a
wireless network. Some wireless NICs are installed
externally with a USB connector.
Wireless NIC installation steps:
1. Align the wireless NIC to the appropriate
expansion slot on the motherboard.
2. Press down gently on the wireless NIC until the
card is fully seated.
Secure the mounting bracket to the case with the
appropriate screw.
Install the Video Adapter Card
A video adapter card is the interface between a
computer and a display monitor. An upgraded video
adapter card can provide better graphic capabilities for
games and graphic programs.
Video adapter card installation steps:
1. Align the video adapter card to the appropriate
expansion slot on the motherboard.
2. Press down gently on the video adapter card
until the card is fully seated.
Secure the video adapter card PC mounting
bracket to the case with the appropriate screw.

Connect Internal Cables


Power cables are used to distribute electricity
from the power supply to the motherboard and other
components.
Data cables transmit data between the
motherboard and storage devices, such as hard drives.
Additional cables connect the buttons and link lights
on the front of the computer case to the motherboard.

29
Note: Practice Personal Hygiene protocols at all times.
Motherboard Power Connections
The Advanced Technology Extended (ATX) main
power connector has either 20 or 24 pins.
The power supply may also have a 4-pin or 6-pin
Auxiliary (AUX) power connector that connects to the
motherboard.
A 20-pin connector will work in a motherboard
with a 24-pin socket.
Connect Power Cables
• ATA Power Connectors use a 15-pin connector
to connect to hard disk drives, optical drives, or
any devices that have a SATA power socket.
• Molex Power Connectors are used by hard disk
drives and optical drives that do not have SATA
power sockets.
• CAUTION: Do not use a Molex connector and
a SATA power connector on the same drive at
the same time.
• 4-pin Berg Power Connector supplies power to
a floppy drive.
Power Connector Installation Steps
1. Plug the SATA power connector into the HDD.
2. Plug the Molex power connector into the optical
drive.
3. Plug the 4-pin Berg power connector into the
FDD.
4. Connect the 3-pin fan power connector into the
appropriate fan header on the motherboard,
according to the motherboard manual.
Plug the additional cables from the case into the
appropriate connectors according to the motherboard
manual.
PATA Cables
• Drives connect to the motherboard using data
cables.
• Types of data cables are PATA, SATA, and
floppy disk.
• The PATA cable (sometimes called a ribbon
cable) is wide and flat and can have either 40 or
80 conductors.
• A PATA cable usually has three 40-pin
connectors.
• If multiple hard drives are installed, the master
drive will connect to the end connector.

30
Note: Practice Personal Hygiene protocols at all times.
• The slave drive will connect to the middle
connector.
• Many motherboards have two PATA cable
sockets, which provides support for a maximum
of four PATA drives.

SATA Cables
• The SATA data cable has a 7-pin connector.
• One end of the cable is connected to the
motherboard.
• The other end is connected to any drive that has
a SATA data connector.

Floppy Drive Cables


• The floppy drive data cable has a 34-pin
connector and it has a stripe to denote the
location of pin 1.
• One connector at the end of the cable connects
to the motherboard.
• The other two connectors connect to drives.
• If multiple floppy drives are installed, the A:
drive will connect to the end connector. The B:
drive will connect to the middle connector.
• Motherboards have one floppy drive controller
which provides support for a maximum of two
floppy drives.

Install Data Cables


1. Plug the motherboard end of the PATA cable into the motherboard socket.
2. Plug the connector at the far end of the PATA cable into the optical drive.
3. Plug one end of the SATA cable into the motherboard socket.
4. Plug the other end of the SATA cable into the HDD.
5. Plug the motherboard end of the FDD cable into the motherboard socket.
6. Plug the connector at the far end of the FDD cable into the floppy drive.

Re-attach Panels, Connect External Cables


• Now that all the internal components have been installed and connected to the
motherboard and power supply, the side panels are re-attached to the computer
case.
• The next step is to connect the cables for all computer peripherals and the
power cable.

Re-attach Side Panels


• Most computer cases have two panels, one on each side.
• Once the cover is in place, make sure that it is secured at all screw locations.
• Refer to the documentation or manufacturer’s website if you are unsure about
how to remove or replace your computer case.
31
Note: Practice Personal Hygiene protocols at all times.
Caution: Handle case parts with care. Some computer case covers have sharp or
jagged edges.
After the case panels have been re-attached, connect the external cables to the
back of the computer.
External cable connections include:
• Monitor
• USB Type peripherals
• Keyboard
• Power
• Mouse
• Ethernet
Caution: When attaching cables, never force a connection.
Note: Plug in the power cable after you have connected all other
cables.
Connect External Cables
1. Attach the monitor cable to the video port.
2. Secure the cable by tightening the screws on the connector.
3. Plug the keyboard cable into the PS/2 keyboard port.
4. Plug the mouse cable into the PS/2 mouse port.
5. Plug the USB cable into a USB port.
6. Plug the network cable into the network port.
7. Connect the wireless antenna to the antenna connector.
8. Plug the power cable into the power supply.
Learning Competency With Code: Assemble Computer Hardware.
(TLE_IACSS9-12ICC_Ia-e-28)
➢ Assemble computer hardware in accordance with established procedures and
system requirements.
Activity 1
Direction. Answer the following questions below.
1. What would happen if you don’t follow the standard procedures in
installing computer hardware?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
2. What parts of the computer that are sensitive to electrostatic discharge?
________________________________________________________________
__________________________________________________ ______________
________________________________________________________________
32
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. Arrange in logical manner on how to install CPU and Heat Sink/Fan
Assembly in a motherboard. Write the number 1 before the sentence which do
you think the first step and so on.
_____ Place the CPU gently into the socket.
_____ Align the CPU so that the Connection 1 indicator is lined up with Pin 1 on
the CPU socket.
_____ Apply a small amount of thermal compound to the CPU and spread it evenly.
Follow the application instructions provided by the manufacturer.
_____ Close the CPU load plate and secure it by closing the load lever and moving
it under the load lever retention tab.
_____ Line up the heat sink/fan assembly retainers to the holes on the motherboard.
_____ Tighten the heat sink/fan assembly retainers to secure the assembly in place.
_____ Connect the heat sink/fan assembly power cable to the header on the
motherboard.
_____ Place the heat sink/fan assembly onto the CPU socket, being careful not to
pinch the CPU fan wires.
Activity 3
Direction. Fill in the blanks. Complete the sentence by providing the correct
answer on each sentence.
1. Thermal compound helps to keep the __________________ cool.
2. Secure the _________________ to the case using the proper screws.
3. The ___________________ data cable has a 7-pin connector.
4. Attach the ___________________ cable to the video port.
5. The _____________________ data cable has a 34-pin connector and it has a stripe
to denote the location of pin 1
6. Power cables are used to distribute electricity from the power supply to the
________________________ and other components.
7. A _________________enables a computer to connect to a wireless network.
8. An _______________________ is a storage device that reads and writes
information to CDs or DVDs.
9. A _____________________ provides temporary data storage for the CPU
while the computer is operating.
10. The CPU and motherboard are sensitive to electrostatic discharge so use a
grounded ________________________ and wear an antistatic wrist strap.

33
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. I need to know more about ______________________________________


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. PA-HELP - How to build a PC - Part 1 - Choosing the parts (IN TAGALOG!)
https://www.youtube.com/watch?v=34vFyKWC7cE
6. PA-HELP - How to build a PC - Part 2 (IN TAGALOG!)
https://www.youtube.com/watch?v=5Tkgac1W79Q
7. How to Upgrade CPU Cooler // How to Replace CPU Cooler or Heatsink
https://www.youtube.com/watch?v=TiHZoyqINgw

34
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY

Activity 1
Answers may vary
1. If you do not follow the standard procedure, you might be damaging
because of mismatch parts.
2. The most common parts that is sensitive to electrostatic discharge is the
CPPU and MOTHERBOARD.

Activity 2
1. 2
2. 1
3. 4
4. 3
5. 5
6. 7
7. 8
8. 6

Activity 3
1. CPU 8. Optical drive
2. Power Supply 9. RAM
3. SATA 10. Antistatic mats
4. Monitor
5. Floppy drive
6. Motherboard
7. Wireless NICs

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

35
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEET 5


Performing Bios Configuration in Accordance with
Hardware Requirements
Background Information for Learners:
BIOS (basic input/output system) is the program a personal
computer's microprocessor uses to get the computer system started after you turn it on.
It also manages data flow between the computer's operating system and attached
devices such as the hard disk, video adapter, keyboard, mouse and printer.
BIOS is an integral part of your computer and comes with it when you bring it
home. (In contrast, the operating system can either be pre-installed by the
manufacturer or vendor or installed by the user.) BIOS is a program that is made
accessible to the microprocessor on an erasable programmable read-only memory
(EPROM) chip. When you turn on your computer, the microprocessor passes control
to the BIOS program, which is always located at the same place on EPROM.
When BIOS boots up (starts up) your computer, it first determines whether all
of the attachments are in place and operational and then it loads the operating system
(or key parts of it) into your computer's random access memory (RAM) from your
hard disk or diskette drive.
With BIOS, your operating system and its applications are freed from having
to understand exact details (such as hardware addresses) about the attached
input/output devices. When device details change, only the BIOS program needs to be
changed. Sometimes this change can be made during your system setup. In any case,
neither your operating system or any applications you use need to be changed.
Although BIOS is theoretically always the intermediary between the
microprocessor and I/O device control information and data flow, in some cases, BIOS
can arrange for data to flow directly to memory from devices (such as video cards)
that require faster data flow to be effective.

Configuring BIOS
In the previous list, you saw that the BIOS checks the CMOS Setup for custom
settings. Here is what you do to change those settings.
To enter the CMOS Setup, you must press a certain key or combination of keys
during the initial startup sequence. Most systems use "Esc," "Del," "F1," "F2," "Ctrl-
Esc" or "Ctrl-Alt-Esc" to enter setup. There is usually a line of text at the bottom of
the display that tells you "Press Setup to enter." Once you have entered setup, you will

36
Note: Practice Personal Hygiene protocols at all times.
see a set of text screens with number of options. Some of these are standard, while
others vary according to the BIOS manufacturer. Common options include:
• System Time/Date - Set the system time and date
• Boot Sequence - The order that BIOS will try to load the operating
system
• Plug and Play - A standard for auto-detecting connected devices;
should be set to "Yes" if your computer and operating system both
support it
• Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard,"
"Auto-Detect Mouse"...
• Drive Configuration - Configure hard drives, CD-ROM, and floppy
drives
• Memory - Direct the BIOS to shadow to a specific memory address
• Security - Set a password for accessing the computer
• Power Management - Select whether to use power management, as well
as set the amount of time for standby and suspend
• Exit - Save your changes, discard your change, or restore default
settings
Be very careful when making changes to setup. Incorrect settings may keep
your computer from booting. When you are finished with your changes, you should
choose "Save Changes" and exit. The BIOS will then restart your computer so that
the new settings take effect.
The BIOS uses CMOS technology to save any changes made to the computer's
settings. With this technology, a small lithium or Ni-Cad battery can supply enough
power to keep the data for years. In fact, some of the newer chips have a 10-year, tiny
lithium battery built right into the CMOS chip.

Learning Competency with Code: Assemble Computer Hardware. (TLE_IACSS9-


12ICC_Ia-e-28)
➢ Perform BIOS configuration in accordance with hardware requirements.

Activity 1
Direction: Answer the following questions based on how you understand the BIOS.
1. Define in your own word BIOS?
_________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. What do you think why CMOS is very important in BIOS? __________________


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
37
Note: Practice Personal Hygiene protocols at all times.
3. Explain why BIOS is very important in the Computer? _____________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

Activity 2
Direction. Based on the picture below, draw the missing keyboard keys or
combination of keys which is used during the initial startup sequence when entering
a CMOS Set up.

Activity 3
Direction. Study the figure below. Write the number of the missing items in the box
inside a Bios Set-up. Choose your answer from the table.

1. Exit 2. System 3. Boot 4. System 5. Security 6. Storage


Time Date Configuration

38
Note: Practice Personal Hygiene protocols at all times.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. I need to know more about ______________________________________


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. PC BIOS Settings - https://www.youtube.com/watch?v=ezubjTO7rRI

39
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1
Answers may vary
1. BIOS (basic input/output system) is the program a personal computer's
microprocessor uses to get the computer system started after you turn it on.
2. The BIOS uses CMOS technology to save any changes made to the computer's
settings.
3. BIOS manages data flow between the computer's operating system and attached
devices such as the hard disk, video adapter, keyboard, mouse and printer.
Activity 2
Most systems use "Esc," "Del," "F1," "F2," "Ctrl-Esc" or "Ctrl-Alt-Esc" to enter setup.

Activity 3

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

40
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS 6


Creating Portable Bootable Devices in Accordance with
Software Manufacturer Instruction
Background Information for Learners:
After reading this learning activity sheet, YOU MUST be able to be familiar
and use the Portable Bootable Devices properly.
Portable Bootable Devices
A live USB is a USB flash drive or a USB external hard disk drive
containing a full operating system that can be booted. Live USBs are closely related
to live CDs, but sometimes have the ability to persistently save settings and
permanently install software packages back onto the USB device. Like live CDs, live
USBs can be used in embedded systems for system administration, data recovery,
or the testing of operating system distributions without committing to a permanent
installation on the local hard disk drive. Many operating systems including Mac
OS 9, Mac OS X, Microsoft Windows XP Embedded and many of the Linux and
BSD distributions can also be used from a USB flash drive. Windows 8 is also
capable of running from a USB drive, with Windows To Go.
How to Make a USB Bootable
Have an old USB drive lying around that you don't use anymore? Turn it into
an operating install disk for Windows, Linux or Mac, or a diagnostic tool for your PC.
Warning: All data on the USB flash drive will be lost, make sure you save any
data before proceeding.
Using Disk Part
Insert your USB flash drive (4Gb +
preferable) into your system
• Navigate to the Command Prompt. Select Start
& type CMD in the search field, right click on
CMD.exe and select Run as administrator
• Alternatively, navigate to Start > All programs
> Accessories > right click on Command
Prompt and select Run as administrator
• Elevated Command Prompt
• A User Account Control (UAC) dialog Window
may appear. Click Yes to Continue.
• When the Command Prompt opens, enter the
following commands followed by Enter
41
Note: Practice Personal Hygiene protocols at all times.
• DISKPART - This will start the utility
• LIST DISK - This will show the disk number of your USB flash drive. In the image
below the USB flash drive shows as Disk 2.
• SELECT DISK X (Replace X with your
USB flash drive number, we are using 2
in this example)
• CLEAN - This wipe the drive
• CREATE PARTITION PRIMARY-
Creates partition
• SELECT PARTITION 1- Selects
partition 1
• ACTIVE- Marks the current partition as
active
• FORMAT FS = NTFS QUICK - This
format the partition
• ASSIGN- Assigns a drive letter.
• EXIT

Insert your Windows DVD into the optical drive. From the command prompt, enter
the following:
• g: <enter> (Where "g" is your DVD drive letter)
• cd boot <enter> (changes to boot directory)
• G:\boot boot sect /nt60 d: <enter> (Where "d" is your USB drive letter)

Copy all files from the Windows CD to the USB flash drive using copy
• cd\ <enter>
• G:\xcopy g:\*. * /s/h/f f:\ <enter>
This will copy the Windows installation files onto the USB flash drive, it may take
several minutes.
Copy switches are as follows:
• /s - Copies directories and subdirectories except empty ones.
• /h - Copies hidden and system files.
• /f - Displays full source and destination filenames while copying.
• To display the full list of switches, type copy /? <enter>
This will make the USB drive bootable and when selected at start up, will boot
straight into the Windows installation.

42
Note: Practice Personal Hygiene protocols at all times.
Another procedure for copying files is in file explorer
Copy the operating system. Once the USB drive has been made bootable, you
can copy over the installation files for the operating system you want to install. You
can do this by dragging and dropping using your preferred file manager/explorer.
Note: You can also create a bootable USB Drive using a third-party software.
Copy over any drivers you might need during the operating system installation to
make the process much smoother. You can also create a bootable USB Drive using a
third-party software.

Learning Competency with Code: Prepare Installer. (TLE_IACSS9-12ICC_If-j-29


➢ Create portable bootable devices in accordance with software manufacturer
instruction.

43
Note: Practice Personal Hygiene protocols at all times.
Activity 1
Direction. Using the diskpart method in windows command prompt complete the
cmd command for creating portable bootable flash drive. Write your answer on the
space provided.

1. _______________________________ 5. ____________________________
2. _______________________________ 6. ____________________________
3. _______________________________ 7. ____________________________
4. _______________________________ 8. ____________________________

Activity 2
Direction. Arrange the steps in creating a USB flash drive using Rufus.
______ Open the Rufus program from where you downloaded it to run it.
______ Download Rufus . Rufus is a standalone program and does not require
installation.
______ Under "Boot selection", select Disk or ISO image (Please select), if it isn't
already chosen, and then click SELECT to choose the .iso file you
downloaded
______ From the Device drop-down menu, select your USB drive, if it isn't
automatically selected.
______ Leave "Partition scheme" set to GPT.
______ Leave "Image option" set to Standard Windows installation.

44
Note: Practice Personal Hygiene protocols at all times.
______ Under "Format Options", to ensure the flash drive is compatible with UEFI,
select FAT32 for "File System".
______ For "Target system", select UEFI (non CSM).
______ When you are finished selecting options, click Start. When prompted,
confirm that you want to erase the flash disk.
______ To create the flash drive with the "Press any key to boot from USB" prompt
at startup, under the "Advanced format" options, select Create extended label
and icon files.
______ The .iso files will start copying to the flash drive; the process can take
several minutes. When Rufus is done, close the program and eject and
remove the flash drive.
Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. I need to know more about ______________________________________


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph

45
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY
Activity 1

Answer key
1. diskpart
2. list disk
3. select
4. clean
5. create
6. active
7. format
8. assign

Activity 2

1. 2
2. 1
3. 4
4. 3
5. 6
6. 5
7. 8
8. 7
9. 10
10. 9
11. 11

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

46
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS


Preparing Customized Installers in Accordance with
Software Utilization Guide and End User Agreement
Background Information for Learners:
After reading this Learning Activity Sheet, YOU MUST be able to be familiar
and create customized installers properly.
Installer
An installer is a piece of software that is used to
install software programs on a system. An installer is a way
to simplify the process of installing software by providing the
user with a step-by-step process with the ability to select the
desired options.

Useful Software Programs for Windows Users:


Good Antivirus
A good antivirus software is a must for PCs to safeguard them from harmful
threats, trojans, malware, spyware, ransomware etc.
Below I listed some of the best antivirus programs.
- Kaspersky - Bit Defender
- Norton Internet Security - MacAfee
- AVG Antivirus - Panda
- Avira - ESET

47
Note: Practice Personal Hygiene protocols at all times.
VLC Media Player
Listening to songs and watching movies is one of the most
important things we do in our PC. So, we need a good media
player which can play almost all formats of audio and video files.
So VLC Media Player comes 2nd in the list.

Registry Cleaners/Tune up Utilities: -


You need an all-in-one software which cleans registry
errors and junk files from your PC and makes your PC run
smooth and fast. For this I would recommend Tune-up Utilities,
Unable Power Suite or Cleaner.
I suggest you get one of those three programs and run
them when you start using your PC. I guarantee you that your
PC will run like a dream using these utilities.

Image Burner (Nero): -


Nero is the best software if you want to burn any type of
CD or DVD, but Nero is not free so I recommend Imp Burner
which is very much similar to Nero but you can get it for free.

Firefox and Google Chrome

These are the two leading browsers right now that I


recommend you get.
Mozilla Firefox is the best browser ever made for its
multi-functional use. Google Chrome is the fastest and safest
browser. It’s a good idea to have at least 2 browsers installed,
in case something doesn’t work or display right with one browser,
you can test it using the other one.

MS Office / Open Office


We can’t imagine a business without MS Office. Right from student to a
business man, it’s a must have software, but it’s not for free so I recommend you
use Open Office which is very much similar to MS office with the added bonus that it
is free.

48
Note: Practice Personal Hygiene protocols at all times.
Adobe Reader

If you want to read eBooks and pdf documents, then it’s a


must software for you.

Seven (7) Zip


This is a free and open-source file archiver, a utility used to
place groups of files within compressed containers known as
"archives"

Internet Download Manager:


IDM is a must have software for PC as it increases our overall
download speed by 5 times.

uTorrent
uTorrent is a light weight and very efficient torrent client.

Adobe Photoshop/GIMP
Adobe Photoshop is a great software for editing photos, but it’s
sadly not for free, I have an alternative for this called GIMP, which
is free and very similar to Adobe Photoshop. It can also be sued to
make gifs for whoever is interested.

Reva Uninstaller
Reva Uninstaller is a freeware innovative uninstall utility
much faster than Windows Add/Remove applet. With its advanced
and fast algorithm, Reva Uninstaller performs a scan before and after
you uninstall an application.

Adobe Flash Player


This is a must software if you want to watch flash videos on
your computer.

Malware Bytes: -
Malware Bytes is a tool that quarantines and removes malicious
and infected files on your Personal Computer, and it can optimize your
PC’s performance.

Zone Alarm Firewall:


Zone Alarm is a cutting- e d g e firewall security option which
blocks dangerous sites and downloads. Zone Alarm comes with a ‘Two-
way firewall’ which keeps track of all incoming and outgoing traffic
protecting you from hackers and other intruders.

49
Note: Practice Personal Hygiene protocols at all times.
Team Viewer
Team Viewer is the best software for remote desktop viewing.
You can share your desktop from anywhere in this world with this
software.

Notepad++
Notepad++ is a free source and one of the best text editors for
several programming languages under the Windows environment.

Folder Lock
Folder locker allows you to store all your files with a protected
password.

Sandboxes
This is a must have software for virus testers. If you
download any application from internet just run it in Sandboxes to
check whether it’s infected or not.

Key scrambler
In this world of the internet, you can’t always know when a
keylogger gets installed on your PC and makes you lose your
confidential passwords. Key scrambler software scrambles your keys
and helps to stay safe even if a keylogger gets installed somehow.

WinRAR
-is a 32-bit / 64-bit Windows version of RAR Archiver, the powerful
archiver and archive manager.

File Opener
File Opener is a software which can open different formats of
files. This software can fulfill the need of 10 other programs for
opening files.

VMWARE WORKSTATION
VMware helps us in installing
multiple Operating Systems over one
single Operating System. Puzzled?
Well, to simplify things, VMware
allows us to run multiple Operating
Systems (called slaves) on our
computer. Say you are having Windows
7 installed on your computer as the
main Operating System. VMware runs
as an application on Windows 7 and allows us to install other Operating Systems like
50
Note: Practice Personal Hygiene protocols at all times.
Windows XP, Linux and 20 other types of Operating Systems. So, you do not need to
boot your computer to change your OS. One VMware Workstation can
accommodate 20 such OSes.
VMware helps us in installing multiple Operating Systems over one single
Operating System. Puzzled? Well, t o simplify things, VMware allows us to run
multiple Operating Systems (called slaves) on our computer. Say you are having
Windows 7 installed on your computer as the main Operating System. VMware runs
as an application on Windows 7 and allows us to install other Operating Systems
like Windows XP, Linux and 20 other types of Operating Systems. So, you do not
need to boot your computer to change your OS. One VMware Workstation
can accommodate 20 such OSes.

DEEP FREEZE
- is a reboot to restore software application available for the
Microsoft Windows, and macOS operating systems which allows
system administrators to protect the core operating system and
configuration files on a workstation or server by restoring a computer
back to the saved configuration, each time the computer is restarted.

CYBERGHOST VPN
Are you banned from any forum? Try out this software. If you
want to surf anonymously on the web without displaying your real IP
address, you use this VPN – Cybergoth VPN. There are many other
proxy software programs on web. But none of them gives total
protection for your computer. Also, most of them are restricted to only
browser activities.

CREATING BOOTABLE FLASH DRIVE USING RUFUS.

Use Rufus to write an .iso file


1. Download Rufus . Rufus is a standalone program and does not require
installation.
2. Open the Rufus program from where you downloaded it to run it.
3. From the Device drop-down menu, select your USB drive, if it isn't
automatically selected.
4. Under "Boot selection", select Disk or ISO image (Please select), if it isn't
already chosen, and then click SELECT to choose the .iso file you
downloaded.
5. Leave "Image option" set to Standard Windows installation.
6. Leave "Partition scheme" set to GPT.
7. For "Target system", select UEFI (non CSM).
8. Under "Format Options", to ensure the flash drive is compatible with UEFI,
select FAT32 for "File System".
9. To create the flash drive with the "Press any key to boot from USB" prompt
at startup, under the "Advanced format" options, select Create extended label
and icon files.
10. When you are finished selecting options, click Start. When prompted, confirm
that you want to erase the flash disk.
51
Note: Practice Personal Hygiene protocols at all times.
11. The .iso files will start copying to the flash drive; the process can take several
minutes. When Rufus is done, close the program and eject and remove the
flash drive.

Learning Competency with Code: Prepare Installer. (TLE_IACSS9-12ICC_If-j-29)


➢ Prepare customized installers in accordance with software utilization guide and
end user agreement.

Activity 1
Direction. Name each software logo and give a short description. Write you answer
on the space provided.

1. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

3. __________________________________
____________________________________________________________________
____________________________________________________________________
___________________________________________________________________

4. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

5. __________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

52
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Direction. Answer the following questions based on your knowledge.

1. What do you think are the importance of software in a Computer System?


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. What other application software are being used. List them down.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

3. Cite importance in reading the agreement before installing a software.


____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

Reflection:
Complete the statement.
What I learned in this activity_____________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph

ANSWER KEY
53
Note: Practice Personal Hygiene protocols at all times.
Activity 1
1. TeamViewer - for remote desktop viewing
2. Malwarebytes - it can optimize your PC’s performance
3. Adobe Photoshop - great software for editing photos
4. Registry Cleaners/Tune up Utilities - cleans registry errors and junk files from
your PC
5. Adobe Flash Player - to watch flash videos on your computer

Activity 2
Answer may vary
1. Software is the programs that are needed to accomplish the input, processing,
output, storage, and control activities of information systems.
2. WPS office …
3. YES/NO …

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

54
Note: Practice Personal Hygiene protocols at all times.
ICT 9
COMPUTER SYSTEMS SERVICING
Name: _________________________________________ Level: _______________
Section: _________________________________________ Date: _______________

LEARNING ACTIVITY SHEETS


Carrying Out Installation of Portable Applications in
Accordance with Software User Guide and Software
License

Background Information for Learners:


After reading this Learning Activity Sheet, YOU MUST be able to carry out
installation of portable application in accordance with software user guide and
software license.
Portable Application
A portable application (portable app), sometimes also called standalone, is
a program designed to read and write its configuration settings into an accessible
folder in the computer, usually in the folder where the portable application can be
found. This makes it easier to transfer the program with the user's preferences and data
between different computers. A program that does not have any configuration options
can also be a portable application.
Portable applications can be stored on any data storage device, including
internal mass storage, a file share, cloud storage or external storage such as USB
drives and floppy disks—storing its program files and any configuration information
and data on the storage medium alone. If no configuration information is required a
portable program can be run from read-only storage such as CD-ROMs and DVD-
ROMs. Some applications are available in both installable and portable versions.
There are a few different reasons you might want to use a portable app, which
is software that can run on a computer without being installed.
First, if you often switch back and forth between your work and home
computer, you can transfer a portable app via USB flash device, portable hard drive,
or the cloud from one computer to another. This enables you to work on projects from
different devices at your leisure.
Second, the portable app leaves no trace when you remove it, making it handy
when you are using a public computer but do not want information stored there long-
term. Plus, you can use a portable app on a PC with restricted user permissions, so you
will have no problem getting your work done anywhere.

55
Note: Practice Personal Hygiene protocols at all times.
And, lastly, installed programs take up space on your computer, which could
potentially cause it to run slower. By using portable apps, you’re clearing up space on
your computer and enabling every bit of your downloaded software to run faster.
Creating a portable application using Winrar
The example application I’m going to make portable is Audacity, an open source
audio editing program. You can download your own file or follow along using Audacity
(recommended for your first time) before you try this method on your own applications.

Step 1: Download the application setup file


If you are following along, download the Audacity installation file. Make sure this
download is relatively isolated or things will get confusing later.

Step 2: Download Universal Extractor and WinRAR


Download Universal Extractor and a program such as WinRAR. Install both
programs–we need both to make this work. Make sure you allow both programs to associate
with their respective file-types and restart the computer if prompted–better safe than sorry.
I did not need to restart, but it could not hurt.
Step 3: UniExtract the Setup file
Right click your downloaded setup file (in my case, it’s Audacity) and click
“UniExtract here”. Go ahead and specify a folder that you would like to extract the setup
file to. A folder will be created with the extracted files inside. Open up that folder for the
next step.

Step 4: Find the EXE file that runs the program


In that extracted folder, look for the .exe file that runs the program. It’s pretty easy
to spot and usually has the same name as the program you’re trying to install. For instance,
in my case, the .exe is named “audacity.exe”. Double click the file and verify that it runs the
program successfully.

56
Note: Practice Personal Hygiene protocols at all times.
Step 5: Pack all the files into an archive
Highlight every file in that folder, right click on them, and click “Add to archive” in
the contextual menu.

In the resulting dialogue box, name your archive “Audacity Portable” or whatever
you prefer. Under compression method, select “Best”, and be sure to check “Create SFX
archive”.

Next, click the ‘Advanced’ tab and click “SFX Options…”. In “Run after
extraction” field, input the name of the .exe file that you located in Step 4. In my case, the
name was “audacity.exe”.

57
Note: Practice Personal Hygiene protocols at all times.
Head on over to the ‘Modes’ tab and select “Unpack to temporary folder” and “Hide
all”

Lastly, go to the ‘Update’ tab and select “Overwrite all files”. Now go ahead and hit
OK, and watch WinRAR generate an application file.

Step 6: Copy the file to your USB drive


This step is pretty self-explanatory. Drag the application to your USB drive
(wherever you want it to be) and then give it a test run! Double click the application to run
it–on any Windows machine! This version of Audacity is Windows only.

Different Portable Apps


Portable Apps for Chrome
1. Google Chrome Portable (Web Browser)
If you use Chrome already, the portable version is identical -- it links to your
Google account, offers bookmarks, and supports extensions. Plus, Chrome offers built-
in malware protection and auto-updates, so it’s a secure choice for browsing the web,
checking emails, or anything else you might need to do.

Portable Apps for Firefox


2. Mozilla Firefox Portable (Web Browser)
Mozilla Firefox Portable is identical in function to its non-portable alternative.
The portable app employs pop-up blocking and automatic updates, so it’s secure. Plus,
Firefox Portable ensures your bookmarks and extensions are saved, so wherever you
take your portable app, you take those with you.

Portable Apps for Linux


3. LMMS (Linux MultiMedia Studio) Portable (Media Player)
Music creation and production software takes up a lot of hard drive space --
LMMS is the portable alternative, allowing you to create melodies and beats, mix
sounds, and edit and add effects to your samples. It also offers instrument and effect
plugins. LMMS is open source and compatible with many standards, including
SoundFont2, VST(i), LADSPA, GUS Patches, and MIDI.

58
Note: Practice Personal Hygiene protocols at all times.
4. Apache OpenOffice Portable (Office Suite)
Apache OpenOffice app, which is also available for Windows, is one of the
most impressive alternatives to the Office suite, offering a word processor, spreadsheet,
presentation tool, and more. It supports many different languages including Chinese,
French, German, Italian, Portuguese, and Spanish. Best of all, it’s free, so you save
money by using it instead of the Office alternative.
5. Stickies Portable (Stickie Notes)
I’m willing to bet you already know the usefulness of sticky notes, either virtual
or physical -- when you need a quick reminder or to jot down some random thoughts,
they can’t be beat. The Portable version supplies sticky notes that can store text and
images, and you can attach a sticky note to a website or document so you can minimize
them until you need it.
Portable Apps for Mac
6. VLC Media Player Portable (Media Player)
VLC is one of the most popular media players around, largely due to its ability
to play almost any audio or video format, including WMV, MPEG-1, DivX, ogg, as
well as DVDs. Since it can handle files from almost any location, including local drives,
network storage, and streams, it’s a good idea to download the portable app for any
time you’re having trouble displaying an audio or video file on your computer. This
app is also available for Windows.
7. XMind (Mindmapping Tool)
XMind offers a variety of helpful productivity and decision-making tools for
mindmapping and diagramming, including organizational charts, tree charts, and logic
charts. Along with brainstorming templates, XMind also lets you create business charts
and presentations. It has an intuitive interface and provides easy-to-use templates.
8. Gimp (Photo Editor)
One of the most comparable alternatives to Photoshop, Gimp provides an
impressive array of photo-editing tools. Since editing and exporting images takes up a
lot of storage space, you might opt for Gimp’s portable app version to edit your photos
-- plus, it’s free. You can use it to create new designs using the paint program, or simply
convert image formats. It’s also available for Windows.
9. Inkscape (Vectors Graphic Editor)
Inkscape is essentially identical in function to Adobe Illustrator, and is an
impressive free alternative. Inkscape portable offers advanced features including alpha
blending, markers, and trace bitmaps, and has an intuitive interface. If you’re a
freelance designer, it’s not a bad idea to carry Inkscape portable around on a USB, so
you’ve got the tools for for vector graphics, creating illustrations, charts, and logos at
your disposal at all times.
Portable Apps for Windows
10. LibreOffice Portable (Office Suite)
LibreOffice, a notable Office alternative, offers many of the same features as
Office including a word processor, spreadsheets, presentations, vector drawing, and
databases. It performs most of the necessary functions you’d require from Office, but
it’s free and you can carry it around with you on an external drive or via the cloud. It
supports over ten languages.

59
Note: Practice Personal Hygiene protocols at all times.
11. CCleaner Portable (Software Cleaner)
It seems contradictory to download a large software file just to clear up space
on your computer, so it makes sense you’d use CCleaner’s portable version to clean up
your files and ensure your computer’s protected from viruses. Along with clearing up
space, CCleaner cleans out cookies and files that could put your privacy at risk.
12. Foobar2000 (Audio Player)
Foobar2000 is a media player that supports most popular audio formats, and lets you
rip audio CDs, create playlists, and play natively from within the app. It also touts an
easily customizable user interface with advanced tagging capabilities and customizable
keyboard shortcuts, allowing you to customize your user experience more than you
could with iTunes or Spotify.
13. Geek Uninstaller (Software Cleaner)
If you uninstall something using Windows' add/remove button, it isn’t
completely eliminated from your computer -- there are still junk files or folders left
behind. Geek Uninstaller permanently rids your computer of unwanted files, including
any unintentional residue left over. The app also offers a “Force removal” button for
difficult-to-remove programs. Plus, since it’s portable, it doesn't contribute to clutter.

Learning Competency with Code: Prepare Installer. (TLE_IACSS9-12ICC_If-j-29)


➢ Carry out installation of portable applications in accordance with software
user guide and software license.
Activity 1
Direction: Choose the letter of the correct answer and write it on the space provided.
____ 1. If you’re a freelance designer, this portable software tools for vector
graphics, creating illustrations, charts, and logos is called
a. Gimp b. Inkscape
c. Stickies d. Apache open office
____ 2. If you want to use a word processor, spreadsheets, presentations, vector
drawing, and databases, what portable software you need to use?
a. Inkscape b. Foobar2000
c. Gimp d. Apache open office
____ 3. This is a secure choice for browsing the web, checking emails, or anything
else you might need to do, what type of web browser you will use?
a. Google Chrome b. Linux
c. LLMC d. Apache open office
____ 4. If you want to create business charts and presentations. It has an intuitive
interface and provides easy-to-use templates, what appropriate portable
application you use?
a. Apache open office b. Google Chrome
c. Inkscape d. XMind
_____ 5. This portable application software supports most popular audio formats,
and lets you rip audio CDs, create playlists, and play natively from within
the app.
a. VLC Media player b. Xmind
c. Foobar2000 d. Gimp
60
Note: Practice Personal Hygiene protocols at all times.
Activity 2
Directions. Arrange the steps in creating a portable application using
motherboard. Write number 1 before the sentence which do you think the first
step and so on.

______ 1. Download Universal Extractor and WinRAR


______ 2. Find the EXE file that runs the program
______ 3. Copy the file to your USB drive
______ 4. Download the application setup file
______ 5. Uni Extract the Setup file
______ 6. Pack all the files into an archive

Reflection:
What have I learned in this activity.
1. I have learned that _____________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

2. What are some issues or questions you would like to explore further?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for
Computer Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer
Systems Servicing NCII s. 2016
4. Learning Resource Portal - lrmds.deped.gov.ph
5. https://en.wikipedia.org/wiki/Portable_application
6. www.makeuseof.com/tag/create-portable-app-flash-drive
7. https://blog.hubspot.com/marketing/portable-apps
61
Note: Practice Personal Hygiene protocols at all times.
ANSWER KEY

Activity 1
1. b
2. d
3. a
4. d
5. c
Activity 2
1. 2
2. 4
3. 6
4. 1
5. 3
6. 5

Prepared by:

MARK ANTHONY M. FERNANDEZ JIMMY F. CABUNGCAL


Teacher I Teacher II

62
Note: Practice Personal Hygiene protocols at all times.

You might also like