lOMoARcPSD|11563233
Pdf-3-configure-computer compress
Information Technology (Siargao Island Institute of Technology)
StuDocu is not sponsored or endorsed by any college or university
Downloaded by InfoTutorial 2020 (
[email protected])
lOMoARcPSD|11563233
COMPETENCY BASED LEARNING MATERIAL
POWERED BY: NETWORK SYSTEM
Sector: Information and Communication Technology
Qualification Title: Computer Hardware Servicing NC II
Unit of Competency Configure Computer Systems & Networks
Module Title: Configuring Computer Systems & Networks
Technical Education & Skills Development Authority
BISHOP HADEN INSTITUTE
T. Curato St., Cabadbaran City
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
COMPETENCY-BASED LEARNING
MATERIAL
Configuring Computer
Systems
&
Networks
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
ACKNOWLEDGEMENT
This Competency-Based Learning Materials on “Configuring Computer
Systems & Networks” would not have been possible without the guidance and the
help of several individuals who in one way or another contributed and extended
their valuable assistance in the preparation and completion of this CBLM.
First and foremost, my utmost gratitude to RT. REV. Denny D. Dapitan,
School President of Bishop Haden Institute whose sincerity and encouragement I
will never forget.
Mrs. Lilian G. Bertumen, for her unselfish and unfailing support as my
trainer and the insights she has shared;
Mrs. Marife A. Peña, for her patience and steadfast encouragement to
complete this CBLM;
Last but not the least, my family and the one above all of us, the Almighty
God, for answering my prayers for giving me the strength to plod on despite my
constitution wanting to give up and throw in the towel, thank you so much Dear
Lord.
Hans B. de la Cruz
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
TABLE OF CONTENTS
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
HOW TO USE THIS COMPETENCY- BASED LEARNING
MATERIALS
Welcome!
This module contains training materials and activities for you to complete.
The unit of competency “Configure Computer Systems and Networks” contains
the knowledge, skills and attitudes required for Computer Hardware Servicing
course required to obtain the National Certificate (NC level II). You are required to
go through a series of learning activity. If you have questions, do not hesitate to
ask your trainer for assistance.
Recognition of Prior Learning (RPL)
You have already some basic knowledge and skills covered in this module.
If you can demonstrate competence to your trainer in a particular skill talk to
him/her so you did not have to undergo the same training again. If you have a
qualification or Certificate of Competence from previous trainings show it to
him/her. If the skills you required are consistent with and relevant to this
module, they become part of the evidence. You can present these RPL. If you are
not sure about your competence skills, discuss this with your teacher.
After completing this module ask your trainer to assess your competent.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.
In this module, you will find activities for you to accomplish and relevant
information sheets for each learning outcome. Each learning outcome may have
more than one learning activity.
This module is prepared to help you achieve the required competency in
receiving and relaying information. This will be the source of information that will
enable you to acquire the knowledge and skills in Computer Hardware Servicing
NCII independently at your own pace with minimum supervision from your
trainer.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
COMPUTER HARDWARE SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Competency Module Title Code
Installing computer
1 Install computer systems and ELC724318
systems and
networks
networks
Diagnosing and
2 Diagnose and troubleshoot troubleshoot ELC724319
computer systems computer systems
Configuring
3 Configure computer systems ELC724320
computer systems
and networks
and networks
Maintaining
4 Maintain computer systems ELC724321
computer systems
and networks
and networks
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
MODULE CONTENT
UNIT OF COMPETENCY Configure Computer Systems & Networks
MODULE TITLE Configuring Computer Systems & Networks
MODULE DESCRIPTOR:
This unit covers the knowledge, skills and attitudes needed to configure
computer systems and networks.
NOMINAL DURATION: 100HRS.
LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able to:
1. Plan and prepare for configuration
2. Configure computer systems and networks
3. Inspect and test configured computer systems and networks
ASSESSMENT CRITERIA:
1. Configured computer systems and networks identified from the
Job/Service Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.
5. Checked necessary tools, equipment materials
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
6. Appropriate personal protective equipment are used and OHS policies &
procedures followed
7. Normal function of systems & network checked in accordance with
manufacturer’s instruction
8. Fault or problem in the systems and networks diagnosed in line with the
standard operating procedures
9. Computer systems and networks configured in line with the standard
operating procedures
10. Final inspections are undertaken to ensure that the configuration done on
the systems and networks conforms with the manufacture’s
instruction/manual
11. Computer systems and networks are checked to ensure safe operation.
12. Report is prepared and completed according to company requirements.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LEARNING OUTCOME # 1 PLAN AND PREPARE FOR CONFIGURATION
CONTENTS:
1. Inspecting work instructions according to job requirements.
2. Planning and preparing of standard operating procedures
3. Occupational health and safety
4. Configuring system and networks
5. Procedures in using the tools and equipment’s
ASSESSMENT CRITERIA:
1. Configured computer systems and networks identified from the
Job/Service Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.
5. Checked necessary tools, equipment materials
CONDITION:
Trainees must be provided with the following:
OH & S policies and procedures
- OH & S policies
- manuals
Computer systems and networks
- 1 Server
- Peripherals
- 1 Desktop Computers
Materials
- Wires and Cables
- Appropriate Software
- Computer Storage Media
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Tools
- Pliers
- Philips screw driver
Equipment/testing devices
- Computer
Personal protective equipment
- Anti-static wrist wrap
ASSESSMENT METHOD:
Hands-on application
Direct observation
Practical demonstration
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LEARNING EXPERIENCES
Learning Outcome 1
PLAN AND PREPARE FOR CONFIGURATION
Learning Activities Special Instructions
1. Read Information Sheet 3.1-1 on
safety measures, policies &
procedures in Computer
configuration
Do not write anything on the module
2. Answer Self-Check 3.1-1 Prepare a separate sheet of paper on
the Self-Check and Activity.
3. Check answers by comparing
with the answer key
4. Read Information Sheet 3.1-2 on
planning & preparing of standard
operating procedures
5. Answer Self-Check 3.1-2 Do not write anything on the module
Prepare a separate sheet of paper on
the Self-Check and Activity.
6. Check answers by comparing
with the answer key
7. Read Information Sheet 3.1-3 on
configuring system and networks
8. Answer Self-Check 3.1-3 Do not write anything on the module
Prepare a separate sheet of paper on
the Self-Check and Activity.
9. Check answers by comparing
with the answer key
10. Perform Task Sheet 3.1-3
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
11. Use the performance criteria
checklist to evaluate your
performance
12. Read Information Sheet
3.1-4 on procedures in using
tools & equipment’s
13. Answer Self-Check 3.1-4 Do not write anything on the module
Prepare a separate sheet of paper on
the Self-Check and Activity.
14. Check answers by
comparing with the answer key
15. Perform Task Sheet 3.1-4
16. Use the performance criteria
checklist to evaluate your
performance
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.1-1
Safety Measures Policies & Procedures in Computer
Configuration
Learning objectives
After reading this information sheet, you must be able to:
1. Define Computer Health & Safety
2. Explain the correct procedures in computer configuration
Occupational health and safety (OHS) refers to the legislation, policies,
procedures and activities that aim to protect the health, safety and welfare of all
people at the workplace.
Occupational health and safety (OHS) is a cross disciplinary area concerned
with protecting the safety, health and welfare of people engaged in work or
employment. The goal of all occupational health and safety programs is to foster
a safe work environment. As a secondary effect, it may also protect co-workers,
family members, employers, customers, suppliers nearby communities and other
members of the public who are impacted by the workplace environment.
Safety is the state of being “safe” (from French sauf), the condition of being
protected against physical, social, spiritual, financial, political, emotional,
occupational, psychological, educational or other types or consequences of
failure, damage, error, accident, harm or any other event which could be
considered non-desirable.
Health is the level of functional and/or metabolic efficiency of a living
being. In humans it is the general condition of a person in mind, body and spirit
usually meaning to “Being free from illness, injury or pain (as in “good health or “
healthy).
Quality of Life is used to evaluate the general well-being of individuals and
societies. The term is used in a wide range of contexts.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Every worker has a right to healthy and safe work and to a work
environment that enables them to live a socially and economically productive life.
Safety practices should be learned early and always adhered to when working
with any electrical device including personal computers and peripherals.
Personal safety while working with PC’s
Here are some safety precautions to take before working with any computer
devices:
Before doing anything, listen to your teacher’s instruction to prevent
accidents or any unwanted events that may occur on your workplace.
Do not work on computer when you are wet because you might get
electrocuted.
Do not remove internal devices of the computer when it is turned on.
Be sure not to mix electronic components and water.
Avoid playing or running while inside the room.
Always wear personal protective equipment’s (PPE) like coverall, shoes with
rubber sole, anti-static wrist strap, etc.
Ask for assistance from your teacher when it comes on dealing with
computer devices.
Applying safety measure when handling tools and equipment are necessary
to avoid certain damages.
The student is further expected to maintain good health, to be neat in
personal appearance and to practice safe working procedures at all time with
appropriate equipment.
SOP for Computers
Standard Operating Procedure for Computers
When you get a computer, there is no list of exactly what to do or how to
use it. Your manual will describe some basics about the computer but for day-
today use you are left on your own to figure out the procedures for use to keep
things going smoothly.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Shutdown
1. Close all your programs before shutting down the computer.
2. Click on the shutdown option in the Start menu and wait for it to shut
down.
3. Shutting down with just the power button can cause problems in the
Microsoft Windows operating system.
Software
1. Close all other programs when installing a new program. This prevents
problems with the new program.
2. Restart after each install. This ensures everything is installed correctly.
Safety
1. Keep your computer clean to keep it running well.
2. Don’t eat over the keyboard and avoid spilling drinks near the computer.
3. Keep the computer in a place where it does not get too hot (above 95o or so)
4. Plug your computer into a surge protector.
Security
1. Install antivirus, antispyware and firewall software to protect your data and
keep others from intruding your computer files.
2. Shut your computer down when not in use.
3. Don’t share your passwords or write them down where they can be found.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Self-Check 3.1-1
Direction: Read the question carefully and choose the best answer.
Write only the letter on the space provided.
_____ 1. OH & S stands for?
a. Occupation Houses and Street
b. Occupation Health and Safety
c. Office Health and Safety
______2. It is used to evaluate the general well-being of individuals and societies.
The term is used in a wide range of contexts?
a. Safety
b. Health
c. Quality of Life
_____3. It is the level of functional and/or metabolic efficiency of a living being. In
humans it is the general condition of a person in mind, body and spirit usually
meaning to “Being free from illness, injury or pain?
a. Safety
b. Health
c. Quality of Life
_____ 4. It is the condition of being protected against physical, social, spiritual,
financial, political, emotional, occupational, psychological, educational or other
types or consequences or failure, damage error, accidents harm or any other
event which could be considered non-desirable?
a. Safety
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
b. Health
c. Quality of Life
_____5. The area concerned with protecting the safety health and welfare of
people engaged in work or employment?
a. Cross-disciplinary
b. X-disciplinary
c. OH&S disciplinary
Write the Correct Procedure of the following:
6. Shutdown
7. Software
8. Safety
9. Security
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Answer Key 3.1-1
1. B
2. C
3. B
4. A
5. A
6. a. Close all your programs before shutting down the computer.
b. Click on the shutdown option in the Start menu and wait for it to
shut down.
c. Shutting down with just the power button can cause problems in the
Microsoft Windows operating system.
7. a. Close all other programs when installing a new program. This prevents
problems with the new program.
b. Restart after each install. This ensures everything is installed correctly.
8. a. Keep your computer clean to keep it running well.
b. Don’t eat over the keyboard and avoid spilling drinks near the
computer.
c. Keep the computer in a place where it does not get too hot (above 95o or
so)
d. Plug your computer into a surge protector.
9. a. Install antivirus, antispyware and firewall software to protect your data
and keep others from intruding your computer files.
b. Shut your computer down when not in use.
c. Don’t share your passwords or write them down where they can be
found.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.1-2
Planning & Preparing for Configuration in Systems & Networks
Learning objectives
After reading this information sheet, you must be able to:
1. Plan & Prepare standard operating procedures
2. Explain computer networks
What is a Computer Network?
A computer network is an interconnected group of computers.
Computer Network
In general, the term network can refer to any interconnected group or
system. More specifically, a network is any method of sharing information
between two systems (human or mechanical).
BENEFITS OF SHARING INFORMATION VIA NETWORK
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
In addition to reducing hardware costs by sharing expensive printers and
other peripherals among multiple users, networks provide additional benefits to
the users.
Software and data files can be shared for access by multiple users
Electronic mail (email) can be sent and received
Collaboration features allow contributions by multiple users to a single
document
Remote-control programs can be used to troubleshoot problems or show
new users how to perform a task
SHARED HARDWARE COMPONENTS
Virtually any storage or output device can be shared over a network, but
the most common devices to be used over a network include:
Printers
Disk drives
CD-ROM and optical drives
Modems
Fax
Tape backup units
Network topology
Network Topology signifies the way in which intelligent devices in the
network see their logical relations to one another. The use of the term "logical"
here is significant. That is, network topology is independent of the "physical"
layout of the network. Even if networked computers are physically placed in a
linear arrangement, if they are connected via a hub, the network has a Star
topology, rather than a Bus Topology. In this regard the visual and operational
characteristics of a network are distinct; the logical network topology is not
necessarily the same as the physical layout.
Bus Topology
It is often used when network installation is small, simple or temporary. On
a typical bus network the cable is just 1 or more wires with no active electronics
to amplify the signal or pass it along from computer to computer. This makes the
bus a passive topology. When 1 computer send a signal up the wire all the
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
computers receive the information but only one with the address that matches
accepts the information, the rest disregard the message.
Bus Topology
Advantages:
1) Easy to use and to understand.
2) Requires least amount of cable to connect the computers together. It is
therefore less expensive than other cabling arrangements.
3) It is easy to extend a bus; two cables can be joined into 1 longer cable with a
BNC, Barrel connector making a longer cable and allowing more computers to
join the network.
Disadvantages:
1) Heavy network traffic can slow a bus considerably as only 1 computer can
send a message at a time.
2) It is difficult to troubleshoot the bus. A cable break or loose connector causes
reflection and stops all the activity.
STAR TOPOLOGY
In this kind of topology all the cables run from the computers to the central
location where they are all connected by a device called hub or switch. Each
computer on a star network communicates with a central device that resends the
message either to each computer or only to the destination computer, example if
it is a hub then it will send to all and if it is a switch then it will send to only
destination computer. When network expansion is expected and when the greater
reliability is needed, star topology is the best.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Star Topology
Advantages:
1) It is easy to modify and add new computers without disturbing the rest of the
network.
2) The center of the star network is a good place to diagnose the faults.
3) Single computer failure does not necessarily bring down the whole star
network.
Disadvantages:
1) If the central device fails the whole network fails to operate.
2) Star networking is expensive because all network cables must be pulled to one
central point, requires more cable than other network topologies.
RING TOPOLOGY
In this type each computer is connected to the next computer with the last
one connected to the first. Each retransmits what it receives from the previous
computer. The message flows around the ring in one direction. The ring network
does not subject to signal loss problem as a bus network experiences. There is no
termination because there is no end to the ring.
Ring Topology
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Advantages:
1) Each node has equal access.
2) Capable of high speed data transfer.
Disadvantages:
1) Failure of one computer on the ring can affect the whole network.
2) Difficult to troubleshoot the network.
Types of networks
Below is a list of the most common types of computer networks in order of scale.
Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for
communication among computer devices close to one person. Some examples of
devices that may be used in a PAN are printers, fax machines, telephones, PDA’s
or scanners. The reach of a PAN is typically within about 20-30 feet
(approximately 6-9 meters).
Personal area networks may be wired with computer buses such as USB]
and FireWire. A wireless personal area network (WPAN) can also be made
possible with network technologies such as Bluetooth.
Personal Area Network
Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building.
Current LANs are most likely to be based on Ethernet technology. For example, a
library will have a wired or wireless LAN for users to interconnect local devices
(e.g., printers and servers) and to connect to the internet. All of the PCs in the
library are connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol
through a system of interconnection devices and eventually connect to the
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
internet. The cables to the servers are on Cat 5e enhanced cable, which will
support IEEE 802.3 at 1 GB/s.
The staff computers (bright green) can get to the color printer, checkout
records, and the academic network and the Internet. All user computers can get
to the Internet and the card catalog. Each workgroup can get to its local printer.
Note that the printers are not accessible from outside their workgroup.
Workgroup of
Computers
Hub
Server
Local Area Network
Client/Server Vs Peer-to-Peer Networks
Although every computer on a LAN is connected to every other, they do not
necessarily mean all communicate with each other. There are two basic types of
LAN, based on communication patterns between the machines, called
client/server networks and peer-to-peer networks.
Client/Server Networks
Every computer has a distinct role, that of either a client or a server. A
server is designed to share its resources among client computers on the network.
The Client/Server is composed of:
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Servers
These are located in secured areas, such as locked closets and data
centers, because they hold the organization's most valuable data and do not
have the accessed by operators on a continuous basis.
The server runs a special network operating system such as: Windows NT
Server, Windows 2000 or Novell Netware.
Clients
- The rest of the computers on the network function as client. A client
standard PC that is running an operating system such as DOS or Windows.
Client
Workstations
Hub
Server
Example of Client/Server
Peer-to-Peer Network
In a peer-to-peer network, every computer is equal and can communicate
with other computer on a network to which it has been granted access rights.
Essentially, every computer in this network functions as both server and client.
Peer-to-peer network can be as small as two computers as many as hundreds of
units.
There is no theoretical limit to the size of a peer-to-peer network,
performance drops significantly and security becomes a major headache on peer -
based network with more than 10 computers. Also, Microsoft imposes a 10-
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
station limit on computers running Windows 2000 Professional who are sharing
resources with other system. For this reason, it is better you switch to a
client/server network when your network climbs to 10 stations.
Example of Peer-to-Peer Network
CAMPUS AREA NETWORK (CAN)
A network that connects two or more LANs but that is limited to a specific
and contiguous geographical area such as a college campus, industrial complex,
or a military base. A CAN may be considered a type of MAN (metropolitan area
network), but is generally limited to an area that is smaller than a typical MAN.
This term is most often used to discuss the implementation of networks for a
contiguous area. This should not be confused with a Controller Area Network.
Campus Area Network
Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local
Area Networks or Campus Area Networks together but does not extend beyond
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
the boundaries of the immediate town, city, or metropolitan area. Multiple
routers, switches & hubs are connected to create a MAN.
Metropolitan Network
Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad
geographic area (i.e. one city to another and one country to another country) and
that often uses transmission facilities provided by common carriers, such as
telephone companies. WAN technologies generally function at the lower three
layers of the OSI reference model: the physical layer, the data link layer, and the
network layer.
Wide Area Network
Global Area Network (GAN)
Global area networks (GAN) specifications are in development by several
groups, and there is no common definition. In general, however, a GAN is a model
for supporting mobile communications across an arbitrary number of wireless
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LANs, satellite coverage areas, etc. The key challenge in mobile communications
is "handing off" the user communications from one local coverage area to the
next. In IEEE Project 802, this involves a succession of terrestrial Wireless local
area networks (WLAN).
Global Area Network
Internetwork
Two or more networks or network segments connected using devices that
operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as
a router. Any interconnection among or between public, private, commercial,
industrial, or governmental networks may also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol.
There are at least three variants of internetwork, depending on who administers
and who participates in them:
Intranet
Extranet
Internet
Intranets and extranets may or may not have connections to the Internet. If
connected to the Internet, the intranet or extranet is normally protected from
being accessed from the Internet without proper authorization. The Internet is
not considered to be a part of the intranet or extranet, although it may serve as a
portal for access to portions of an extranet.
Intranet
An intranet is a set of interconnected networks,
using the Internet Protocol and uses IP-based tools
such as web browsers and ftp tools, that is under the
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
control of a single administrative entity. That administrative entity closes the
intranet to the rest of the world, and allows only specific users. Most commonly,
an intranet is the internal network of a company or other enterprise.
Extranet
An extranet is a network or internetwork that is
limited in scope to a single organization or entity but
which also has limited connections to the networks of one or
more other usually, but not necessarily, trusted
organizations or entities (e.g. a company's customers
may be given access to some part of its intranet creating in
this way an extranet, while at the same time the customers
may not be considered 'trusted' from a security
standpoint). Technically, an extranet may also be
categorized as a CAN, MAN, WAN, or other type of network,
although, by definition, an extranet cannot consist of a single
LAN; it must have at least one connection with an
external network.
Internet
A specific internetwork, consisting of a worldwide interconnection of
governmental, academic, public, and private networks based upon the Advanced
Research Projects Agency Network (ARPANET) developed by ARPA of the U.S.
Department of Defense – also home to the World Wide Web (WWW) and referred
to as the 'Internet' with a capital 'I' to distinguish it from other generic
internetworks.
Participants in the Internet, or their service providers, use IP Addresses
obtained from address registries that control assignments. Service providers and
large enterprises also exchange information on the reach ability of their address
ranges through the Border Gateway Protocol (BGP).
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
SELF-CHECK 3.1-2
I. Identify the following. Choose your answer from the grid below. Use a separate sheet
of paper in answering.
______________ 1. The World Wide Web.
______________ 2. The internal network of a company or other enterprise.
______________ 3. A model for supporting mobile communications across an
arbitrary number of wireless LANs.
______________ 4. A data communications network that covers a relatively
broad geographic area.
______________ 5. A network that connects two or more Local Area Networks
or Campus Area Networks together.
______________ 6. It signifies the way in which intelligent devices in the
network see their logical relations to one another
______________ 7. It is the interconnected group of computers.
______________ 8. A network covering a small geographic area, like a home.
______________ 9. All the cables run from the computers to the central
location where they are all connected by hub.
______________10. Each computer is connected to the next computer with the
last one connected to the first.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Answer Key 3.1-2
1. Internet
2. Intranet
3. GAN
4. WAN
5. MAN
6. Topology
7. Network
8. LAN
9. Star topology
10. Ring topology
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.1-3
Procedures in Using the Tools & Equipment’s
Learning objectives
After reading this information sheet, you must be able to:
1. Demonstrates the materials needed in configuration
2. Explain the use of the tools and equipment’s
These are the following materials needed in the Configuration task:
1. Connectors
- It is used to connect external devices to the computer system.
2. Adapter
- A piece of hardware that plugs into an expansion slot in your computer.
3. Wires and Cables
- It is used to connect computers for network.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
4. Appropriate software
- This software packages are used to install new drivers needed in setting
up your computer.
5. Computer storage media
- These help you in saving data and providing backup for your files such as
diskette, compact disc, flash drives and memory cards.
6. Reference book
- These are books that will provide you topics about networking or related
books on computer.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
7. Manuals
- These provide you instructions for certain operation or task.
8. Cable tie
- It is used to organized wires and cables used in connecting computers to
avoid tangling.
These are the following tools/ testing devices needed in the configuration task:
1. Screw drivers
Flat screw driver is use to fasten negative slotted screws.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Philips Screw driver is used to fasten positive slotted screws.
2. Pliers
Side Cutter pliers is used for cutting and trimming of
connecting wires or terminal leads in the circuit board.
Long nose pliers is used for holding, bending and
stretching the lead of electronics component and
connecting wire.
3. Soldering iron/gun
It is used to join two or more metal conductors with the support of
soldering lead melted around it.
4. Multi-tester
It is used by technician for measuring current, voltage and resistance.
5. Magnifying glass
It is a device made in glass with handle, to exaggerate or to increase the
apparent size of an object.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
6. Safety apparel suit (coverall)
- It is used by the person for protect to his body.
7. Anti-static wrist strap
- It absorbs the static electricity of the material when being hold by the
hands.
8. Tweezers
- It is used to hold the small sensitive part of the computer.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
9. Mini-vacuum cleaner
- It is used for cleaning sensitive parts of the computer.
Note: Apply safety precautions when handling the materials, tools and
testing devices for safe keeping purposes and long lasting use.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Self-Check 3.1-3
I. Identify the following. Use a separate sheet of paper in answering.
______________ 1. It is a tool used to hold the small sensitive parts of computer.
______________ 2. A device made in glass with handle, to exaggerate or to increase
the apparent size of an object.
______________ 3. It is an instrument used by technician for measuring current,
voltage and resistance.
______________ 4. It is a tool used for cutting and trimming of connecting wires or
terminal leads in the circuit board.
______________ 5. It is a tool used to join two or more metal conductors with the
support of soldering lead melted around it.
______________ 6. It is a material used to organize wires and cables used in
connecting computers to avoid tangling.
______________ 7. These are the materials that are used in saving data and
providing backup for your files such as diskette, compact disc,
flash drives and memory cards.
______________ 8. It is a piece of hardware that plugs into an expansion slot in
your computer.
______________ 9. It is a reference material that provides you instructions for
certain operation or task.
______________ 10. It is a tool used for holding, bending and stretching the lead of
electronics component and connecting wire.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Answer Key 3.1-3
1. Tweezers
2. Magnifying Glass
3. Multi-tester
4. Side Cutter Pliers
5. Soldering iron/gun
6. Cable tie
7. Computer storage media
8. Adapter
9. Manuals
10. Long nose pliers
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
`
Task Sheet 3.1-3
Title: Demonstrate uses of tools and materials
Performance Objectives:
Choose five materials, tools and testing devices discussed in the lesson.
Demonstrate the use of the following tools and materials.
Supplies : Materials
Equipment : LCD Projector
Steps/Procedure:
1. Pick out five materials, tools and testing devices
2. Demonstrate the use of the following tools and materials
Assessment Method:
Demonstration using the Performance Criteria Checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Performance Criteria Checklist 3.1-3
CRITERIA YES NO
Does your output have the following?
Has demonstrated and discussed five materials
Has demonstrated and discussed five tools
Proper handling of tools and materials
Safety Precautions are observed.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LEARNING OUTCOME # 2 CONFIGURE COMPUTER SYSTEMS & NETWORKS
CONTENTS:
1. Occupational Health & safety
2. Testing normal function of system & network
3. Procedures in checking the faults or problems
4. Procedures in configure systems & networks
ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment are used and OHS policies &
procedures followed
2. Normal function of systems & network checked in accordance with
manufacturer’s instruction
3. Fault or problem in the systems and networks diagnosed in line with the
standard operating procedures
4. Computer systems and networks configured in line with the standard
operating procedures
CONDITION:
Trainees must be provided with the following:
OH & S policies and procedures
- OH & S policies
- manuals
Computer systems and networks
- 1 Server
- Peripherals
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
- 1 Desktop Computers
Materials
- Wires and Cables
- Appropriate Software
- Computer Storage Media
Tools
- Pliers
- Philips screw driver
Equipment/testing devices
- Computer
Personal protective equipment
- Anti-static wrist wrap
ASSESSMENT METHOD:
Hands-on application
Direct observation
Practical demonstration
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LEARNING EXPERIENCES
Learning Outcome 2
CONFIGURE COMPUTER SYSTEMS AND NETWORKS
Learning Activities Special Instructions
1. Read Information Sheet 3.2-1 on
testing normal function of
systems & networks
Do not write anything on the module
2. Answer Self-Check 3.2-1 Prepare a separate sheet of paper on
the Self-Check and Activity.
3. Check Answers by comparing
with the answer key
4. Read Information Sheet 3.2-2 on
testing normal function of
systems & networks
Do not write anything on the module
5. Answer Self-Check 3.2-2 Prepare a separate sheet of paper on
the Self-Check and Activity.
6. Check Answers by comparing
with the answer key
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
7. Perform job sheet 3.2-2
8. Evaluate your own work using
the performance criteria checklist
9. Read Information Sheet 3.2-3 on
testing normal function of
systems & networks
Do not write anything on the module
10. Answer Self-Check 3.2-3 Prepare a separate sheet of paper on
the Self-Check and Activity.
11. Check Answers by
comparing with the answer key
12. Perform job sheet 3.2-13
13. Evaluate your own work
using the performance criteria
checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.2-1
Testing Normal Function of Systems & Networks
Learning objectives
After reading this information sheet, you must be able to:
1. Identify protective equipment
2. Describe normal functions of systems & networks
Personal Protective Equipment
You must wear/use something in order to protect yourself against
unexpected harm that may arise while performing certain tasks. Different jobs
used different gadgets or suits to prevent unexpected harmful events that may
hurt us. The equipment’s below may be used as PPE:
Goggles – is used to prevent tiny particles from entering our eyes.
Coverall/apron- is worn by a person to prevent his body or clothes
from any types of dirt.
Gloves – are used in handling object without hurting your hands.
Dust mask – is used to cover the mouth and nose from tiny particles
when cleaning computer peripherals.
Shoes with rubber sole and rubber mat – are used to avoid us form
slippery.
Anti-static wrist strap - It absorbs the static electricity of the material
when being hold by the hands.
gloves coverall with rubber mat
dust mask
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
goggles apron shoes with anti-static
rubber soles wrist strap
Manufacturer’s Instruction Guide
Manufacturer’s Instruction Guide or simply manual may be a big help for
you especially when you bought new materials or appliances at home. You don’t
have to be professional to operate the material but by just following the
procedure/steps listed on the manual, it may lightens your work. Manual usually
covers all the functions and steps in configuring the material and/or on how to
operate it. Manuals also provide steps in troubleshooting.
This is an example of what you may see on a Manufacturer’s Instruction
Guide.
How to install a wired network adapter
To connect to a network, your computer needs a network adapter.
Fortunately, most computer manufacturers know that connecting to the Internet
or other computers is important to computer users, and they include a network
adapter with your computer.
If you need to add a network adapter, first choose which method you want
to use to install it. Most people prefer to use a USB (Universal Serial Bus)
network adapter, because it's easy to install. If you have a portable computer,
you might find a CardBus (also known as PCMCIA or PC Card) or CF network
adapter better meets your needs. If you have a desktop computer with the proper
amount of available space, you may also have the option of adding an internal
network adapter.
The instructions you follow to install a network adapter depend on how you
connect it.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
How to determine if you have a network adapter
Many newer computers have a network adapter built in that
you can use to connect to a wired network. If you want to install a
wired network adapter and aren't sure whether your computer
already has one, look for a network port on the back of the computer. Network
ports resemble phone jacks, but they are slightly larger and have eight pins
inside.
To see what kind of network adapters may already be installed in your
computer.
1. Click the Start, and then click Control Panel
2. Under or pick a Control Panel icon, click Network Connections
3. Microsoft Windows XP displays your network adapters. If an adapter
has a red X over it, it is disconnected. If the Network Connections
window is blank, your computer doesn't have a network adapter.
4. If you already have a network adapter, you are ready to configure your
network.
How to install a wired USB network adapter
Once you have the adapter…
If your USB network adapter came with software, insert the CD or
floppy disk into your computer, and follow the manufacturer's
instructions to install the software.
Find an available USB port on your computer.
Note: If you need to move your computer to reach the USB
ports, you should shut down Windows to avoid damaging your
computer. If you can easily reach a USB port, you need not
shut down your computer.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
If you do not have an unused USB port, connect a USB hub to add
additional ports. Then connect your USB network adapter to the unused
USB port.
Connect the network cable to the network adapter.
5. Connect the other end of the network cable to your networking
equipment.
6. If you had to shut down your computer to get to the USB port, you can
now turn on your computer. Windows detects and installs the new
hardware, and then displays a notification informing you that the
hardware has been successfully installed.
5.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
SELF-CHECK 3.2-1
I. Give the functions of the following PPE Use a separate sheet of paper in
answering.
Goggles
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
Coverall
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
Apron
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
Gloves
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Answer Key 3.2-1
1. Goggles-used to prevent tiny particles from entering our eyes.
2. Coverall-worn to prevent the body or clothes from any types of dirt
3. Apron-also worn to protect the body from dirt
4. Gloves-used in handling objects without hurting the hands
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.2-2
Procedure in Checking the Faults or Problems
Learning objectives
After reading this information sheet, you must be able to demonstrate the
procedures in checking the faults or problems of computer.
Today's computers have faster microprocessors, more memory and bigger
hard drives. When you think about the differences between a Pentium 4 and 386,
you have to conclude the improvement is astounding! But when error attacks our
computer we have to do something for the computers to survive. Here are some of
the common faults and problems that we may encounter:
1. Why computer becomes slow?
You need more memory.
Don't overlook the obvious. Up until recently not having enough memory
wasn't a problem. With the price of RAM becoming very affordable, most people
were filling their computers with more than enough memory to do the job. If your
computer is slow and it has lower capacity of RAM, you need to add more
memory to speed it up.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Spyware and viruses
Spyware. It is a software program that intentionally
installed on the computer by the user to monitor or spy on
what the other users of the same computer is doing.
you do realize for them to be effective, you have to keep up to
date. By up to date, it means up to the minute.
Virus. A software program, macro or script that has been
designed to infect, destroy, modify or cause other problems
with computer or software program.
Background programs
When you install new software on your computer, often times you install it to
run in the background every time you start up. Most times you do this without
knowing it. Look at the bottom right hand side of your screen.
If you see several icons there, you have extra programs running and stealing
resources. Right click on these and see if you have the option of closing them.
Many times, you can open the program and choose an option to keep these
programs from starting automatically.
Corrupted registry
Any changes you make to your computer effects and actually, it corrupts your
registry even when you do something positive like remove spyware and you end
up with a corrupted registry.
After months of corrupting your registry, it will become
good. This will, in its early stages, cause your computer to slow
down. In its advanced stages, it will freeze and crash and do
more mysterious and troublesome things.
5. After I pressed the Power button...
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Nothing happened
Check mains plug switched on at wall
PSU may have its own power switch - check this is on
Check PSU-to-Motherboard cable(s) are correctly connected
Check front panel power switch is correctly connected
Check Reset button is not stuck 'in'
Check mains cable fuse
There was a loud bang (possibly with smoke) at the back of the PC Case
PSU was faulty or set to incorrect voltage for mains supply system. Replace
PSU
PC is on but monitor shows no display and a sequence of beeps emits from
the PC
Check fitting of CPU, RAM, Video card, sound card etc. If necessary,
remove and refit these components
Check the motherboard manual and perform a BIOS reset procedure
This may indicate a faulty motherboard
PC is on but monitor shows no display and one beep emits from the PC
Check monitor is switched on at the wall socket
Check monitor power cable is connected correctly
Check that the monitor's signal cable is connected correctly to both the PC
and Monitor
Check that the monitor is switched on at its front panel
This may indicate a faulty video card
PC is on but there are no power and/or HDD lights on the PC case front
panel
Check correct connection of front panel connectors to the motherboard (see
motherboard manual)
This 'may' indicate a faulty Motherboard
PC is on but HDD does not spin up
Check power connector to HDD is properly connected
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Check IDE ribbon cable is correctly connected to both Motherboard and
HDD
This may indicate a faulty Hard Drive
PC is on but CD-ROM shows no lights/will not eject tray
Check power connector to CD-ROM is properly connected
Check IDE ribbon cable is correctly connected to both Motherboard and
CD-ROM
This may indicate a faulty CD-ROM Drive
PC is on but the CPU fan/fans do not spin
Disconnect the power immediately to prevent damage to the CPU from
overheating
Check fan power cables are correctly connected to the relevant power
connector (in most cases, a motherboard FAN connector or one of the PSU
power connectors)
Disconnect the power and carefully spin the fan blades with a finger. If
there is any resistance to this movement, this may indicate a faulty fan
unit
On boot up, the monitor shows corrupted display
Check seating of CPU, RAM, Video card, sound
card etc. If necessary, remove and refit these
components
Check the motherboard manual and perform a
BIOS reset procedure
This may indicate a faulty Motherboard or Video
card
On boot up, display shows incorrect CPU type/speed
Check the motherboard manual for the appropriate CPU jumper settings
(where applicable)
Check BIOS settings for CPU type (see Motherboard Manual)
Perform a BIOS reset procedure
Perform a BIOS update (with an updated BIOS, the Motherboard may
support your CPU)
This may indicate a faulty/old motherboard
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
On boot up, display shows incorrect RAM total
Check correct seating of Memory Modules in slots
In cases of two or more modules, this may indicate a faulty module
This may indicate a faulty/old motherboard
On boot up, display shows - FDD/Keyboard/Mouse not found (or similar)
Check correct connection of device described, In the case of the FDD, check
its ribbon and power connections
Check that the BIOS is configured correctly for the device described
This may indicate a fault with the described device or Motherboard
The monitor shows no picture
Is the power light on?
Are the cables plugged in?
Check brightness and contrast settings.
Swap the monitor with another one, reboot the machine and see if it works.
If the computer works the monitor has probably gone bad. If it still fails to
work, something in the CPU perhaps a video card has gone bad.
Computer displays limited colors.
Check display options for the monitor usually under control panel under
the display icon. Select at least 256 colors for standard display. If you had
16 color selected, this may be why your screen displays limited colors.
Some programs such as FastCat require you to set display settings to 256
colors.
Signs of Video Display Troubles
If your screen is completely white or gray and you hear buzzing noises, this
could indicate video card troubles. Before you panic, make sure all cables are
secured from monitor to CPU. Try using another power cord for the monitor to
see if this may be the problem.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
If screen appears distorted around the edges and the color does not look
right, you may have incorrect display adapters. Select Start, Settings, and
Control Panel. Double click on System Icon and select Device Manager. You will
see a listing of devices. Double click on Display adapters to view the type. If
there is a yellow exclamation point next to device, there is a conflict. To view
conflicts for a certain device, click on the device, select properties, and select the
general tab. There should be a description of the device and why it is not
working properly.
Printer Does Not Print.
Are all cables connected and is the printer turned on?
Is the printer online?
Is there paper in the tray?
Is the printer an Inkjet/Deskjet or a Laserjet?
If it's an inkjet, is the ink cartridge out of ink. Remove cartridge, hold up to
light or gently shake it to see if it is empty.
Things to Try
Do you have correct print drivers installed? Find print drivers under Device
Manager.
Check to be sure you have correct print drivers installed. Double click on
System Icon and select Device Manager. You will see a listing of devices.
Double click on the Ports button to view the type. If there is a yellow
exclamation point next to device, there is a conflict.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Task Sheet 3.2-1
Title: Identifying Common Faults and Errors of Computer
Performance Objectives:
Given the necessary tools, materials and equipment identify the common
faults and errors of computer when you detached the following materials:
Devices Port
- Keyboard - PS/2
- Mouse - PS/2
- Hard disk - IDE cable
- Floppy disk drive - IDE cable
- CD-Rom drive - IDE cable
- RAM chip - Memory slot
Supplies : Materials
Equipment : System Unit, Monitor, Keyboard, Mouse, Printer
Steps/Procedure:
1. Check correct connection of device described, In the case of the FDD, check
its ribbon and power connections
2. Check that the BIOS is configured correctly for the device described
3. Check seating of CPU, RAM, Video card, sound card etc. If necessary,
remove and refit these components
4. Check the motherboard manual and perform a BIOS reset procedure
Assessment Method:
Demonstration Assessment using the Performance Criteria Checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Performance Criteria Checklist 3.2-1
CRITERIA YES NO
Does your output have the following?
Safety Precautions are observed.
All the peripherals are properly inspected.
Standard checking of different peripherals is strictly note.
Proper boot-up and shutdown of the computer is observed.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.2-3
Procedure in Configure Systems & Networks
Learning objectives
After reading this information sheet, you must be able to configure
computer systems and networks.
How to Configure a Peer Network in Windows 98
To create a peer network, you must have the following components:
A network interface or Local Area Network (LAN) adapter for each computer. The
•
same manufacturer and model of network card is preferred.
• Cabling that is supported by the network cards.
• Windows 98 drivers for the network cards.
• A common network protocol.
• A unique computer name for each computer.
To create a peer network, follow these steps for each computer connected to the
network:
1. Shut down the computer and install the network card and appropriate
cabling for each computer.
NOTE: For information about how to configure your network adapters
and physically connect your computers, consult the documentation included
with your network adapters or contact the manufacturer(s) of your network
adapters.
2. Start Windows and install the network drivers. Windows may detect your
network card and install the drivers when you start the computer. If the
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
network card drivers are not included with Windows, follow the manufacturer's
instructions about how to install the network drivers.
3. Choose a client and a common protocol for each computer. To do this, follow
these steps:
Click Start, point to Settings, click Control Panel, and then double-click
a.
Network.
b. Click Add, click Client, and then click Add.
In the Manufacturers box, click the appropriate manufacturer, click the
c.
appropriate client in the Network Clients box, and then click OK.
d. Click Add, click Protocol, and then click Add.
In the Manufacturers box, click the appropriate manufacturer, click the
e.
appropriate protocol in the Network Protocol box, and then click OK.
Follow the instructions to finish installing the network client and protocol.
4. Configure a peer server. Each computer that is configured for File and
Printer Sharing can act as a server. To configure a computer for File and
Printer Sharing, use the following steps:
.
Click Start, point to Settings, click Control Panel, and then double-
. a. click Network.
Click File and Print Sharing, click one or both options to share files
b.
and printers, click OK, and then click OK again.
Click Yes when you are prompted to restart your computer.
c.
5. Give each computer a unique computer name. To do this, use the
following steps:
Click Start, point to Settings, click Control Panel, and then double-
a.
click Network.
On the Identification tab, type a unique name in the Computer name
b.
. box.
Click OK, and then click Yes when you are prompted to restart your
computer.
c.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
NOTE: The computer name must be unique for each
computer on the network and should be no more than 15 characters in
length. In small networks, the workgroup name should be the same for
each computer so that all computers are visible in the same workgroup
when browsing. You should not use spaces or the following characters
in computer and workgroup names:
/\*,."@
Windows XP Networking
As in previous versions of Windows, Windows XP provides a wizard for
network connection setup. Wizards break down a task into individual steps
and guide the user through the steps one at a time.
The Windows XP New Connection Wizard supports two basic types of
Internet connections, dialup and broadband.
To access the network connection setup wizard in Windows XP,
navigate through the Start menu to the Connect To and Show all
connections options as shown below.
The same feature is also accessible via the Network Connections icon
in Control Panel.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Choosing either of the above options causes a new window to appear
on the desktop as shown below. On the right, this window displays icons for
any pre-existing connections. The Create a new connection option on the
left allows new connections to be set up.
Types of Windows XP
Network Connection Setup
Clicking the Create a new connection option from the Network
Connections dialog activates the wizard as shown below.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Clicking Next presents the user with three main choices for Internet
and private network setup as shown below.
The Connect to the Internet option supports several types of Internet
connection setup. This option allows the user to choose from a list of ISPs,
use a setup CD-ROM provided by their ISP, or set up a connection manually.
Connect to the network at my workplace supports client-side set up
of both dialup remote access and VPN services.
The Set up an advanced connection option supports serial, parallel
and infrared port networking setups. This option also allows the user to
enable certain types of incoming network connections.
Setting up an Internet Connection
The Getting Ready page presents three choices as shown below:
The Choose from a list of Internet Service Providers option gives
instructions for setting up an account with an ISP, then making the Internet
connection through that new account.
The Set up my connection manually option sets up connections for
accounts that have already been opened with an ISP (username and
password are ready for use).
The Use the CD I got from an ISP option should be used when
possessing an installation CD-ROM from one of the service providers.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
By default the first option Get online with MSN (Microsoft Network) is
selected. To set up a new connection to MSN, click Finish. To set up a new
connection to various other ISPs, change the radio button selection to the
second option and then click Finish.
MSN Internet Connection Setup
After choosing MSN and clicking Finish, the Windows XP network
connection wizard closes and a new window opens as shown below.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
This window leads to the MSN Explorer Wizard. Answering Yes to this
question creates a key in the Windows Registry that allows access to MSN
email from the Windows XP Start Menu. Answering No to this question skips
that step. After answering either Yes or No, the MSN wizard launches
automatically.
The MSN wizard sets up an MSN account and dial-up Internet
connection but require a working phone line connected to a working modem.
Other ISP Internet Connection Setup
After choosing an alternate ISP and clicking Finish, the Windows XP network
connection wizard closes and a new Windows Explorer window opens as
shown below.
The first shortcut launches the MSN window shown above. The second
shortcut launches a new Internet Connection Wizard. This wizard dials a
public phone number to obtain a list of ISP referrals from Microsoft.
Obviously, this wizard will provide a limited list of service providers and not
necessarily the best ones for each individual's needs.
These shortcuts, installed in C:\Program Files\Online Services, can be
accessed at any time from Windows Explorer. It is not necessary to navigate
through the Windows XP network connection wizard to execute them.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
This wizard assumes an account has been opened previously. Manual
connections require the username (account name) and password from a
working ISP service. Dial-up connections also require a telephone number;
broadband connections do not.
The next step presents three options for creating a manual connection.
The Connect using a dial-up modem option works for phone line
Internet services (either traditional dial-up or ISDN).
The Connect using a broadband connection that requires a user
name and password option works for DSL or cable modem Internet services
that use PPPoE.
The Connect using a broadband connection that is always on
option works for true "always on" DSL or cable modem services (those that
do not require a username/password) as specified in their service agreement.
Microsoft added this option for informational purposes only. Service
providers normally create their setup CDs to include all of the necessary
setup data for an operating system in a self-contained package. Therefore,
clicking Finish has no effect other than to exit the wizard.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Job Sheet 3.2-3
Title: Setting XP Network Connection
Performance Objectives:
Given the following materials, set-up a network connection on four
computers.
Supplies : Materials
Equipment : UTP cables, 4 Computer units and 1 hub
Steps/Procedure:
1. Connect the UTP cables
2. Click start menu button and access control panel
3. Click network connections and create a new network connection
4. Click next and connect to the internet
Assessment Method:
Demonstration Assessment using the Performance Criteria Checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Performance Criteria Checklist 3.2-3
CRITERIA YES NO
Does your output have the following?
Safety Precautions are observed.
All the UTP are properly connected to the computer and
hub.
Computers are properly connected and seen in the network.
Proper boot-up and shutdown of the computer is observed.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LEARNING OUTCOME # 3 INSPECT & TEST CONFIGURED COMPUTER
SYSTEMS AND NETWORKS
CONTENTS:
1. Occupational Health & safety
1. Inspection of systems and networks with manual
2. Making documents and reports
ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the configuration done
on the systems and networks conforms with the manufacture’s
instruction/manual
2. Computer systems and networks are checked to ensure safe operation.
3. Report is prepared and completed according to company requirements.
CONDITION:
Trainees must be provided with the following:
OH & S policies and procedures
- OH & S policies
- manuals
Computer systems and networks
- 1 Server
- Peripherals
- 1 Desktop Computers
Materials
- Wires and Cables
- Appropriate Software
- Computer Storage Media
Tools
- Pliers
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
- Philips screw driver
Equipment/testing devices
- Computer
Personal protective equipment
- Anti-static wrist wrap
ASSESSMENT METHOD:
Hands-on application
Direct observation
Practical demonstration
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
LEARNING EXPERIENCES
Learning Outcome 3
INSPECT & TEST CONFIGURED COMPUTER SYSTEMS & NETWORKS
Learning Activities Special Instructions
1. Read Information Sheet 3.3-1 on
testing normal function of
systems & networks
Do not write anything on the module
2. Answer Self-Check 3.3-1 Prepare a separate sheet of paper on
the Self-Check and Activity.
3. Check Answers by comparing
with the answer key
4. Perform job sheet 3.3-1
5. Evaluate your own work using
the performance criteria checklist
6. Read Information Sheet 3.3-2 on
testing normal function of
systems & networks
Do not write anything on the module
7. Answer Self-Check 3.3-2 Prepare a separate sheet of paper on
the Self-Check and Activity.
8. Check Answers by comparing
with the answer key
9. Perform job sheet 3.3-2
10. Evaluate your own work
using the performance criteria
checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.3-1
Inspection of Systems and Networks
Learning objectives
After reading this information sheet, you must be able inspect computer
systems and networks and share resources and access shared resources.
You have learned from Information Sheet #3.2-3 how to configure a Peer-to-
Peer network and XP connection with Internet. Now to check if the LAN
connection is really working, you must try to share your resources and accessed
shared resources of other computer. Make sure that you follow the standard
operating procedures in configuring network to achieve successful operation.
Sharing Resources and Accessing Shared Resources
1. Open My Computer, double-click the C:
drive, and create a new folder on the C:
drive. Name it Shared. Right-click the
Shared folder and select Properties.
2. In the Shared Properties dialog box,
select the Sharing tab. Notice that the.
Select the Share This Folder button. Type
the Share Name. Click Apply and the
computer you are linked to should be able
to view your Shared folder.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
3. Right-click My Network Places, which should be located on your desktop.
Select Properties. Right-click your connection (look for a name like Local Area
Connection) and again select Properties. In your Local Area Connection Properties
dialog box, select File and Print Sharing for Microsoft Networks and click OK. If
you don’t see an option for File and Print Sharing, click Install and select a
service and then click Add. Now select the File and Print Sharing option.
4. Open My Network Places- double-click the icon- and select the Entire Network
option under Other Places at the left of the window. In the main (right-hand)
pane, you should see one or more options. Double-click the Microsoft Windows
Network icon.
Local Disk (C:\PC 1)
5. You’re now at the main network screen, where you should see what’s called a
workgroup. A workgroup is a basic group of computers connected to the same
Ethernet network. Double-click the workgroup to see all the computers
connected to your Ethernet network.
In a network, other peripherals such as printer and faxes could also be shared.
You could use one computer in a network of 10 computers. Click the Print
command, when the dialog box appears click Find Printer. Then click Browse.
Find the location of the printer you will use.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
If you don’t have any printer installed in your computer, here’s the step on
how:
TO ADD A PRINTER:
1. Click Start button, then point to Printer and Faxes.
2. A window will be displayed showing Click Add a Printer on the Task pane (if
there are printers already installed).
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
At this point, you can access any of the other computers and see what
folders they have shared. If you don’t see any computer but your own, just wait a
few minutes and refresh your screen. Then it’s time to troubleshoot the network
problems.
3. To continue, click Next.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
4. Select what kind of printer you are going to connect, Local printer or Network
printer.
5. Select Printer port.
6. Below Manufacturer, Click on the name of the printer's manufacturer.
Manufacturers are listed in alphabetical order and you may have to click on the
little down arrow until the manufacturer's name appears in the list.
Below Model, Click on the model of the printer you will be using. Model
names are listed in alphabetical order and you may need to click on the little
down arrow until the model name appears in the list.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Note: You can often find the manufacturer and model names by looking on the
printer itself.
11. Click the Next button. Windows will check to see if it has the software
necessary to communicate with the printer (the software your computer needs to
communicate with devices like printers, monitors, and disk drives is known as a
driver). If so, it will install the software automatically.
Note: If you receive a message saying that Windows was unable to
locate the necessary files, you will need to get the necessary software before
continuing. Most often, the printer manufacturer's Web site will have a section
called Drivers, from which you can download the software necessary to use their
products. If you are unable to locate the software on the manufacturer's Web
site, inquire within your department to see if someone is in possession of a
software installation disk for the printer. Once you have obtained the necessary
software, click here for instructions on installing a driver.
12. Assign your Printer name. Click Next. If you want to test page, click Yes. Click
Next.
1. Below Manufacturer, Click on the name of the printer's manufacturer.
Manufacturers are listed in alphabetical order and you may have to click on the
little down arrow until the manufacturer's name appears in the list.
Below Model, Click on the model of the printer you will be using. Model
names are listed in alphabetical order and you may need to click on the little
down arrow until the model name appears in the list.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Note: You can often find the manufacturer and model names by looking on the
printer itself.
13. Click the Next button. Windows will check to see if it has the software
necessary to communicate with the printer (the software your computer needs to
communicate with devices like printers, monitors, and disk drives is known as a
driver). If so, it will install the software automatically.
Note: If you receive a message saying that Windows was unable to
locate the necessary files, you will need to get the necessary software before
continuing. Most often, the printer manufacturer's Web site will have a section
called Drivers, from which you can download the software necessary to use their
products. If you are unable to locate the software on the manufacturer's Web
site, inquire within your department to see if someone is in possession of a
software installation disk for the printer. Once you have obtained the necessary
software, click here for instructions on installing a driver.
14. Assign your Printer name. Click Next. If you want to test page, click Yes. Click
Next.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
9. Then Finish. Right-click on the printer you installed. Click Set as Default.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Job Sheet 3.3-1
Title: Accessing Printer in a Network
Performance Objectives:
Given the following materials and equipment’s, access one document file on
other computer in a network, Print the file you open with the use of the network
printer.
Supplies : Materials
Equipment : Printer, 4 Computer units and 1 hub
Steps/Procedure:
1. Open My Network Places- double-click the icon- and select the Entire
Network option under Other Places at the left of the window
2. Double-click the Microsoft Windows Network icon.
3. Open workgroup and locate folder
Assessment Method:
Demonstration Assessment using the Performance Criteria Checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Performance Criteria Checklist 3.3-1
CRITERIA YES NO
Does your output have the following?
Computers are connected in the network
All the peripherals are properly inspected.
Shared files are located and opened a document in the
computer.
Accessed file has been printed.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
INFORMATION SHEET 3.3-2
Making Documents and Reports
Learning objectives
After reading this information sheet, you must be able to make documents
and reports for computer maintenance.
Writing an Accomplishment Report
Accomplishment Report is done when you have finished a certain job. This
report may be in narrative or tabular form.
Sample of an Accomplishment Report
ACCOMPLISHMENT REPORT
Name: ___________________________ Date:_________________
Assigned Task Working Not Working Connected in a
Properly Network
PC 1 √ √
PC 2 √ √
PC 3 √
Printer √ √
Accidental Event Checklist
Accident reports may contain the following details:
Name of person injured
Date and Time of accident
Type of Injury
First Aid given
Action taken to prevent further accidents.
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
With this kind of report, the teacher and the students could see what type
of accident mostly occur on their place that they could already prevent it from
coming.
Sample Accident Report
ACCIDENT, DANGEROUS OCCURRENCE AND INCIDENT REPORT
Name: _______________________________ Date: ________________
Year & Section: ______________________
A. Subject of Report
(Please tick the box)
Injury
Dangerous occurrence
Damage to equipment
Accidents/incidents with the potential to injure or cause damage
Health Condition
B. Place, Date, Time:
Exact location of event: ___________________________________
Time of event: ____________________________________________
Teacher-in-charge at the time of event: ___________________
C. Nature of Injury:
___________________________________________________________
___________________________________________________________
___________________________________________________________
D. First Aid Treatment:
___________________________________________________________
___________________________________________________________
___________________________________________________________
Checked by: ____________________________
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Task Sheet 3.3-2
Title: Making Report
Performance Objectives:
Make an Accident Report that you may encounter inside the computer
laboratory and Accomplishment Report.
Supplies : Materials
Equipment : Printer, LCD Projector, Computer
Steps/Procedure:
1. Follow the instructions given in task 3.3-2 how to make an accident and
accomplishment report
2. Make an accident and accomplish report inside the computer laboratory
Assessment Method:
Portfolio Assessment using the Performance Criteria Checklist
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Performance Criteria Checklist 3.3-2
CRITERIA YES NO
Does your output have the following?
Followed the instructions in making accident and
accomplishment report
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
TRAINING SESSION EVALUATION FORM
INSTRUCTIONS:
This post-training evaluation instrument is intended to measure how satisfactory your trainer has
done his job the whole duration of your training. Please give your honest rating by checking on the
corresponding cell of your response. Your answers will be treated with utmost confidentiality.
TRAINERS/INSTRUCTORS
1 2 3 4 5
Name of Trainer: HANS B. DELA CRUZ
/
1.Orients trainees about the CBT, the use of CBLM and the
evaluation system
/
2.Discusses clearly the unit of competencies and outcomes
to be attained at the start of every module
/
3.Exhibits mastery of the subject/course he/she is
teaching
/
4.Motivates and elicits active participation from the
students or trainees
/
5.Keeps records of evidences of competency attainment of
each student/trainees
/
6.In still value of safety and orderliness in the classroom
sand workshops
/
7.In stills the value of teamwork and positive work values
/
8.In stills good grooming and hygiene
/
9.In stills value of time
/
10.Quality of voice while teaching
/
11.Clarity of language/dialect used in teaching
/
12.Provides extra attention to trainees and
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Students with specific learning needs /
/
13.Attends classes regularly and promptly
/
14.Shows energy and enthusiasm while teaching
/
15.Maximizes use of training supplies and materials
/
16.Dresses appropriately
/
17.Shows empathy
/
18.Demonstrates self-control
This post-training evaluation instrument is intended to measure how satisfactorily your
trainer prepared and facilitated your training .Please give your honest rating by checking on the
corresponding cell of your response. Your answers will be treated with utmost confidentiality.
Use the following rating scales:
5-Outstanding
4-VeryGood/Very Satisfactory
3–Good/Adequate
2–Fair/Satisfactory
1–Poor/Unsatisfactory
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
PREPARATION 1 2 3 4 5
1.Work shop lay out conforms with the /
components of aCBTworkshop
2. Number of CBLM is sufficient /
3.Objectives of every training session is well explained /
4.Expected activities/outputs are clarified /
DESIGN AND DELIVERY 1 2 3 4 5
1. Course contents are sufficient to attain objectives /
2.CBLM are logically organized and /
presented
3.InformationSheetarecomprehensivein providing /
the required knowledge
4.Examples, illustrations and /
demonstrations help you learn
5.PracticeexerciseslikeTask/Job Sheets are sufficient to /
learn required skills
6. Valuable knowledge are learned through /
thecontentsofthecourse
/
7.Training Methodologies are effective
8.Assessment Methods and evaluation system are /
suitable for the trainees and the competency
9.Recording of achievements and competencies /
acquired is prompt and comprehensive
10.Feed back about the performance of learners /
are given immediately
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
TRAININGFACILITIES/RESOURCES 1 2 3 4 5
/
1.Training Resources are adequate
2.Training Venue is conducive and /
appropriate
3.Equipment,Supplies,and Materials are /
Sufficient
4.Equipment,SuppliesandMaterials are suitable and /
appropriate
5.Promptness in providing Supplies and /
Materials
SUPPORTSTAFF 1 2 3 4 5
/
1.Support Staff area Accommodating
Comments/Suggestions:
He is energetic and resourceful.
Submitted by:
Hans B. Dela Cruz
Trainer
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
TABLE OF SPECIFICATION
Objectives/Content Comprehensi Applicatio
Knowledge Total number of items # of Items/ % of test
area/Topics on n
Plan and Prepare
1 2 2 5 33%
for Configuration
Configure
computer
1 2 2 5 33%
systems and
networks
Inspect and test
configured
computer 2 1 2 5 33%
systems and
networks
TOTAL 4 5 6 15 100%
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Training Activity Matrix
Venue
Facilities/Tools and Date &
Training Activity Trainee Remarks
Equipment (Workstation/ Time
Area)
PC
8:00am
Install computer Os installer
Hans B. Computer To
systems and PC Peripherals Laboratory 4:00 pm
To be assess
networks dela Cruz Application Software
PC
Diagnose and Hans B. System Unit 8:00 am
parts Computer To be assess
troubleshoot dela Cruz Laboratory
To
computer systems Screw driver 4:00 pm
Flash Lights
LAN Card
Ethernet Computer 8:00 am
Configure Hans B. Switch Laboratory To To be assess
computer systems dela Cruz Router 4:00 pm
and networks Network Cable
Updated Anti Virus
Trojan Remover
Spyware To be assess
Computer 8:00 am
Maintain computer Hans B. terminator Laboratory To
systems and dela Cruz
Network security 4:00 pm
networks Software
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
SELF-ASSESSMENT GUIDE
INSTRUCTIONS: This Self-Check Instrument will give the trainer necessary data or information which is
essential in planning training sessions. Please check the appropriate box of your
answer to the questions below.
Qualification: COMPUTER HARDWARE SERVICING NC II
Units of Competency: Configure Computer Systems and Networks
Instruction:
Read each of the questions in the left-hand column of the chart.
Place a check on each question to indicate your answers.
Can I? YES NO
Plan and prepare work to ensure occupational health and safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices needed to
conform with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and determines its
location prior to installation
Install equipment/devices/systems in accordance with job
requirements *
Check/Test devices/systems and/or installations to determine the
conformity to job requirements *
Check computer systems and networks for configuration in
accordance with specifications and requirements *
Diagnose fault or problem in the computer systems and networks in
line with standard operating procedures (SOP) *
Configure the identified systems and networks based on
specifications and job requirements *
Inspect and test configured computer systems and networks in
conformity with manufacturer's instructions/manual *
Correct/Adjust components or parts of computer systems and
networks in accordance with job requirements *
Test computer systems and networks to ensure safe operation
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
Perform scheduled/periodic maintenance in accordance with
manufacturer's requirements
Make needed repairs/replacements in accordance with established
procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials in
accordance with company SOP
I agree to undertake assessment in the knowledge that information gathered will only
be used for professional development purposes and can only be accessed by concerned
assessment personnel and my manager/supervisor.
Candidate’s Name: Date:
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz
lOMoARcPSD|11563233
CBLMs on Computer Date Developed: Document No.
BHI Hardware Servicing NC II April 2, 2013 Issued by:
Date Revised: Bishop Haden Institute
Configuring Computer Page
Systems & Networks Developed by: Revision # : 00
Hans B. de la Cruz