0% found this document useful (0 votes)
253 views35 pages

Connect Hardwre Peripherials

The document provides information about connecting hardware peripherals including confirming client requirements, obtaining required peripherals, and connecting a workstation to the internet. It also discusses computer basics such as definitions, components, functions, generations, and classifications by data type, size, and purpose.

Uploaded by

Gizaw Tadesse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
253 views35 pages

Connect Hardwre Peripherials

The document provides information about connecting hardware peripherals including confirming client requirements, obtaining required peripherals, and connecting a workstation to the internet. It also discusses computer basics such as definitions, components, functions, generations, and classifications by data type, size, and purpose.

Uploaded by

Gizaw Tadesse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Shashemene Poly Technique Collage

INFORMATION TECHNOLOGY SERVICE MANAGEMENT


CONNECT HARDWARE LEARNING GUIDE

Some of hardware peripherals

MODULE TITLE: Connecting Hardware Peripherals


LEARNIG OUTCOME:-
 Confirm requirements of client
 Obtain required peripherals
 Connect hardware peripherals
 Connect workstation to the internet

Introduction
This module is designed to equip the required knowledge, skill and attitude to connect
hardware peripherals according to instructions and a workstation or networked computer to the
internet in accordance with the occupational standard.

1
Prepared by B.T
Shashemene Poly Technique Collage

Introduction to computer
What is computer?
It is nothing but any electronic machine w/c can process data without human interaction. It is a
programmable electronic device/machine that accepts data as input, stores and processes it, and
then gives the information as output.
A computer is an electronic device/machine capable of manipulating numbers and symbols by:
I. Taking data as an INPUT (using keyboard or mouse).
II. Storing the input in memory for further use.
III. Process it under the control of a stored set of instruction called a program
IV. Then gives the output (using Monitor) as meaningful information to user.
The parts of a computer that make up the computer systems are consist of Hardware and
Software. Software is a program or set of instructions that make the computer work.
Hardware is the physical body that we can touch, see and feel its existence with our hand.
Computer hardware consists of four basic elements:
Input devices: used to enter data into the system.
Output devices: used to display processed data or result from the system to end users.
Central Processing Unit (CPU): used to perform every tasks performed by
computer. Any data entered to the system must be processed with the help of CPU.
Memory: used to store data within the system before and after processing
temporarily.
Function of a computer
PCs can be used to write letters, balance checkbooks, play games, managing business records,
and even teach children how to read.
The basic operations of a computer fall down to eight basic functions:
 Storing: Whatever you enter as input data can be saved and stored for later use.
 Retrieving: Anything stored can be retrieved (read) and used again.
 Arithmetic operation: You can use computer to add, subtract, divide, multiply and
even higher mathematical operation.
 Logical operation: Includes comparing text, work with symbols, and graphical
images
 Displaying (out put) :The information you’re working with the computer appears on
a screen or monitor so you can see what you are doing.
 Editing : After you are receive the information, you can change it, add to, or erase it.
 Printing: One of the greatest capabilities of a computer is that after you finalize your
wok, it can be transferred to paper.
 Sending and Receiving: With the development of computer networks, you can
communicate with other computer users by sending them documents or messages,
regardless of where in the world those users are.
History of Computers

2
Prepared by B.T
Shashemene Poly Technique Collage

Over the last few years of man’s existence many discoveries and inventions have directly
and indirectly contributed to the development of the personal computer: Analog devices, Digital
devices, calculators, electronic Materials etcetera. The development of computers is then
assumed to begin with these calculating devices.
In the early days, man used to exchange goods, count with his fingers, sticks and pebbles,
scribble on sands.
But technological development demand faster computing devices. This led to the development of
computers. Charles Babbage, a mathematics professor in Cambridge England, is considered
being the Father of Computers because of his mechanical computing engines invention. His
principles have contributed a lot to the present day computers.
Generation of computers
Depending on the type of materials used and their facilities the earliest generation computers and
the modern generation computers have certain characteristics peculiar to them.
Modern age (1940 to present) computer technology is under continuous improvement.
Computers in the latest generation:
 Are getting cheaper in price.
 Are getting smaller in volume size.
 Dissipate less heat.
 Consume less power (up to 200 watt).
 Have larger memory capacity and much processing speed
 Have better lifespan
 They are getting more reliable
 Have better programming capability
 Have similar maintenance schedule
 The programs are becoming more user friendly.
The improvement of computer technology from the early to the latest generation is summarized
in the following table.
Secondary
Generations Circuit Storage Language Operating Access
Element System Time

1st generation Operator 1 Milli Sec


(1944-58) Vacuum Punch Card Assembly Controlled
Tube
2nd generation (COBOL) &
(1959-63) Transistor Magnetic FORTRAN Batch 10
Tape MilliSec
3rd generation Circuit Structured
(1964-70) -Chips of Magnetic (PASCAL) Interactive 100 Nano

3
Prepared by B.T
Shashemene Poly Technique Collage

Silicon Disk (Time Sharing)


4 generation (1971-
th
VLSI Application
present) (Very Large Variety of Oriented 1000 Nano
(PC 1974 Scale Mass Storage (Visual Virtual
Microprocessor) Integrated) Basic)

Classification of Computer
We can classify computers based on the following methods:
I. Classification based on the type of data computers process.
A. Digital computers: Such type of computers can Receive and process discrete data
in the form of digits (0 & 1). E.g. calculator and personal computers.
B. Analog Computers: These types of computers used to measure instruments and
reading continuous data .E.g computers with thermometer, Voltmeter.
C. Hybrid Computers: These computers have the combined features of digital and
analogue computers.
II. Classification of computers based on the size, memory, capacity, and speed of
computers.
A. Microcomputers: are called personal computers or just PC. These are smallest in
size and capacity and are applicable for office, home and personal use.
E.g. palmtop computers, notebook computers, laptop computers and Desktop (or
tower top) computers.
B. Minicomputers: are larger in size and capacity than PCs. They are popularly used in
scientific laboratories research centers, universities and colleges.
C. Mainframe computers: these types of computers process a vast amount of
information and have a much higher processing speed and capacity than the above
two. They can be used in higher organizations like Ethiopian airlines designed for
complex operations.
D. Supercomputers: are the most powerful computers, fastest, and the most expensive
type of computers. An example can be computers in NASA & the Earth Simulator in
Yokohama.
III. Classification by purpose of application
Computers can be applied or used for different purposes. Based upon their application, they are
classified as special purpose or general purpose.

A. Special purpose computers


They are designed to solve a single type of problems, that is their components and function are
uniquely adapted to specific situation involving specific application. They have set of
instructions permanently programmed into them that are designed to perform only one major

4
Prepared by B.T
Shashemene Poly Technique Collage

function. For example Public telephone box, traffic control system and ticket machine, calculator
etc.
B. General purpose computers
They are designed to handle verity of tasks. This is possible by utilizing the “store program
concept”. A program or set of instruction designed to solve problem is read and stored into
memory and then executed by the computer one by one. The same computer can be applied to
solve another set of problem using different program. General purpose computers are more
flexible and versatile. Eg. PCS.
The following are commonly used computers in different work area to perform different tasks
related to us:
Personal Computer
These are the most widely used type of computers for personal, home and office use, educational
training in schools, and in small business enterprises. They are known by their brand names such
as Toshiba, Compaq, Dell, or Hewlett-Packard, IBM etcetera.
Basically they can be grouped into four:
Palmtop computers
Hand-held or palmtop, computers are gaining popularity. Although they become more
sophisticated with each new model, palmtops generally have limited features and capabilities. It
is normally used for limited number of functions as grammar and dictionary checking, calendar
checking notebook, and if possible to connect to other computers over network.
Notebook computers
They are normal textbook sized. Such computers are easily portable.
Laptop computers
They are briefcase sized designed for portability. All are connected to server as a single unit.
We can use laptop computers on top of our lap when going in a car, on airplane, or even in a
café.
Notebook and Laptop computers
These computers are very convenient because they are designed for portability. The system case,
monitor, keyboard, and all internal workings are all in one light, compact case. Plus, although
these computers come equipped with AC adapters they can run on batteries making it very easy
to pick up and go at a moment’s notice.
All of the above listed computers are used to process data by using data processing cycle. Data
processing is “getting the right information to the right person at the right time”. Data is any
collection of basic facts about certain person or thing. Data becomes information after it is
processed by central processing unit (CPU).
Input Process Output

Input: Computer must get input from end users through input devices.
Process: Data is stored on memory and CPU gets that data to perform process
accordingly.
5
Prepared by B.T
Shashemene Poly Technique Collage

Output: Finally the processed data or information is displayed through output devices.

INFORMATION SHEET LO1


ICT ITS1 01 0710
Confirming requirements of client
MODULE Connecting Hardware Peripherals
Introduction to Peripheral devices
Peripherals devices are device those contain components connected to system unit. They are not
connected directly with motherboard simply connected on the outer part of system unit. That
means they are connected to motherboard indirectly.
Peripheral devices are divided into:-
 Input devices
 Output devices
 Secondary storage devices
Input device: Any devices those are used to enter data in to the computer/system. Computer
must get input through input device and then process it with the help of central processing unit
(CPU) display result through Output device. The following are some of input device:
1. KEYBOARD: Is an input device used to enter data. It consists of different buttons or
keys that a user presses to enter data.

Keyboard with its sections


Common keys & their usage in data application:
 ESC(escape key) : cancel \undo/ clear preview
 CAPS LOCK: upper case
 Function key (F1:F12)
 Space bar: to insert blank space.
 Back space key: backward direction.
2. The mouse: It detects the direction of the ball movement And sends the information to
the screen to move a pointer that we use to make selection.

3. Digital Camera/Web Camera: used to enter


photos into the system. It takes photo, store
and send it as digital input of the system.

6
Prepared by B.T
Shashemene Poly Technique Collage

a. Image can be input in to a computer using a digital/web camera.


b. The digital camera takes a still photo graph, stores it and then send it as digital
input into the computer.

webcamera

4. Scanner: it is a device used to import pictures, photos or any important documents to


the computer. It is used to convert hardcopy to softcopy.

Scanner

OUTPUT DEVICE: Any peripheral device used to display


information from the computer, once the CPU has executed the program instruction; the program
may request that information be communicated to an output device. The following are some of
output device:
1. MONITOR/VIDEO DISPLAY UNITS

 Most full-sized personal computer use a television-like display device called a screen,
monitor or
CRT(Cathode
Ray Tube)
 Laptop computers, flat screen displays & handheld computer use a flat panel liquid crystal
display (LCD)
 The video display monitor or screen attached to the computer gives you feedback while you
are typing characters from keyboard. The display screen can be used to display both text
(alphanumeric & graphics).
2. LCD PROJECTOR
LCD Projector use as an out device for displaying the computer output in large screen, this
device manly used in conference and class room lecture to display for large number of attendant.
3. PRINTER: Is one of the output devices that used to produce a paper copy by converting
softcopy to hardcopy. It gives information to the user in printed form.
Softcopy: Any document found inside the system that needs to be printed.
Hardcopy: Any document found in paper format or printed documents.

7
Prepared by B.T
Shashemene Poly Technique Collage

Printer
4 Plotter
A plotter is an output device similar to a printer, but normally allows you to print larger images.
Machine used to produce different poster papers.
While we connect peripheral devices, computer can automatically detect it or may need
manual configuration (software to be installed) .Some peripheral deceives are plug and play
and others are Non plug and play.
Plug and play: A set of specifications developed by Intel that allows a computer to
automatically detect and configure a device and install the appropriate device drivers. Keyboard,
mouse and LCD projector are some of plug and play peripheral devices.
Non plug and play: Computers cannot detect such devices automatically. A device, such as a
printer, modem, or game controller, requires manual configuration of hardware settings
before it can be used. We must need to install driver software of such devices to make them
acceptable by the system. Driver software is a program that allows Non plug and play devices,
such as a modem, network adapter, or printer, to communicate with the operating system.
Although a device might be installed on your system, Windows cannot use the device until you
have installed and configured the appropriate driver.
Secondary Storage Devices
Computer storage devices are very important for all computer users because they are used to
store important data that we need to use more or less often. They can store data out of the
system. Some of them are listed as follows:
Floppy disk: Is made from a thin piece of plastic coated with magnetic material on both sides.
The magnetic material is iron oxide most of the time. Data is written to disk by magnetizing and
demagnetizing the magnetic material. Floppy is divided into logical areas for storing data on
them. These are called sectors and tracks. This division is not visible for us. It is a logical
division which is understood by computer only.
Tracks are narrow concentric circles on a disk.
Sectors are pie shaped slice of individual tracks. Sectors form the unit for data storage. Data is
written or read one sector at a time. A single sector can store 512 bytes. The division allows
floppy to be random access device. Data can be read from any sector or track easily. It is
Magnetic storage device w/c stores small amount of data around 1.44MB.

Flash drive: Is a compact and portable electronic storage device w/c we use
to store data. Such storage device can be connected to
the system through USP ports.

8
Prepared by B.T
Shashemene Poly Technique Collage

CD (compact disk): Is also one of secondary storage device used to store data. Unlike that of
floppy disk CD store a huge amount of data.

CD

This device is divided in to three:


CDR (Compact disk Recordable): it is used to store data, once data is stored on such
disk no one can delete it.
CDRW (Compact disk Rewritable):It is also used to store data but we can re-use it by
deleting unwanted data and replace it by new one.
CDROM (Compact disk Read Only Memory): it can store a huge amount of data up to
700MB for a long period of time. Unlike that of CDRW data on such CD can’t be
deleted and as well we can’t add new data even on free space. We can’t delete data
from both CDR and CDROM but their difference is that on CDR we can add new data if
we have free space.
COMPONENTS FOUND WITHIN THE SYSTEM UNIT
The system unit, sometimes called the chassis, is a box-like case housing the electronic
components of a computer that are used to process data. System unit components include the
processor, memory module, cards, ports, and connectors. Many of the system unit’s components
reside on a circuit board called the motherboard. The motherboard contains many different
types of chips, or small pieces of semiconducting material, on which one or more integrated
circuits (IC) are etched. An integrated circuit is a microscopic pathway capable of carrying
electronic current. Each IC can contain millions of transistors, which act as switches for
electronic signals.  

9
Prepared by B.T
Shashemene Poly Technique Collage

System unit components 

Central Processing Unit


The central processing unit (CPU), also called a processor or microprocessor,
significantly impacts overall computing power and manages most of a computer’s operations.
CPU can perform/process the overall tasks that need to be performed by machine. Like that of
human brain w/c makes human being to think and helps to do something, computer uses CPU for
process data as well as managing the instructions/operation. So that CPU is a brain of computer.

CPU
The CPU contains the control unit and the arithmetic/logic unit.
The control unit directs and coordinates most of the operations in the computer. For every
instruction, the control unit repeats a set of four basic operations called the machine cycle:
Fetching: the transfer of instruction or data item from memory.
Decoding: the conversion of instruction into commands the computer understands.
Executing: the commands, and, if necessary.
Storing, writing the result to memory.
The arithmetic/logic unit (ALU) performs the execution part of the machine cycle.
Specifically, the ALU carries out three operations (mathematical operations):

10
Prepared by B.T
Shashemene Poly Technique Collage

 Arithmetic operations: performing calculations, which include addition, subtraction,


multiplication and division.
 Comparison: comparing data items to determine if the first item is greater than,
equal to or less than the other item.
 Logical operation: working with conditions and logical operators such as AND, OR
and NOT.
A personal computer’s CPU usually is contained on a single chip, which some call a
microprocessor. Intel is a leading manufacturer of personal computer processors. Most high-
performance PCs use a processor from Intel called the Pentium® processor.
Motherboard
At the heart of every PC live certain core components. Motherboard is the PCs center of activity.
All devices in a computer are in some way or another are connected to motherboard.
Motherboard hosts the largest single collection of chips of any pc component. It has a grid of
wires that link all components making it possible to communicate with each other. Open circuit
paths called traces that resemble complicated road map carry signals (data) and voltage across
the motherboard. Therefore, it is not surprising if motherboard is data and power infrastructure of
the entire computer. It defines the computer’s limit of speed, memory, and expandability.
Chipsets
A motherboard comes with a variety of support chips soldered in place. These chipsets are
designed to work with CPU. These chips are highly complex and coordinated ICs that help CPU
manage and control the computer system. When replacing CPU, you must make sure the CPU
works (compatible) with the chipset supported by the motherboard. Otherwise the computer will
not work.

Motherboard
Memory
Memory is used to hold binary strings of data that is going to be manipulated by CPU. There are
two major classes of memory: non-volatile (ROM) and volatile (RAM).
Non-volatile memory keeps the content even if the computer is off or power is gone. The set up
data held in CMOS uses this technique.
In volatile memory, the data is lost when the computer loses power. It keeps data as long as
only computer is on. Random Access Memory is good example of volatile memory. By default,
when we say memory, we mean RAM.
Computer Memory is Measured in terms of :

11
Prepared by B.T
Shashemene Poly Technique Collage

Bit: All computers work on a binary numbering system, i.e. they process data in one's or
zero's. This 1 or 0 level of storage is called a bit.
Byte: 1 byte consists of eight bits.
Kilobyte: 1 kilobyte (KB) consists of 1024 bytes.
Megabyte: 1 megabyte (MB) consists of 1024 kilobytes.
Gigabyte: 1 gigabyte (GB) consists of 1024 megabytes.
RAM
Whenever you run a program on your computer, that program first loads into RAM before
anything happens. It holds temporary instructions and data for manipulation when the system is
running. It is called Random Access because CPU can access or place data to and from any part
of RAM on the system. RAM come in wide variety of modes defined by physical size, access
speed, electrical set up, and width of the bus measured in bits. The bit width of RAM defines the
amount of information your CPU can access or write to your RAM within one cycle.

Memory

Types of RAM
There are two types of RAM based on the way they keep data:
 Static RAM (SRAM)
 Dynamic RAM (DRAM)
1. DRAM
This memory is dynamic. Because of this, it must be constantly refreshed periodically ( every
few milliseconds). Otherwise the memory will drain and the data is lost. During the process of
refreshing, the CPU can’t access the memory. It is called wait state. Refreshing caused DRAM to
be slower than SRAM. They also use much power than SRAM. But because of their cheapness,
they are the primary RAM in all computers. The memory cells in DRAM use tiny capacitors that
retain charge. Capacitors are devices that can keep charge for some time until discharged. They
use one transistor per bit. Because of this they can be densely packed. This allows more memory
capacity per chip than other types of memory.
Disadvantage:
DRAM is slow, much slower than CPU. This affects the speed of CPU. It may take as much as
10% of CPU time.
2. SRAM
It is called static because it does not require periodic refreshing unlike DRAM. It is much faster
than DRAM and able to keep pace with processor. As long as there is power, SRAM keeps what
is stored. SRAM uses transistors for storage purpose, no capacitors are used. Because of this, no

12
Prepared by B.T
Shashemene Poly Technique Collage

recharging required. It uses 6 transistors per bit. DRAM is lower in density which means they are
larger physically and store fewer bits overall. The high number of transistors used per bit makes
it more expensive and physically larger. This prevented its wide use as computer memory.
SRAM is used to build cache memory.
Power Supply Unit
The basic function of power supply is to convert the type of electrical power available (Alternate
Current-AC) to the type computer circuitry can use (Direct Current). Power supply is designed to
convert 120v (American standard) or 220v (European standard) Alternating Current (AC) into
+3.3v, +5v, and +12 Direct Current (DC) needed by the computer components. Usually the
digital electronic components and circuits in the system (motherboard, adapter cards, drive logic
boards) use +3.3v or +5v power. The motors like disk drive motors, and fans use +12v power. In
addition to supplying power to the system, the power supply also ensures that the system does
not run unless power supply is sufficient to operate the system properly.
In other words, the power supply actually prevents the computer from running (starting up) or
operating until all correct power levels are present.

Power supply unit

Hard Disk: Magnetic storage device in the computer w/c have high storage capacity. Hard disk
is the data center of PC. It is here that all your programs and data are stored. A hard disk drive
contains rigid, disk-shaped platters. The platters are usually constructed of aluminum or glass; so
they can’t bend or flex unlike floppy disk. The platters are coated by magnetic substance on both
sides. Data is written to hard disk by magnetizing and demagnetizing the surface of the platters.
Data is stored on both sides of the platter.

Hard disk

Sound Card: The card w/c is used to connects the speakers and microphone to the computer for
displaying and entering sound from and in to the system.

Sound card

13
Prepared by B.T
Shashemene Poly Technique Collage

Modem: Modem card is the place where the computer is connected to the phone line and it is
connected to motherboard on the slot found on motherboard (slots).

Modem card

Network Interface Card (NIC): A circuit board that connects the computer to the rest of
the network usually using special cables called network cable configured with RJ45.

NIC

Video Card: Connects the computer to the monitor. It is a circuit board attached to the
motherboard that contains the memory and other circuitry necessary to send information to
the monitor for display on screen.

Video card

INFORMATION SHEET LO2


ICT ITS1 01 0710
Obtain required peripherals
MODULE Obtaining required peripherals

Peripherals are obtained under instruction from appropriate person

14
Prepared by B.T
Shashemene Poly Technique Collage

Peripheral instruction and will be provided from the client. When we say Peripheral instructions
it mean that how to use, configure or connect peripherals, handling peripherals in appropriate
manner. For example if you need to connect scanner to the system, first you need the system
with full hardware and appropriate software then you try to connect scanner. Since this device is
non plug and play you need to install driver software. At this time there are instructions used to
connect and install software.

 How to remove and replace paths


 Specifications
 How to configure system settings
 How to troubleshoot and solve problem
 Safety instructions
Inventory procedures according to the organizational standards
An inventory is basically a detailed list of items. How assets and inventory items of a company
should be treated will ordinarily form part of the organisational guidelines. A company item
will be defined as either an asset or inventory item, that is, not all items will be recorded in an
inventory. For example, an expensive laser printer would not be placed in the inventory but will
be placed in the asset register of the organisation. Consumables, such as printer cartridges,
would be placed in the inventory as ‘consumables’. Some inventories allow for asset numbers to
be recorded with the data of an inventory item to allow that item to be associated with a specific
asset. An organization may have its own inventory procedure.
Validating the components & physical contents match the packing list

Validation is identifying whether that component is functional or not as well as appropriate


for the entire function. Validating the components focus on the checking of the packing list
and the physical components. The packing list and the physical components should be
identical or similar
Vendor instructions/manual guidelines to store peripherals
Instructions given to the clients may include how to restore peripherals in terms of written
documents as manual.
Vendor instruction may include the following:
 User manual
 Written instructions from meetings
 Verbal request or help desk
After performing one project it have the following Product information guide:

 Warranty information
 Terms and condition
 Regulatory information

15
Prepared by B.T
Shashemene Poly Technique Collage

 End user license agreement

INFORMATION SHEET LO3


ICT ITS1 01 0710
Connecting hardware peripherals
MODULE Connecting Hardware Peripherals
Peripherals are devices those are attached to the system or any device other than the
motherboard components of the computer. They are hardware items attached to the main
computer that allow you to perform different tasks. To connect such devices we must need the
interface to connect them with the system. Such interfaces are called ports.
PORTS ON THE SYSTEM UINT
Ports are nothing but any interface found on system board used for connecting hardware
peripherals. So that we can connect different peripherals through such ports.
Computers have following types of ports: Serial, parallel, and USB.
A serial port is a type of interface that connects a device to the system unit by
transmitting data only one bit at a time. Serial ports usually connect devices that do
not require fast data transmission rates, such as a mouse, keyboard, or modem.
A parallel port is an interface that connects devices by transferring more than one
bit at a time. Many printers connect to the system unit using a parallel port.
A universal serial bus (USB) port can connect up to 127 different peripheral
devices with a single connector type, greatly simplifying the process of attaching
devices to a personal computer.
Remark: PS2 port is the traditional circular port type mostly used to connect mouse and
keyboard.

16
Prepared by B.T
Shashemene Poly Technique Collage

To connect, configure and use Scanner


Before connecting any peripheral devices first Check the system is functional and identify the
appropriate ports.
 Check the USB data cable and power cable of Scanner as available
 Connect USB data cable to the system unit using USB port
 Connect power cable to scanner and give power
The latest scanners do not need separate power provider instead they get from system
 Open my computer and check as the system detect the device
If the system doesn’t detect the scanner automatically it needs configuration,
use driver software CD of scanner to configure with a system (follow the wizard it is
almost similar to printer installation)
 Click on the scanner icon and Scan the document you want
 Save the scanned document .

Ports Typical use port icon


Comment
S-Video / TV S-Video has
out (S-Video Computer port with S-Video and separate wires
composite: Pins 1 & 2: Ground
is also called for intensity.
Y/C video) Pin 3: Y (intensity or luminance) composite
video has one
television Pin 4: C (color or chrominance) analog signal
Pins 5, 6, 7: nonstandard

17
Prepared by B.T
Shashemene Poly Technique Collage

phone’s RJ11
digital data connector with 2 to 6
Modem transfer over pins is smaller
a telephone than Ethernet’s
line Broadband DSL or ADSL Modem
RJ45 connector
with 8 pins

peer to peer
(so any node
can initiate
networked sending data)
Ethernet computers using Carrier
and printers Cable with an 8-wire RJ45 plug (male Sense Multiple
connector) on each end Access with
Collision
Detection
(CSMA/CD)

RJ45 receptacle (8-pin female connector) with its


Ethernet icon at the left

Serial RS-
232-C
(this is a
standard for bidirectional
serial binary modem, using one
communicati printer, transmit wire
on by the mouse, and one
Electronic keyboard receive wire;
male 9-pin D-shell RS232C serial connector asynchronous
Industries on a PC
Alliance
[EIA], where
“RS” is an
abbreviation
for
“RETMA a male 25-pin D-shell plug (left) and a female
Standard” 9-pin D-shell connector (right) on a cable for

18
Prepared by B.T
Shashemene Poly Technique Collage

RS232C serial communication between a


PC and a device
synchronous
data transmission
from device to
PC with a 10 – 16.7
PS/2 mouse, kHz
keyboard clock; supplies the
device with power of
PS/2 mouse or keyboard connector on a PC, 5 volts at up
typically with an icon for a mouse or for a to 275
keyboard

Parallel Centronics or
(IEEE 1284, Standard mode has
where printer, 8 bits out of
“IEEE” is an scanner, and 4 bits into
abbreviation the computer
for the port; Enhanced
“Institute of Parallel Port
Electrical 25-pin D-shell receptacle (EPP) has
and (above) on a computer 8 bits in/out;
Electronic Extended
Engineers”) Capability
Port (ECP)
has 8 bits
Centronics parallel 36-pin plug (above, to a printer) in/out
and a 25-pin D-shell plug (below, to a computer) on
a cable
keyboard, portable flash memory,
printer, scanner, modem, mouse,

portable media player, external


floppy or hard or optical disk,

up to 127
digital still or video camera,

Universal devices per


Type A receptacle on a computer host or a hub
Serial Bus host port
using hubs;

Type A plug (above) to a host or hub, and a Type B


plug (below) to a device on the ends of a typical
full-size-connector cable

up to 63
printer, daisy-chained
FireWire scanner, devices up to

19
Prepared by B.T
Shashemene Poly Technique Collage

portable FireWire 4-pin mini receptacle on a computer 4.5 meters


media apart;
player 30 volts at up
to 45 watts
FireWire 4-pin mini plug (left, to the computer) and
FireWire 6-pin standard plug (right, to the device)

Enhanced internal
Integrated floppy or
Device hard or 40 wires
Electronics optical disk two EIDE male connectors (right; one
(EIDE) white and the other one blue just below it) on a
motherboard

an EIDE female connector on a ribbon


cable

Serial The SATA


Advanced hard or SATA 7-pin edge connector (left) and a serial port was
Technology optical disk SATA 15-pin edge connector (right) on a designed to
Attachment Motherboard replace the
(SATA) slower EIDE
parallel port

SATA 7-pin connector on a cable

SATA 15-pin connector on a cable

20
Prepared by B.T
Shashemene Poly Technique Collage

networking
of multiple
Wireless computers,
(Wi-Fi) and Uses the 5 GHz
other Radio frequency
typical Wireless 802.11 access point (which in band
devices such this case also serves as a router to a DSL modem
as printers and as a switch between 4
or file wired Ethernet ports)
servers,

Peripheral internal located on the


Component interface motherboard
3 PCI slots (above in white) on a motherboard
Interconnect cards for
inside a computer
(PCI) bus most PC
peripherals

An interface card
that plugs into a PCI slot

Accelerated Monitor
Graphics with located on the
Port (AGP, high-end motherboard
or graphics
Advanced
Graphics
Port) bus AGP connector on a motherboard inside a
Computer
VGA was first marketed
VGA plug (male connector) on a by IBM in 1987; SVGA
cable above and a 15-pin VGA was
Video Graphics
Adapter (VGA) receptacle (female Originally 800600
or Super-VGA pixels, but many
connector) on a computer manufacturers
(SVGA)
upgraded SVGA many
or monitor below times

21
Prepared by B.T
Shashemene Poly Technique Collage

Digital Visual DVI connectors


Interface (DVI) DVI plug (male have up to 24
pins for digital
connector) on cable signals and may
include legacy
VGA analog
Audio (speakers or
Audio out
headphones) output on left;
microphone input on right

Table: summary of computer ports

22
Prepared by B.T
Occupational health and Safety (OHS): when we work on computers and need to connect hardware
peripherals we must apply OHS aspects of relevant components.

OHS procedures for electrical equipment


o Choose appropriate place free from dusts, light etc.
o Type of desk, the desk must be stable not moveable.
o Style of chair
o Typing position
o Ventilation
o Light position
o Correct lifting method
Applying physical safety considerations such as general electrical safety and cabling, Power supply and leads as
they apply to computer and peripheral installations
Removing old peripherals
 Troubles shoot the peripherals
 Identify if it is functioning or not
 If it not functioning, checks whether it is connected properly or not and then remove the peripheral if it
is not functioning at all to replace with appropriately functioning device.
 When we perform the above tasks we need to apply OHS procedures such as disconnecting power
from the system.
Connecting new peripherals: we can add new peripherals when we buy new computer as
well as if some component of the system is damaged to replace them with other functioning
components. Before removing and add new components to the system we must sure that
power is turned off and turn on after finalizing tasks to check the functionality of connected
components.
Computer needs:
Good ventilation
Clean environment
Stable, vibration free surface
Computer doesn’t need:
Dust
Drinking and eating over the keyboard
Heat, Cold or Moisture
Don’t place objects on top of monitors.
Don’t place computer on vibration surface

23
OPERATION SHEET LO3
ICT ITS1 01 0710
Connecting hardware peripherals
MODULE Connecting Hardware Peripherals

OPERATION TITLE: Connecting and configuring LCD projector


PURPOSE: To analyze how to connect, configure and use LCD projector
CONDITION OR SITUATION FOR THE OPERATION: The computer must be with basic software’s
EQUIPMENT, TOOLS&MATERIALS: Computer with basic peripheral devices and LCD projector electric
power supply
Procedure: To connect and configure LCD projector
1. Check the system is functional
2. Check the VGA cable and power cable of LCD Projector as available
3. Connect LCD Projector to the system unit using VGA cable
4. Connect power cable to LCD Projector and give power
5. Turn on LCD Project and adjust the setting
6. Present the document you want
Precaution: - identify appropriate ports to LCD projector
QUALITY CRITERIAL:  Apply basic safety Precaution
 The projector setting should be default
Remark: by rearranging the VGA cable of LCD projector and monitor you can make dual display

INFORMATION SHEET LO4


ICT ITS1 01 0710
Connecting workstation to the internet
(Access and Use Internet)
MODULE Connecting Hardware Peripherals

INTRODUCTION
The Internet can turn your computer into a powerful tool for research, communications, and sharing.
Connecting to the Internet is easy, and your service provider will do most of the technical work for you.
What is the Internet?
Internet is interconnection of computer networks that enable the computers and the programs they run to
communicate directly or it is network of networks. Internet connection is usually accomplished using
international standards collectively called TCP/IP (Transmission Control Protocol/Internet Protocol), which
are issued by an organization called the Internet Engineering Task Force, combined with a network registration
process, and with the aid of public providers of Internet access services, known as Internet Service
Providers(ISP).
The Federal Networking Council (FNC) agrees that the following language reflects definition of the term
"Internet". Each computer network and connected computer called an Internet host is provided with a unique
Internet Protocol (IP) address 198.105.232.1, for example. For obvious reasons, the IP address has become
known as the “dot address” of a computer. Although very simple and effective for network operation, dot
addresses are not very user-friendly. Hence the introduction of the Domain Name Service (DNS) that allows
for the assignment of meaningful or memorable names to numbers. DNS allows Internet hosts to be organized
around domain names: for example, “microsoft.com” is a domain assigned to the Microsoft Corporation, with

24
Prepared by B.T
the suffix “com” signifying a commercial organization. “ftp.microsoft.com” is an Internet host within that
domain. Each part of the domain still has an IP or dot address, which is used by the network elements to deliver
information. From a user point of view, though, the IP address is translated (or “resolved”) by DNS into the
now familiar format. Internets are constructed using virtually any kind of electronic transmission medium, such
as optical-fiber or copper-wire telephone lines, or radio or microwave channels.
"Internet" refers to the global information system that:
 Is logically linked together by a globally unique address space based on the Internet Protocol (IP) or
its subsequent extensions.
 Is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP)
suite or its subsequent extensions and/or other IP-compatible protocols.
 Provides, uses or makes accessible, either publicly or privately, high level services layered on the
communications and related infrastructure described herein.
Applications of Internet.
 Email: Allows a message to be sent from one person to another, or to many others, via computer. Internet
has its own e-mail standards that have also become the means of interconnecting most of the world's e-mail
systems.
 World-Wide Web (WWW): library of resources available to computer users through the global Internet. It
enables users to view a wide variety of information, including magazine archives, public and college library
resources, and current world and business news. World Wide Web (WWW) resources are organized so that
users can easily move from one resource to another. The connections to different source computers, or
servers, on the network are made automatically without being seen by the user. WWW connections are
made with the use of hypertext and hypermedia. Users generally navigate through information on the
WWW with the aid of a program known as a WWW browser, or client. We can browse text, images, sound,
or other information in the form of a page, which is obtained from a WWW server. WWW pages are
formatted using Hypertext Markup Language (HTML), and WWW communication among computers
uses the Hypertext Transfer Protocol (HTTP) or Wireless Access Protocol (WAP) for mobile phones.
This communication is usually through the Internet via Transmission Control Protocol (TCP)
connections, but almost any kind of connection can be used.
FTP (File Transfer Protocol) is a set of conventions allowing easy transfer of files between host computers.
This remains the biggest use of the Internet, especially for software distribution, and many public distribution
sites now exist.
Protocol- is asset of rules/instructions that governs the transfer of data and communication between two or
more components in a net work (is the language that the computer used to communicate with each other).
Protocols are software /set of rules and must be installed on network components that need them. Computers
can communicate with each other only if they use the same protocol.
If the protocol used by a computer in a network is not in the same group with the protocol used by another
computer, the two computers cannot exchange information.

Keep the following points in mind when you think about protocols in a network environment.
How Protocols work
The entire technical operation by which data is transmitted over the network has been broken down into
discrete, systematic steps. At each step, certain actions takes places that cannot takes places any other step .
Each step includes its own rules and procedures, or protocol.
25
Prepared by B.T
On source computer
Protocols at this computer can perform the following:
 Break the data into smaller sections, called packets that the protocol can handle.
 Add addressing information to the packets so that the destination computer on the network can
determine that the data belongs to it.
 Prepare the data for the transmission through the NIC and out onto the network cable.
On destination computer
Protocols at this computer can perform the following:
 Take the data packet off the cable
 Bring the data packet into the computer through the NIC
 Strip the data packets of all the transmitting information that was added by the sending computer
 Copy the data from the packets to a batter for reassembly; and
 Pass the reassembled data to the application in usable form.

When computers are communicating with each other, network is assigned to protocols working as one of three
types:
 Application protocols
 Transport protocols
 Network protocols
► Application protocols: provide data exchange between applications in a network.
Examples of common application protocols include – File transfer protocol (FTP) and Simple mail transfer
protocol (SMTP).
File transfer protocol (FTP) is used to send file from one computer to another under user command. FTP is a
powerful tool, which allows files to be transferred from “computer A” to “computer B” or vice versa.
Simple mail transfer protocol (SMTP) provides a basic electronic mail faculty. It provides a mechanism for
transferring messages among hosts. Features of SMTP include mailing list, return receipts, and forwarding.

► Transport protocols provides communication sessions b/n computer & ensure that data moves reliably
b/n computers. A common transport protocol is transmission control protocol (TCP)

Transmission control protocol /Internet protocol (TCP/IP)

TCP / IP is actually a collection of protocols or rules, that govern the way data travels from one machine to
another across networks. So that it is the standard protocol for communications over the internet.

IP is an internet protocol which performs the following tasks:

 Envelopes and addresses the data


 Enable the network to read the envelope and forward the data to its destination.
 Defines how much data can fit in a single “envelope”( a packet )

TCP is an internet protocol which performs the following tasks:

26
Prepared by B.T
 Breaks data up into packets that the network can handle efficiently
 Verifies whether all the packets have arrived at their destination
 Reassembles the data
► Network protocols used to define network environment. A common protocol that provides network
services is internet protocol ( IP ).

To get information using internet, we must need to Uniform Resource Locater (URL). It is a web address or
internet address. URL describes the location and a method of accessing a resource on the internet. It can also
Represents a Standardized addressing scheme for internet resource.
For Every resource available in the World Wide Web there is a unique URL.
Example: http://www.internet. Com
The most common URL types is:

HTTP-hyper text transfer protocol:


 It is used for sending and receiving web page.
 It gives internet address of WWW.
 It is a set of rules or protocol that enables hypertext data to be transferred from one computer to another.

Web Browser: is one of internet browser software.


A web browser is a computer program that is used to access the web (to view WebPages).
A browser can also be used to download files, send and receive email, or short messages across the internet.
Commonly-used web browsers, in order of market-share
 Microsoft Internet Explorer (IE)
 Firefox (Mozilla)
 Opera
 Mosaic
 Netscape Navigator (NN)
Search Engines
The term more properly refers to any software used to search any database, on the Internet the phrase usually
refers to the very large databases of Web sites that are automatically built by robots. These Internet search
engines use a software robot (or spider) that seeks out and index the words on Web pages.
Examples: Northern Light, AltaVista, Google!

How to connect to the Internet


Before you can connect to the Internet and access the World Wide Web, you need to have certain equipment.
In brief, you must have a computer (preferably running an up-to-date operating system); a modem and access to
a telephone line or a local area network (LAN) that is in turn connected to the Internet; and connection
software that will allow you to establish an account with a service provider and access the Internet. A modem is
not needed when accessing the Internet through a LAN. If you are accessing the Internet outside of a LAN
environment, you will need a modem that will connect you with other computers and interpret the data being
sent back and forth. Modem is a device that converts between analogue and digital signals. Digital signals,
which are used by computers, are made up of separate units represented by a series of 1s and 0s (bits). Analogue
27
Prepared by B.T
signals vary continuously; an example of an analogue signal is a sound wave. The modem works by, and
derives its name from, a process of modulating and demodulating.
To connect to the Internet
 Find an Internet service provider, and choose a connection type.
The first step in connecting to the Internet is to find an Internet service provider (ISP).
Your ISP brings the Internet to your home, but it's your home network that connects your computer to the
Internet. If you have a single desktop computer and it's in the same room as your Internet connection, your
home network will simply consist of a single cable (provided by your ISP) that runs from your modem or router
to your computer. Your ISP will either set it up for you or provide you with instructions for connecting your
computer. If you have more than one computer, a portable computer, or devices, Media Center Extender that
you want to connect to the network, you can connect all the devices to the Internet simultaneously.
 Depending on your location, you might have several different choices for Internet access. Starting with
the most attractive technologies for home Internet access, common Internet connection types are:
Cable modems. Cable internet is connected through the coaxial cables that you
would normally use for cable TV. The best performing and most affordable option
available to customers, most cable TV providers offer broadband Internet access.
• DSL. Digital Subscriber Line An excellent choice for businesses, DSL typically
offers better reliability than cable modems. However, DSL tends to be more
expensive than cable modems for similar levels of service.
Dial-up. The slowest method of connecting to the Internet, dial-up enables you to
connect to the Internet using your existing phone lines. Dial-up is convenient
because it is available to any location with a phone. However, slow performance
makes using the Internet frustrating.
Wireless Internet Connections
Wireless Internet, or wireless broadband is one of the newest Internet connection types.
Instead of using telephone or cable networks for your Internet connection, you use
radio frequency bands. Wireless Internet provides an always-on connection which can
be accessed from anywhere as long as you geographically within a network coverage
area. Wireless access is still considered to be relatively new, and it may be difficult to
find a wireless service provider in some areas. It is typically more expensive and
mainly available in metropolitan areas.

To connect to Internet Using Dial-Up connection


Dial- up: The connection to our network if we are using a device that uses the telephone network. This includes
modems with a standard phone line. Dial-Up connection is used to connect to an Internet service provider (ISP)
or other online service over a modem and phone line or by using an Integrated Services Digital Network (ISDN)
card and ISDN line.
 To connect to Internet Using Dial-Up connection the modem must be installed and configured properly
 Connect phone line to the modem port
 Select create new connection in Network and internet connection then click on Next button
 Select connect to internet and click on next button

28
Prepared by B.T
 Choose the type of service you would like to use :select Set up my connection manually and click on
next button
 Select Connect using a dial-up modem and click on next button
 Give the dial-up connection a name (this can be anything you want) click on next button
 Enter the telephone number needed to access the internet and click on next button
 Enter the user name and password, which will be used for logging into ISP server and click on next
button
 Add a short cut icon on desktop and click on finish button
Now test the internet, go to Google or whichever search engine you choose. Look for the phrase "what
you want". Several sites will give you the chance to test download and upload stats in a couple of clicks.
How to use Internet Connection Sharing
To use Internet Connection Sharing to share your Internet connection, the host computer must have one network
adapter that is configured to connect to the internal network and one network adapter or modem that is
configured to connect to the Internet.

On the host computer


On the host computer, follow these steps to share the internet connection

1. Log on to the host computer as administrator or as Owner


2. Click start and then click control pane
3. Click Network and Internet Connection
4. Click Network Connection
5. Right click the connection that you use to connect For example, if you connect to the internet by
using a modem; right click the connection that you want under dial-up
6. Click properties
7. Click the Advanced tab
8. Under Internet Connection Sharing, select the Allow other users to connect through this
computer’s connection check box
9. If you are sharing a dial-up internet connection, select the Establish a Dial-Up Connection
Whenever a Computer on My Network Attempts to Access the Internet check box if you want
to permit your computer to automatically connect to the internet
10. Click Ok you receive the following message
when internet connection sharing is enable your LAN adapter will be set to use IP address
192.168.0.1 your computer may lose connectivity with other computers on your network. If these
computers have static IP address, it is a good idea to set them to obtain their IP address
automatically. Are you sure you want to enable internet connection sharing?
11. Click yes
The connection to the Internet is shared to other computers on the local area network (LAN). The network
adapter that is connected to the LAN is configured with a static IP address of 192.168.0.1 and a subnet mask of
255.255.255.0.
On the client computer

29
Prepared by B.T
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP configuration,
and then configure the client computer. To confirm the LAN adapter IP configuration, follow these steps:

1. Log on to the client computer as Administrator or as Owner.


2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection, and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the This connection uses the following
items list, and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address
automatically (if it is not already selected), and then click OK.
Note You can also assign a unique static IP address in the range of 192.168.0.2 to 192.168.0.254. For
example, you can assign the following static IP address, subnet mask, and default gateway:

IP Address 192.168.0.2
Subnet mask 255.255.255.0
Default gateway 192.168.0.1
8. In the Local Area Connection Properties dialog box, click OK.
9. Quit Control Panel.

We can configure the client computer to use the shared Internet connection using the following steps:
1. Click Start, and then click Control Panel.
2. Click Network and Internet Connections.
3. Click Internet Options.
4. In the Internet Properties dialog box, click the Connections tab.
5. Click the Setup button.
The New Connection Wizard starts.
6. On the Welcome to the New Connection Wizard page, click Next.
7. Click Connect to the Internet, and then click Next.
8. Click Set up my connection manually, and then click Next.
9. Click Connect using a broadband connection that is always on, and then click Next.
10. On the Completing the New Connection Wizard page, click Finish.
11. Quit Control Panel.

When you start Microsoft Internet Explorer, the client computer will try to connect to the Internet by using the
host computer's shared Internet connection.
Troubleshooting
When you turn on Internet Connection Sharing on the host computer, the host computer's LAN adapter is
automatically assigned the IP address of 192.168.0.1. Therefore, one of the following situations may occur:
 IP address conflict
Each computer on the LAN must have a unique IP address. If more than one computer has the same
IP address, an IP conflict occurs, and one of the network adapters turns off until the conflict is
30
Prepared by B.T
resolved. To resolve this conflict, configure the client computer to automatically obtain an IP
address, or assign it a unique IP address.
 Loss of network connectivity
If your network is configured with a different IP address range than Internet Connection Sharing
uses, you will lose network connectivity with the host computer. To resolve this issue, configure the
client computers to automatically obtain an IP address, or assign each client computer a unique IP
address in the range of 192.168.0.2 to 192.168.0.254.

OPERATION SHEET LO4


ICT ITS1 01 0710
Connecting workstation to the internet
(Access and Use Internet)
MODULE Connecting Hardware Peripherals

OPERATION TITLE: Connecting internet Using Dial-up Connection


PURPOSE: To connect to the Internet Using Dial-Up connection over a modem and phone line
CONDITION OR SITUATION FOR THE OPERATION: The computer must be with basic software’s and
ISP account.
EQUIPMENT, TOOLS&MATERIALS: Computer with peripheral devices, electric power supply/UPS/,
Modem, Phone line.
PROCEDURE: To connect to the Internet Using Dial-Up connection over a modem and phone line.
Cheek the modem is installed and configured.
Connect phone line to the modem port(RJ-11 connector).
Select create new connection in Network and internet connection the click on Next.

31
Prepared by B.T
Select connect to internet and click on next button

Choose the type of service you would like to use :select Set up my connection manually and
click on next button

32
Prepared by B.T
Select Connect using a dial-up modem and click on next button

Give the dial-up connection a name (this can be anything you want) click on next button.

33
Prepared by B.T
Enter the telephone number needed to access the internet and click on next button.

Enter the user name and password, which will be used for logging into ISP server and click on
next button.

34
Prepared by B.T
Add a short cut icon on desktop and click on finish button.

PRECAUTIONS: The system must be installed and configured with modem.


There should be ISP account (user name and password from ETC).
QUALITY CRITERIAL: Apply all safety precautions.
Follow the correct steps to create dial-up connection.
Can access internet using the created connection.

35
Prepared by B.T

You might also like