Grade 10 Q2 TLE-CSSNCII LAS
Grade 10 Q2 TLE-CSSNCII LAS
Grade 10 Q2 TLE-CSSNCII LAS
COMPUTER
SYSTEMS
SERVICING
1
Note: Practice Personal Hygiene protocols at all times.
Republic of the Philippines
Department of Education
Region II – Cagayan Valley
COPYRIGHT PAGE
DEPARTMENT OF EDUCATION
Regional office No. 02 (Cagayan Valley)
Regional Government Center, Carig Sur, Tuguegarao City, 3500
“No copy of this material shall subsist in any work of the Government of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall be necessary for
exploitation of such work for profit.”
This material has been developed for the implementation of K to 12 Curriculum through the Curriculum
and Learning Management Division (CLMD). It can be reproduced for educational purposes and the
source must be acknowledged. Derivatives of the work including creating an edited version, an
enhancement of supplementary work are permitted provided all original works are acknowledged and the
copyright is attributed. No work may be derived from this material for commercial purposes and profit.
Consultants:
Regional Director : ESTELA L. CARIÑO, EdD., CESO IV
Assistant Regional Director : RHODA T. RAZON, EdD., CESO V
Schools Division Superintendent : RACHEL D. LLANA, PhD., CESO VI
Asst. Schools Division Superintendent : JONATHAN A. FRONDA, PhD., CESE
Chief Education Supervisor, CLMD : OCTAVIO V. CABASAG, PhD.
Chief Education Supervisor, CID : EVELYN V. RAMOS
Development Team
Writers : JONATHAN DJ. DIONISIO, ZENAIDA B. TACADENA,
MARIE JOY C. REYES, NIKO NEAL P. FARIÑAS,
FERDINAND L. FRANCO, RICARDO E. JUEVES JR.
Content Editor : OSMUND R. ESPEJO
2
Note: Practice Personal Hygiene protocols at all times.
Language Editor : MARIA ANGELICA B. CARBONELL
Illustrators : NIKO NEAL P. FARIÑAS, MARIE JOY C. REYES
Layout Artist : ZENAIDA B. TACADENA
Focal Persons : ORLANDO D. VICENTE, PhD.
: BERMELITA E. GUILLERMO, PhD.
: LESLIE S. DOMINGO
: RIZALINO G. CARONAN
3
Note: Practice Personal Hygiene protocols at all times.
COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ________________________________ Grade Level: _________
Section: _________________________________________ Date: _______________
4
Note: Practice Personal Hygiene protocols at all times.
For your information.
5
Note: Practice Personal Hygiene protocols at all times.
Installing Windows Server 2008 is pretty straightforward and is very much like
installing Windows Vista. For those of you who have never installed Vista before, the entire
installation process is different than it used to be in previous Microsoft operating systems,
and notably much easier to perform.
To use Windows Server 2008, you need to meet the following hardware requirements:
Component Requirement
a. Processor
● Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor) • Recommended: 2GHz
or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for
Itanium-based Systems
b. Memory
● Minimum: 512MB RAM • Recommended: 2GB RAM or greater • Maximum (32-bit
systems): 4GB (Standard) or 64GB (Enterprise and Datacenter) • Maximum (64-bit
systems): 32GB (Standard) or 2TB (Enterprise, Datacenter and Itanium-based
Systems)
c. Available Disk Space
● Minimum: 10GB • Recommended: 40GB or greater Note: Computers with more than 16GB
of RAM will require more disk space for paging, hibernation, and dump files d. Drive
● DVD-ROM drive
e. Display and Peripherals
● Super VGA (800 x 600) or higher-resolution monitor • Keyboard • Microsoft Mouse
or compatible pointing device
Peripherals/devices drivers
Device Drivers A device driver (commonly referred to as a driver) is a computer
program that operates or controls a particular type of device that is attached to a computer. A
driver provides a software interface to hardware devices, enabling operating systems and
other computer programs to access hardware functions without needing to know precise
details of the hardware being used.
A driver typically communicates with the device through the computer bus or
communications subsystem to which the hardware connects. When a calling program invokes
6
Note: Practice Personal Hygiene protocols at all times.
a routine in the driver, the driver issues commands to the device. Once the device sends data
back to the driver, the driver may invoke routines in the original calling program. Drivers are
hardware-dependent and operating-system-specific. They usually provide the interrupt
handling required for any necessary asynchronous time-dependent hardware interface.
Because of the diversity of modern hardware and operating systems, drivers operate in many
different environments.
Activity 2: Match Me
Directions: Match the process performed in Windows Server Installation 2008 with the
images below. Choose your answer from the box and write the letter of the
correct answer on the space provided before each number.
___1.
___2.
https://www.petri.com/images/core_inst_
https://www.petri.com/images/core_inst_
8
Note: Practice Personal Hygiene protocols at all times.
___3.
___4.
https://www.petri.com/images/core_inst https://www.petri.com/images/core_inst_
___5. ____6.
https://www.petri.com/images/core_inst_ https://www.petri.com/images/core_inst
____7. ____8.
https://www.petri.com/images/core_inst_ https://www.petri.com/images/core_inst_
9
Note: Practice Personal Hygiene protocols at all times.
____9. ____10.
https://www.petri.com/images/core_inst_
https://www.petri.com/images/core_inst_
Adherence to the
Procedures (30%)
- Burn your
“INSTALLER” folder
to DVD.
- Copy and paste the
“INSTALLER” folder
to your USB flash
drive.
10
Note: Practice Personal Hygiene protocols at all times.
Workmanship (15%)
- Check the needed
drivers to be installed.
Functionality (40%)
- Had set up a functional
customized installer.
My Reflection
Congratulations! You have reached the end of the module. Did you fully understand
the activity? Let us now reflect on your learning journey with us. Complete the following
phrase.
⮚ I believe that
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
____________________________
⮚ I learned that
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
____________________________
11
Note: Practice Personal Hygiene protocols at all times.
References:
● DepED Learners Material in ICT CSS for Grade 10
● Kto12 TLE ICT CSS Curriculum Guide
● HASOP (Hardware, Software, and Peripherals) Reference Manual, 2005
● SICAT TESDA
● Training Regulation TESDA
● Understanding Assembly, Upgrade, Repair, and Digital Design by Jemma
Development Group.
Answer Key:
Activity 2: Match Me
1. F 6. C
2. E 7. H
3. J 8. B
4. I 9. G
5. D 10. A
12
Note: Practice Personal Hygiene protocols at all times.
COMPUTER SYSTEMS SERVICING
GRADE 10 TLE-ICT/CSS
Name of Learner: ___________________________ Grade Level __________________
Section: ___________________________________ Date Submitted: _______________
2.3 Carry out the installation of portable applications in accordance with software user
guide and software license
Given below is a list of portable applications that you might want to use and store.
These portable applications are compatible with Windows, Linux, and Mac.
14
Note: Practice Personal Hygiene protocols at all times.
Audacity - a simple audio editor and recorder
15
Note: Practice Personal Hygiene protocols at all times.
Gimp
Google Drive - can store files, save email attachments, and back up
photos and videos
16
Note: Practice Personal Hygiene protocols at all times.
you to place virtual sticky notes on your screen
1 ✔ Download the
following if these are
not available on your
computer;
17
Note: Practice Personal Hygiene protocols at all times.
or UniExtract
● Install both
2 programs–we need
both to make this
work. Make sure you
allow both programs
to associate with
their respective file-
types and restart the
computer if
prompted.
● Right-click your
downloaded setup
file (example
18
Note: Practice Personal Hygiene protocols at all times.
Audacity or Firefox)
and click
“UniExtract here”.
● Go ahead and specify
a folder that you
would like to extract
the setup file to. A
folder will be created
with the extracted
files inside. Open up
that folder for the
next step.
Note: If UniExtract
fails to Extract the
content, you can
use Winrar to Extract
the setup files
● In that extracted
folder, look for
the .exe file that runs
the program. It is
easy to spot and
usually has the same
name as the program
you’re trying to
install. For instance,
19
Note: Practice Personal Hygiene protocols at all times.
the .exe is named
“audacity.exe” or
“firefox.exe”.
● Double click the file
and verify that it runs
the program
successfully.
● In the resulting
dialogue box, name
your archive
“Audacity Portable”
or whatever you
prefer. Under
compression method,
select “Best”, and be
sure to check “Create
SFX archive”.
20
Note: Practice Personal Hygiene protocols at all times.
● Next, click the
‘Advanced’ tab and
click “SFX
Options…”. In the
“Run after
extraction” field,
input the name of the
.exe file that you
located in Step 4. In
my case, the name
was “audacity.exe”.
21
Note: Practice Personal Hygiene protocols at all times.
● Lastly, go to the
‘Update’ tab and
select “Overwrite all
files”. Now go ahead
and hit OK, and
watch WinRAR
generate an
application file.
● Drag the application to your Flash drive (or any storage device) and
then give it a test run!
6
● Double click the application to run it.
22
Note: Practice Personal Hygiene protocols at all times.
name found in Table 1. Write your answer in the space provided below each
image.
Table 1. List of Portable Application Software
1. ______________ 3. ______________
23
Note: Practice Personal Hygiene protocols at all times.
2. ______________
7.
______________
8._________________ 9._____________
Activity 2: STORE ME
Directions: Given in Table 1 are images of storage devices. Identify those devices that can be
used to store portable applications. Write your answers on the space provided
below the table.
24
Note: Practice Personal Hygiene protocols at all times.
Table 1. Images of devices used for storing application software
DVD R or DVD RW
Flash Drive
CD ROM
Memory Card
25
Note: Practice Personal Hygiene protocols at all times.
Activity 3: ARRANGE ME
Directions: Given below are the steps in creating portable applications. Arrange these steps
from the first step to the last step by placing a number (1-6) before the
statement that corresponds to the correct step.
______ Install Universal Extractor and WinRAR
___________________
______ ___________________
Find the EXE file that runs the program ___________________
Activity 4: ANSWER ME
Directions: Answer the following questions based on your understanding.
26
Note: Practice Personal Hygiene protocols at all times.
REFLECTION: Complete the statement:
27
Note: Practice Personal Hygiene protocols at all times.
REFERENCES:
Christensson, Per. "Portable Software Definition." TechTerms. (July 2, 2016). Accessed Aug
3, 2020. https://techterms.com/definition/portable_software.
Ionescu, Alex. "Secrets of the Application Compatibility Database (SDB) – Part 1".
Retrieved January 19, 2012.
"Portable Application Conversion Technology". Sphinx Software. Archived from the original
on September 7, 2010. Retrieved January 19, 2012.
https://www.stickpng.com
ANSWER KEY
Activity 4: Answer Me
1. Answers may vary
2. Answers may vary
Prepared by:
KEY CONCEPTS:
Prepare Installer
E. Create a bootable partition. Once the USB drive is clean, type in create partition
primary. You will see a message saying that the operation was successful.
F. Select the new partition. Enter the command select partition 1 and press Enter. Once you
receive a confirmation message, type active, and press Enter. This will activate the partition.
G. Format the USB drive. Input the command format fs=fat32. When you press Enter, the
program will work for a few minutes (if it is a small USB, e.g. 32Gb could actually take
hours to SLOW format), and the progress will be displayed as a percentage.
H. Assign the USB a drive letter. Enter the command assign to give the thumb drive a letter
designation. Type exit to end the disk management program.
I. Copy the operating system. Once the USB drive has been made bootable, you can copy
over the installation files for the operating system you want to install. You can do this by
dragging and dropping using your preferred file manager/explorer.
a. Copy over any drivers you might need during the operating system installation to
make the process much smoother.
Note: You can also create a bootable USB Drive using a third-party software.
Activity 1: Rearrange the Procedures
Directions: Arrange the following procedures on how to make a Bootable USB using CMD.
Use numbers (1-10) to indicate their order of precedence. Write your answer on
the space provided.
1. Diver pack
2. Antivirus
3. Disk utilities
4. WinRAR/WinZip
5. PDF reader
6. Flash Player
7. Internet browser
8. Office applications
9. CD and DVD burning software (Power ISO, Nero, or Magic Iso)
10. Installer and run CD/DVD burning software on your computer
11. Burn your “INSTALLER” folder to DVD. If you are using Flash Drive, just
copy and paste the “INSTALLER” folder to your USB flash drive.
Workmanship (15%)
Functionality (40%)
Prepared by:
Background Information
This learning activity sheet will help you understand better the concepts and skills of
maintaining and repairing computer systems and networks. Try your best to go over the
activities and answer the questions or items asked for.
Learning Competency:
LO 1. Plan and prepare for maintenance and repair. (TLE_IACSS9-12MRCN-IIa-e-
40)
Objective/s:
1. plan on how to maintain computer and network systems.
2. identify faulty computer and network systems.
Activity 1. Plan it
Directions: Read the given information below before answering the given activity.
Directions: The following items are descriptions of Planned Maintenance (PM) and
Condition Based Maintenance (CBM). Identify the given descriptions by putting
a checkmark (√) on the corresponding column for Planned Maintenance (PM)
and Condition Based Maintenance (CBM).
Activity 3. Protect me
Activity 3.A
Directions: Study the given table below that contains the guidelines describing how
computer technicians, students, and computer users can work together to achieve a
productive workplace environment. Then answer the activity that follows.
Guidelines Descriptions
1. Place your computer in This will allow proper circulation of air inside the
a well-ventilated area computer unit
2. Treat your Computer This means taking care of your computer. It
properly. should be properly turned off.
3. Back up your files This protects your files by storing your file
backups on your hard drive or any removable
device regularly.
4. Delete temporary files. This enhances speed and will create more spaces
for your files
5. Install or secure This makes your files more secure
passwords.
6. Update anti-virus This is for your computer protection against
viruses
7. Move the computer This to avoid damages by turning off when
only when it is turned transferring the computer to another location
off or unplugged.
8. Schedule the use of a This Helps lessen the attack of viruses and
computer for its longer increases the life span of your computer
life.
Activity 3.B
Directions: The following pictures show the proper care and maintenance of your computer.
Match them with the guidelines in Activity 3.A. Write the corresponding number
of the guideline only in the third column
1.
5
Activity 4. What’s your issue?
Preventing Computer System Failure
Computers in general, are pretty stable, and you can easily rely on them not to
fail you. However, If you develop some basic habits, you can postpone serious
computer problems, if not avoiding them entirely.
Directions: The crossword puzzle below consists of issues related to computer system failure.
You can find them in horizontal (rightward or leftward), vertical (upward or
downward), and diagonal directions. Encircle the words then write each issue
below the puzzle.
A B W A R R A N T Y D W
R B A C K U P X X U T E
E R R O R M E S S A G E
G I N M X X R T R I E T
A M I P Y Y A Y T R I S
S E N U Z Z W M A R I U
U S G T X X L Y A R R D
L Y R E E R A W D R A H
R S S R E S M S U R I V
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Activity 5. Failure no More
Directions: The following are ways of preventing computer system failure. Unscramble the
letters in the third column to determine the issue being prevented. Write your
answer on the blanks below the unscrambled letter.
Directions: Fill the blanks in the third column to complete the action statement. The
first letter of the word is given.
No Network Problem Action
1 Unplugged Ensure your wired or wireless network hardware is
Network Cable switched on and P____________in.
2 Website Try visiting several popular W______________rather
Temporarily than just one.
Offline
3 Computer Firewall Temporarily disable S_____________ firewalls installed
Malfunctions on your computer to determine whether it may be the
cause of internet connection problems.
4 Wireless Network Confirm that the W_______________channel number
Configuration and encryption keys on your router have not recently
changed.
5 Broadband Router Check the router’s lights and console if possible to
or Access Point ensure it is running and responding properly.
Malfunctions Troubleshoot and reset the R________________ if
necessary.
6 Blocked By Your Contact your I_______________ Service Provider (ISP)
Service Provider if you suspect your account has been blocked.
7 Computer GlitchesCheck the computer and remove any
M________________that you will find.
8 Network Downtime Contact your internet provider to verify whether they are
experiencing an outage. Some providers also give advice
on T______________________ problems connecting to
their network.
Assessment 1. Fill me
Directions: Read the questions that follow and fill the missing vowels to complete the word.
Write your answer on the blank provided.
What maintenance refers to task performed to identify, isolate and rectify a fault
so that the failed equipment or system can be restored?
C __ R R __ C T __ V __
Answer: _____________________________
What kind of ware is maintained when you treat your computer properly?
H __ R D W __ R ___
Answer: _____________________________
Back – up Delete
Schedule Update
Treat Move
Install Unplug
In action…
What actions should be best done to address the following network problems?
Directions: Rearrange the letters inside the parenthesis to form the correct word that will
complete the sentence. Write your answer on the blank provided.
For unplugged ______________________ (TENWORK) cable, ensure
your wired or wireless hardware is switched on and plugged in.
For computer__________________________(LLAWREFI)
malfunctions, temporarily disable to determine whether it may be the cause
of internet connection problems.
Reflection
Complete the sentence starters by writing what you have learned and what you want to learn
more about the lesson
I learned that
References
● DepED Learners Material in ICT CSS for Grade 10
● Kto12 TLE ICT CSS Curriculum Guide
● VectorStock.com
● Shutterstock.com
● Dreamstime.com
Prepared by:
Direction: Identify the Symptoms & Resolutions of the following system Errors
1. Processor Error
2. Memory Error
4. Shutdown Error
5. Keyboard Error or no
Keyboard present
Prepared by:
ZENAIDA B. TACADENA
Writer
Things to REMEMBER…
FAULT – is the property that enables a system to continue
operating properly in the event of the failure of (or one or more
faults within) some of its components. If its operating quality
decreases at all, the decrease is proportional to the severity of the
failure, as compared to a naively designed system, in which even a
small failure can cause total breakdown.
Congratulations!!!
You have reached the end of the module. Did you fully understand the activity? Let us
now reflect on your learning journey with us. Complete the following phrase.
⮚ I learned that
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
____________________________
2. Memory Error Clean the memory contacts, and reseat the modules.
Remove all modules except the first bank. Replace the
memory. Replace the power supply. Replace the
motherboard.
3. Video Card Error Check the video card for proper installation. Try
replacing the video card memory, and replace the video
card. Replace the motherboard.
5. Keyboard Error or no Can't initialize the keyboard. Make sure the keyboard is
attached correctly and no keys are pressed during
Keyboard present POST. To purposely configure the system without a
keyboard, set the error halt condition in Setup to HALT
ON ALL, BUT KEYBOARD. The BIOS then ignores
the missing keyboard during POST.
6. Hard Disk(s) install Can't find or initialize the hard drive controller or the
drive. Make sure the controller is installed correctly. If
failure no hard drives are installed, be sure the Hard Drive
selection in Setup is set to NONE.
Activity 3: Match Me
1. 10 6. 5
2. 9 7. 4
3. 8 8. 3
4. 7 9. 2
5. 6 10. 1
References:
Cahapay Venus J. (2020) Lab General Safety – Contributor to DepEd Commons
Retrieved from: https://drive.google.com/drive/folders/1fbbK8_wEcmCK9Q_
RmA0BDn6WjV5coB6a
Maningas, Sherwin (2020) Occupational Health and Safety contributor to DepEd Commons
Retrieved from: https://drive.google.com/drive/folders/1Sd7sUBl_hKNhYG9PIHA
qcjOsgXFg-TUC
Directions: Write Pak if the statement is True and Bluff if the statement is False. Write your
answer on the space provided after each number.
1. ____. Using Personal Protective Equipment (PPE) protects the wearer’s body or
clothing from injury by electrical hazards, heat, chemicals, and infections.
2. ____. It is important that students and teachers during laboratory on demonstration of
skill should be required to use personal protective equipment
3. ____. Googles is large spectacles with a shield around the rims that cannot protect the
eyes from dust, excessive light, wind, etc.
4. ____. A special type of rubber shoes is used to prevent electrical shock and for
waterproofing and insulating purposes
5. ____. Apron is not a garment worn over the front of the body as a protection for one’s
cloth
6. ____. Face mask is used to cover the face to prevent the inhaling or absorbing dust
and other chemicals
7. ____. Using gloves for each finger is not for hand protection during laboratory.
8. ____. Little shock you experience while you are walking across the carpeted floor or
when touched a doorknob, table, or even another person is a result of static electricity.
9. ____. Do not use an anti-static wrist strap when working on a computer.
10. ____. Never plug an ATX power supply into AC power unless it is connected either
to a computer’s motherboard or to a dummy test load.
Activity 2: Troubleshooting and Repair Techniques (Multiple Choice)
Scenario 2: Eddie a computer technician employee on A3 Ace Enterprises
was assigned to maintain a school. When he got there he inspected the
Computer laboratory room and he noticed that it needs a lot of repair on the
devices and networks.
Directions: Choose the letter of the best answer. Write your answer on the space provided
for.
1. When replacing computer parts and peripherals, what needs to consider the following
factors?
a. Compatibility of the component
b. Specification of the component
c. Component form factor
d. All of the above
2. Corazon hears a series of long beeps on her computer. What components should be
replaced?
3. What is probably wrong when your computer monitor turns on but doesn’t seem to
display an image?
a. The light bulb (or LED bulb which provides the lighting of the monitor isn’t
working correctly
b. Your computer monitor isn’t connected to your computer correctly
c. The monitor firmware is broken
d. You used the wrong device driver on your computer for the current monitor
4. When you see a Blue Screen of death, what is the most likely cause of a windows
error on a typical home computer?
a. Bad computer memory (RAM) causes most Windows errors
b. Damage to the operating system (OS) from computer viruses causes most
Windows errors.
c. Bugs in Microsoft Windows cause most Windows errors
d. Bugs in non-Microsoft products cause most Windows errors
5. Just by listening to your computer, what are two computer problems easily
diagnosed?
a. You can hear magnetic hard drive problems and fan problems
b. You can hear network card problems and CPU problems
c. You can hear memory problems and computer monitor
d. You can hear sound card problem and video problems
6. You want to replace your sound card and video card in your integrated (built-in)
motherboard, can you replace the said component?
a. Yes you can replace built-in components, but you will need custom
replacement parts
b. No, you can’t normally replace built-in components
c. Yes, you can replace built-in component by using the right replacement
modules
d. Yes, you can replace built-in component using generic replacement modules
7. What do you call when you check the condition of the computer whether it is good or
bad?
a. Power-On-Self Test (POST)
b. A redundant array of independent disk (RAID) can warm you when a device
fails
c. Self-Monitoring and Reporting Technology SMART
d. Microsoft check-disk
8. What would you do if you suspect that the cause of the trouble in the network is the
cable?
a. Change the patch cable
b. Crimp another cable
c. Check the suspected cable using Multi-tester
d. Get a LAN tester and check the cable swap a good or working cable in place
with the suspected cable
10. After replacing a good cable, still, the computer cannot connect with each other,
what are the possible causes if the network is using static IP addresses?
a. Check for the IP address if it properly configured
b. Wrong DNS setting
c. Wrong IP address – maybe some computer doesn’t belong to the workgroup –
wrong subnet mask
d. Did not configure add a role
Activity 3: Problem Solving Emergency Situation (Match Me)
Directions: Match the definitions from column A to the words from Column B. Write your
answer to the space provided before each number.
Directions: Read the given basic steps of system troubleshooting. Arrange the given steps in
chronological order. Write the corresponding number of steps on the table
provided.
1. To enable the system to boot from a hard disk, make sure no floppy disk is in the floppy
drive. Or put a known-good bootable floppy with DOS or diagnostics on it in the floppy
drive for testing.
2. Turn off the system and any peripheral devices. Disconnect all external peripherals from
the system, except for the keyboard and video display.
3. Turn on the system. Observe the power supply, chassis fans (if any), and lights on either
the system front panel or power supply. If the fans don't spin and the lights don't light, the
power supply or motherboard might be defective.
4. Make sure the system is plugged into a properly grounded power outlet.
5. Observe the power-on self-test (POST). If no errors are detected, the system beeps once
and boots up. Errors that display onscreen (nonfatal errors) and that do not lock up the
system display a text message that varies according to BIOS type and version. Record any
errors that occur and refer to the disc accompanying this book for a list of BIOS error
codes for more information on any specific codes you see. Errors that lock up the system
(fatal errors) are indicated by a series of audible beeps. Refer to the disc for a list of beep
error codes.
6. Make sure the keyboard and video displays are connected to the system. Turn on the
video display, and turn up the brightness and contrast controls to at least two-thirds of the
maximum. Some displays have onscreen controls that might not be intuitive. Consult the
display documentation for more information on how to adjust these settings. If you can't
get any video display but the system seems to be working, try moving the card to a
different slot (not possible with AGP or PCI Express video adapters) or try a different
video card or monitor.
7. Confirm that the operating system loads successfully
Add all the scores to get the grand total and then divide it by the total number of
items.
ZENAIDA B. TACADENA
Writer
Things to REMEMBER…
1. RAM – Random Access Memory, is a primary memory. This memory is used inside
the computer to hold programs and data while it is running.
2. Power-On-Self-Test (POST) – is a test the computer must complete verifying all
hardware is working properly before starting the remainder of the boot process
3. Maintenance – to help keep equipment up and running, preventing any unplanned
downtime and expensive costs from unanticipated equipment failure.
4. Defect - This refers to an error, fault, or flaw in any computer program or a hardware
system. A bug produces unexpected results or causes.
5. Configuration – Physical layout, interconnections, and functional characteristics of a
computer system (usually called Configuration Item), outlined in its technical
documentation as required for its assembly, testing, installation, operation, and
maintenance.
6. Personal Protective Equipment (PPE) – is equipment worn to minimize exposure
to hazards that cause serious workplace injuries and illnesses.
7. Rectifying- enables you to perform specific tasks- solve problems, perform work.
8. Sound Device Driver Installer / Sound and Audio Devices – A windows 7.0
Control Panel applet, called Sounds, and Multimedia in Windows 2000, for
configuring the system’s sound card.
9. Preventive Maintenance - that is regularly performed on a piece of equipment to
lessen the likelihood of it failing. It is performed while the equipment is still working
so that it does not break down unexpectedly.
10. Repair - to put something damaged, broken, or not working correctly back into good
condition or make it work again
Personal Reflection
Congratulations!!!
You have reached the end of the module. Did you fully understand the activity? Let us
now reflect on your learning journey with us. Complete the following phrase.
⮚ I learned that
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
____________________________
In general, testing is finding out how well something works. For human beings,
testing tells what level of knowledge or skill has been acquired. In computer hardware and
software development, testing is used at key checkpoints in the overall process to determine
whether objectives are being met. For example, in software development, product objectives
are sometimes tested by product user representatives. When the design is complete, coding
follows and when finished, this is then tested at the unit or module level by each programmer;
at the component level by the group of programmers involved; and at the system level when
all components are combined. At the early or late stages, a product or service may also be
tested for usability
Scenario:
Jhon, a grade 10 student of diamond section at Malaya National High School is
tasked to dis-assemble and assemble a tower type system unit. The lab room number is
Room 101 on February 21, 2020. As his lab partner, you are asked to assist him.
Unfortunately, Jhon accidentally cut himself because of a sharp object inside the object.
Directions: Make an Accident Report about what happened to Jhon by filling in the form
provided below. Be guided by the rubric given.
Room No:
Name: Year/Section:
Criteria Score
Complete data 10
1 data is missing 8
Reflection
In this lesson, I learned
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
_______________________
Activity 2: Technical Report on Test Conducted
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation.
Directions: Complete the form by writing your answer in the space provided.
Reflection
Data:
The device needs to be tested: Wireless NIC
Specification: Intel 3160HMW Wifi Bluetooth 4.0 Wireless AC 3160
Diagnosis: Cannot connect to the internet
Device Tested:
Specification:
Diagnosis:
Action taken:
Remarks:
Reflection
In this lesson, I learned
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
________________________
Activity 4: Configuration Skills
Directions: Listed below are the most important skills one must have to configure computer
systems and networks. The matrix lists the skills expected you to master. Check
the appropriate column which describes the level of your confidence with the
given skills.
Total
Grand total
Add all the scores to get the grand total and then divide it by the total number of
items. Refer to the verbal interpretation to determine your initial configuration ability.
Numerical and Verbal Interpretation
Prepared by:
Diagnosis: No display
Remarks:
RAM was not properly connected (may vary)
Device Tested:
Wireless NIC
Specification:
Intel 3160HMW Wifi Bluetooth 4.0 Wireless AC 3160
Diagnosis:
Cannot connect to the internet
Action taken:
Check for IP Address (convert IP address from static to dynamic)
Remarks:
IP address is static