CSS11 q1 Mod1 InstallandConfigureComputerSystem v5
CSS11 q1 Mod1 InstallandConfigureComputerSystem v5
Computer System
READY TO
PRINTNCII
Servicing
MODULE 1:
Install and Configure
Computer Systems
Computer System Servicing NC II0 Grade 11
Alternative Delivery Mode
Quarter 1 – Module 1: Install And Configure Computer Systems
Second Edition, 2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
READY
PRINTTO
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Development Team
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Co-Chairpersons: Dr. Victor G. De Gracia Jr. CESO V
Assistant Regional Director
Jonathan S. dela Peña, PhD, CESO V
Schools Division Superintendent
Nimfa R. Lago, PhD, CESO VI
Assistant Schools Division Superintendent
Mala Epra B. Magnaong, Chief ES, CLMD
Table of Contents
What I Need To Know …………………………………….…….…… 1
General Instructions ………………………………………………… 1
Module Objectives ………………………………………………… 2
Module Content ………………………………………………… 2
What I Know ………………………………………………… 2
Definition of Terms ………………………………………………… 5
READY
PRINTTO
Quarter 2- Learning Outcome 3: Install operating system and drivers for
peripherals/ devices
Learning Outcome 4: Install application software
Learning Outcome 5: Conduct testing and documentation
Information Sheet No. 1.2-2 - Creating Installers 6
Task Sheet No. 1.2-2 9
Information Sheet No. 1.2-3- Creating Bootable USB Media 10
Task Sheet No. 1.2-3 11
Information Sheet No. 1.3-1- Installing Windows Operating System 12
Greetings!
This module contains training materials and activities for you to finish. You are
required to go through a series of learning activities. If you have questions, don’t
hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems
READY
PRINTTO
that is in line with the industry standards. You need to complete this module before
you can perform the next module.
The unit of competency, “Install and Configure Computer Systems“, is one of the
competencies of Computer Systems Servicing NCII, a course which comprises
knowledge, skills and attitudes required for a trainee to possess.
In this module, you are required to go through a series of learning activities in
order to complete each learning outcome. In each learning outcome are Information
Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the
activities on your own. If you have questions, do not hesitate to ask for assistance from
your teacher.
Remember to:
• Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there
to support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way, you
will improve your speed, memory and your confidence.
Introduction
This module is designed to equip you the TVL Open High School Learners with
essential Knowledge, Skills, and Attitude in performing the tasks on Computer System
Servicing which will lead you to acquire National Certificate Level II.
This module includes information and activities to develop desirable values, skills
and understanding through step-by-step procedures and helpful techniques that will
guide you on how to install and configure computer systems. Furthermore, applications
to real life situations are also included for lifelong learning.
READY
PRINTTO
What to Learn in this Module?
At the end of the lesson, you’re expected to:
1
Pre-Test
What I Know?
READY
PRINTTO
2. CPU is the _____________ of the computer.
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
4. Is the hardware in a computing device where the operating system (OS), application
programs and data in current use are kept so they can be quickly reached by the
device's processor.
a. RAM
b. Operating system
c. CPU
d. HDD
2
6. Identify the malwares.
a. trojan
b. virus
c. spyware
d. all of the choices
READY
PRINTTO
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
3
d. People
READY
PRINTTO
c. System Unit
d, PC
Definition of Terms
4
CPU-Central processing unit; the brain of the computer; controls the other elements
of the computer
Disk Drive-A peripheral device that reads and/or writes information on a disk
Hard Drive-A device (usually within the computer case) that reads and writes
information, including the operating system, program files, and data files
Modem-A peripheral device used to connect one computer to another over a phone
line
READY
PRINTTO
Monitor-A device used to display information visually
Printer-A peripheral device that converts output from a computer into a printed image
Browser-A program used to view World Wide Web pages, such as Netscape
Navigator or Internet Explorer
Internet-A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols
URL-Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet
Window-A screen in a software program that permits the user to view several programs
at one time
5
What I Need To Know?
Read Information Sheet No. 1.2-2 and find out how much you can
remember. Do Self-Check 1.2-2 to know how much you have learned.
CREATING INSTALLERS
WHAT IS AN IMG OR ISO FILE? An IMG or ISO file is a complete image of physical
media such as a CD-ROM, DVD, floppy disk, etc. that contains all of the files in a
READY
PRINTTO
particular package.
6
Your installation package contains one of the images identified in the previous section.
To install any software package from an image, the image itself must first be “mounted”
by the Operating System.
∙ Burning the image directly to DVD making sure to specify the source type as
“image”. Once the burning of the image is complete, the physical media can be
inserted into the computer and will be recognized like any other DVD. You must
have a writable DVD drive. See the Creating Bootable DVD Media section below.
∙ Burning the image directly to a USB thumbdrive. This is particularly useful for
READY
PRINTTO
those people who have Netbooks or other computers without a writable DVD
drive. See the Creating Bootable USB Media section below.
Note: Burning the file to a disk as a “data disk” will simply end up with
an .img or .iso file on the disk, which cannot be used for the installation.
To prepare physical media from a bootable installation image, you require the following:
7
To launch the burning software:
READY
PRINTTO
downloaded.
5. Click Burn and wait for the process to Finish , then Exit
.
8
TASK SHEET. 1.2-2
Performance Objective In the Computer Lab, given all the software and a
computer, the learner must be able to create a an installation disk for Drivers,
READY
PRINTTO
Applications and Utilities 15 Minutes.
Equipment:
1.Computer
2.Installation Software (Drivers, Application Software and Utilities)
3. PPE
Steps/Procedure:
9
What I Need To Know?
Read Information Sheet No. 1.2-3 and find out how much you can
remember. Do Task Sheet 1.2-3 to know how much you have learned.
To be able Create a Windows bootable USB from an ISO image we must have a
8GB or higher USB and a Windows 10 ISO image downloaded on your computer.
READY
PRINTTO
Download: Rufus app: https://rufus.akeo.ie/ Download Windows 10: https://goo.gl/Q75Q4d
3
5
10
TASK SHEET. 1.2-3
Performance Objective In the Computer Lab, given all the software and a
computer, the trainee must be able to create a bootable Windows in USB Drive
in 25 Minutes.
READY
PRINTTO
Supplies/Materials: Software/Flash/USB Drive/Computer
Equipment:
1.Computer
2.Installation Software (Windows ISO File, Rufus, ISO Burner)
3. PPE
Steps/Procedure:
Read Information Sheet No. 1.3-1 and find out how much you can
remember. Do Self-Check 1.3-1 to know how much you have learned.
11
Installing Windows Operating System
Installing Windows 10
In order to install your copy of the Windows 10 operating system please make sure to
have the following items:
READY
PRINTTO
*NOTE: Please make sure to back up all of your important data before proceeding with
this installation.
Boot your computer after popping in the Windows 10 DVD into the DVD Drive/ bootable
USB Drive. In most cases if you do this you'll automatically boot in to the Windows 10
Installation DVD. Bootable USB Drive. But in some cases if the Boot device order is
changed in the BIOS it may boot in to your older OS, instead of our DVD/USB Drive. In
that case you'll need to change the BIOS settings to get it done.
Before the starting installation make sure what type of PC you are using( 32bit or 64 bit)
To do this:
1. Right Click on This PC and click Properties:
2. You will then get the necessary information you need.
12
Step 2. You will see a prompt that says ‘Press any key to continue’. When you see this
press any key immediately. *NOTE: The following screen shots may differ from what
you may see during your installation.
Step 3: Starting windows with windows logo will appear
READY
PRINTTO You will be prompted to enter the license key. You
can choose skip at
this time
Step 7: “Which type of installation?” will appear. Choose Custom(advanced) for clean
installation.
Step 8.
“Where do
you want to
install Windows?” Make sure the partition is
highlighted.
Note: Deleting all the partition will erase all data in the
system
13
Step 10. Disk 0 Unallocated Space should be the only listing at this point. If it is press
next, if not please delete any additional partitions that are listed. Clicking Next will
automatically reformat the drive and install the Operating System
READY
PRINTTO
up process so as not to disturb the rest of
the installation process.
Performance Objective In the Computer Lab, given all the software and a
computer, the trainee must be able to Install Windows Operating system, Drivers,
Applications and Utilities in 1 hour
14
Supplies/Materials: Software/Flash/USB Drive/Computer
Equipment:
1.Computer
2.Installation Software (Windows Operating System Installer, Drivers, Application
Software and Utilities)
3. PPE
Steps/Procedure:
READY
PRINTTO
1.Proceed to the station (with PC Unit) assigned to you
2. Clean Install a Windows 10 Operating System
3. Install all Device Drivers
4. Install windows Update
5. Install third Party Software
a. Antivirus
b. MS Office
c. PDF Reader
d. Web Browser
Read Information Sheet No. 1.3-2 and find out how much you can
remember. Do Self-Check 1.3-2 to know how much you have learned.
Device driver
15
More commonly known as a driver, a device driver or hardware driver is a group of files
that enable one or more hardware devices to communicate with the computer's
operating system.
Before searching for the drivers or software of a device, make sure you know the
manufacturer and model of the device.You can often find the drivers available for
download from the manufacturer's web page or the drivers and utilities CD shipped with
your computer. You can find a listing of computer manufacturers in the internet.
READY
PRINTTO
What hardware device drivers should be updated?
Below is a listing of recommended hardware devices that you should make sure
are updated. Updating your computer's drivers and other updates can resolve problems,
improve the performance, and increase the stability of your computer.
⮚ BIOS updates
⮚ CD or DVD drive drivers and firmware
⮚ Controllers
⮚ Display drivers
⮚ Keyboard drivers
⮚ Mouse drivers
⮚ Modem drivers
⮚ Motherboard drivers and updates
⮚ Network card drivers
⮚ Printer drivers
⮚ Removable media drivers
⮚ Scanner drivers
⮚ Sound card drivers
⮚ Video drivers
⮚ BIOS updates
After reinstalling Windows or your operating system you may find that you have
to reinstall many if not all of the drivers for your computer components. Microsoft
Windows and all other operating systems will not require you install drivers in order. As
long as you are installing the correct drivers for your computer you should have no
issues installing the drivers in any order.
16
follow this link for Tips and Tricks in installing and updating device drivers.
https://www.youtube.com/watch?v=BDtwfRnEl7I
READY
PRINTTO
Read Information Sheet No. 1.4-1 and find out how much you can
remember. Do Self-Check 1.4-1 to know how much you have learned.
Application software consists of programs designed to perform specific tasks for users.
Both the Microsoft Windows and the Apple Macintosh operating systems use the
concept of a desktop. The desktop is an on-screen work area with common graphical
17
elements such as icons, buttons, menus, links, windows, and dialog boxes. A software
application can be started by clicking its program name on a menu, or list of commands.
1. People use productivity software to become more effective and efficient while
performing daily activities. Word processing software allows users to create and
manipulate documents that contain text and graphics. With word processing software,
you can insert clip art into a document; change margins; find and replace text; use a
spelling checker to check spelling; place a header and footer at the top and the bottom
of a page; and vary font (character design), font size (character scale), and font style
(character appearance).
READY
PRINTTO
2. With spreadsheet software, data is organized in rows and columns, which
collectively are called a worksheet. The intersection of a row and column, called a cell,
can contain a label (text), a value (number), or a formula or function that performs
calculations on the data and displays the result.
6. Project management software allows you to plan, schedule, track, and analyze the
progress of a project. Accounting software helps companies record and report their
financial transactions.
7. Power users often use software that allows them to work with graphics and
multimedia. Computer-aided design (CAD) software assists in creating engineering,
architectural, and scientific designs. Desktop publishing (DTP) software is used to
design and produce sophisticated documents. DTP is developed specifically to support
page layout, which is the process of arranging text and graphics in a document. Paint
software is used to draw graphical images with various on-screen tools. Image editing
software provides the capability to modify existing images. Video editing software and
audio editing software can be used to modify video and audio segments.
18
8. Multimedia authoring software is used to create electronic interactive presentations
that can include text, images, video, audio, and animation. Web page authoring
software is designed to create Web pages and to organize, manage, and maintain Web
sites.
READY
PRINTTO
predefined layouts, and supplying standard text.
10. Photo-editing software is used to edit digital photographs. A clip art/image gallery
is a collection of clip art and photographs that can be used in all types of documents.
Home design/landscaping software assists with planning or remodeling. Educational
software teaches a particular skill and exists for about any subject. Reference software
provides valuable and thorough information for all individuals. Entertainment software
includes interactive games, videos, and other programs designed to support a hobby or
provide amusement.
11. One of the main reasons people use computers is to communicate and share
information. E-mail software is used to create, send, receive, forward, store, print, and
delete e-mail (electronic mail). A Web browser is a software application used to access
and view Web pages. A chat client is software that allows you to connect to a chat
room, which permits users to chat via the computer.
A Web application is a software application that exists on a Web site. To access the
Web application, you visit the Web site that offers the program.
Many software applications and Web sites provide learning aids. Online Help is the
electronic equivalent of a user manual. Usually integrated into an application software
19
package, online Help often is context-sensitive, meaning that the Help information is
related to the current task being attempted. Most online Help also provide links to Web
sites that have a FAQs page. FAQs (Frequently Asked Questions) supply answers to
common queries. Many books are available to help you learn to use the features of a
personal computer application package. A wizard is an automated assistant that helps
complete a task by asking questions and then performing actions based on the
answers.
⮚ productivity software,
⮚ graphics design/multimedia software,
READY
PRINTTO
⮚ home/personal/educational software,
⮚ and communications software.
An application can belong to more than one category. For example, an e-mail program
can be considered both productivity software and communications software.
Anti-Virus
Overview
Anti-virus is a security program you install on your computer or mobile device to protect
it from getting infected by malware. The term “malware” is a catch-all phrase for any
type of malicious software, such as viruses, worms, Trojans and spyware. In fact, the
term malware comes from combining the words malicious and software. If your
computer has become infected by malware, a cyber attacker can capture all of your
keystrokes, steal your documents or use your computer to attack others. Contrary to
what some people believe, any operating system, including Mac OS X and Linux, can
be infected.
Browser Hijacker
One type of virus is called a browser hijacker. This works in a way that it takes over
parts of the internet browser you are using and redirects it to certain sites. Its purpose is
to increase advertisement revenue by bringing traffic to certain web pages.
Directory Virus
A second type of virus is known as a Directory Virus and are also called File System
Virus or Cluster Virus. This virus works by changing the path that indicates the files
location by infecting the directory of your computer. These infect the entire directory but
are usually found in a location in the disk. An example is Dir-2 virus. These make it
difficult to locate your files and may seem that files have disappeared.
20
Trojan
Trojan or Trojan horse is sent to your computer by a program that it is hidden inside . A
trojan disguises itself to make one believe it is an important or useful program. These
are often in highly desirable downloads like games, free software, and even movies or
music. Trojans are different that other viruses, because they don’t multiply or spread.
However, they are very dangerous because they can capture your login information on
sites that you input your information.
Memory Resident Virus are put on your computers memory. When the operating system
READY
PRINTTO
runs the virus gets activated and every file that was opened gets infected. Even after
execution of the malicious code the virus stays hidden in the RAM. This virus corrupts
programs and files that are used in any way. Randex, Meve and MrKlunky are some,
just to name a few.
Overwrite Virus
Another type is Overwrite Virus. This virus takes a file and infects it and the information
in it is deleted, once that happens the file is partially useless or totally. The file size is
not changed even though the content has been replaced. The file needs to be deleted,
and you will lose the content originally in it.
Anti-Virus Tips
1.Obtain anti-virus software only from known, trusted sources and vendors. It is a
common ploy of cyber attackers to distribute fake anti-virus programs that are really
malware.
2. Make sure you have the latest version of your anti-virus software installed, that your
annual subscription is paid for and active and that your anti-virus is configured to update
automatically. If your computer has been offline or powered off for a while, your anti-
virus software will need to update itself when you turn it back on or reconnect it to the
Internet. Do not postpone these updates.
3. Make sure your anti-virus automatically scans portable media, such as USB sticks,
and ensure real-time protection is on.
4.Pay attention to the on-screen warnings and alerts generated by your anti-virus
software. Most alerts include the option of getting more information or a
recommendation about what to do next. If you get an alert on a work-supplied computer,
be sure to contact the help desk or your supervisor immediately.
5.Do not disable or uninstall your anti-virus software because you feel it is slowing down
your computer, blocking a website or preventing you from installing an app or program.
21
Disabling your anti-virus will expose you to unnecessary risk and could result in a
serious security incident. If problems persist on a work computer, contact your help
desk. If the problems persist on your personal computer, try contacting the anti-virus
vendor, visiting their website for more information or replacing your anti-virus with
another product.
6.Do not install multiple anti-virus programs on your computer at the same time. Doing
so will most likely cause the programs to conflict with each other and may actually
reduce the security of your computer.
7.Learn to recognize the warnings that your anti-virus software produces. Cyber
attackers can set up malicious websites that post very realistic but fake anti-virus
READY
PRINTTO
warnings and offer to help you “fix” your computer. Clicking on the links or buttons on
these websites can actually harm your computer.
Visit: https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw
22
Task Sheet 1.3-2
At this point your teacher will again demonstrate how to install an Operating
system, device drivers and third-party application. After which you will be asked to do
the task by yourselves. Below is the rubrics on how you will be assessed.
READY
PRINTTO
Task 2- Install the necessary drivers and updates.
23
What I Need To Know?
Read Information Sheet No. 1.5-1 and find out how much you can
remember. Do Self-Check 1.5-1 to know how much you have learned.
You were introduced with all the necessary knowledge and skills on installation of
computer devices and operating system. Now, after executing the correct procedures I
READY
PRINTTO
am sure that installation is a very easy task for you.
Those skills will be very essential for the next lesson.
In the next phase of your learning it will focus in conducting test on the 588 installed
computer components. After reading all the required topics and performing the essential
skills you must be able to:
✔ Follow OHS policies and procedures in conducting tests;
✔ Check circuits and systems being isolated using specified testing procedures;
✔ Test devices, systems and/or installation to determine its conformity with the
requirements;
✔ Undertake final inspections on the installed devices, systems to ensure
conformity with the requirements;
✔ Accomplish technical reports on the tests conducted; and
✔ Follow procedures in forwarding documentation to appropriate personnel and/or
authority on the test conducted.
You need to adhere to health and safety regulations as they will help to protect you and
others and will avoid any unnecessary legal action for reckless and unsafe working
practices. If you identify any health and safety problems, you should tell yourline
manager or the health and safety representative immediately.
The most basic test is to switch the system on to check it starts without errors. ICT
professionals are also likely to use tools and utilities to check that all is well with the
system after an installation.
24
The Use of Diagnostic Tools in testing installed hardware components and other
peripherals
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the
following:
⮚ Digital multimeter is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays
READY
PRINTTO
the information on an LCD or LED.
Software Tools
Like hardware tools, there are a variety of software tools that can be used to 643
help technicians pinpoint and troubleshoot problems. Many of these tools are free
and several come with the Windows operating system.
Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able to use
a range of software tools to diagnose problems, maintain hardware, and protect the
data stored on a computer.
You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
25
The following are some disk management tools:
⮚ FDISK: A command-line tool that creates and deletes partitions on a hard
drive. The FDISK tool is not available in Windows XP, Vista, or 7. It has been
replaced with the Disk Management tool.
⮚ Disk Management Tool: Initializes disks, creates partitions, and formats
partitions.
⮚ Format: Prepares a hard drive to store information.
⮚ ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard
drive by scanning the file system. These tools might also check the disk
surface for physical errors.
READY
PRINTTO
⮚ Defrag: Optimizes space on a hard drive to allow faster access to programs
and data.
⮚ Disk Cleanup: Clears space on a hard drive by searching for files that can be
safely deleted.
⮚ System File Checker (SFC): A command-line tool that scans the operating
system critical files and replaces files that are corrupted.
Use the Windows 10 boot disk for troubleshooting and repairing corrupted files. The
Windows 10 boot disk repairs Windows system files, restores damaged or lost files,
and reinstalls the operating system.
Test procedures
A test procedure is a set of steps to guide you through what needs to be done to
thoroughly test the installation. It is designed to help you work more effectively and
to make sure you test everything that needs testing.
Test procedures are created in-house and could include these steps:
1. Gathering test information. The first step is to run the tests required by the
procedure and find out what happens. You should record all the results of your tests
in a log so that you know which pass and which fail, thereby requiring further action.
2. Validating the test information. The next step is to check the data you gathered
from the tests to make sure it is correct. This is usually done by running the tests
again.
4. Checking specification. The final step is an important end to testing. You need
to check the specification for the installation to make sure that it has been met. For
example, if a user requested an upgrade to make their display run at 1920 x 1200,
26
then the ICT professional should check that the graphics card and screen can do
this.
The external visual inspection consists of a quick inspection of the exterior of the
computer, the monitor, the keyboard, any peripherals, and cables. While performing
the visual inspection, make any necessary corrections. To perform the external
visual inspection, perform the following steps:
READY
PRINTTO
2. Verify that all power cables are properly connected to the computer, the monitor
and peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly attached to the
proper connectors on the back of the computer.
⮚ For a PS/2-compatible mouse, the keyboard and mouse interface cable
connectors are identical except for their labels.
⮚ For a serial mouse, the mouse interface cable must be firmly attached to one
of the serial port connectors, and its captive screws must be secure enough
to ensure a firm connection.
4. Verify that network cables (if present) are properly attached.
5. Verify that any devices attached to the serial and parallel port connectors are
properly connected.
⮚ Each of the serial and parallel port interface cables must be firmly attached to an
appropriate connector on the back of the computer as well as to the interface
connector on the device. The captive screws that secure these connectors at
each end of the interface cable must be secure enough to ensure a firm
connection.
6. Verify that the video interface cable is firmly attached to the video connector on
the back panel or to a video expansion card, and also to the connector on the back
of the monitor. For proper connection of the video monitor, see the documentation
for the monitor.
7. Inspect all external monitor controls for any obvious damage or improper settings.
For proper settings of the video monitor controls, see the documentation for the
monitor.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys are
sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and indicators, and all
user-accessible data storage devices for any signs of physical damage. Does the
inspection reveal any problems?
27
No. Proceed to "Observing the Boot Routine."
After you have performed an external visual inspection as described in the previous
section, you should boot the system and, while the boot routine is running, observe
the system for any indications of problems.
NOTE: Most of the steps in this procedure require observation of system functions
READY
PRINTTO
and indications, some of which can occur simultaneously. It may be necessary to
reboot the system several times to complete all of these steps.
To observe problem indications during the boot routine, perform the following steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the
upper-right corner of the keyboard. After all three indicators flash momentarily, and
following a long pause (approximately 30 seconds), the Num Lock indicator should
light up and remain on (unless the Num Lock option is set to Off in the System
Setup program). Do these indicators flash on and off within approximately 10
seconds after the boot routine starts?
o Yes. Proceed to step 4.
o No. Troubleshoot the system power supply. If the troubleshooting
procedure indicates that the system power supply is operational, troubleshoot
the memory.
4. During the boot routine, observe the system for any of the following indications:
o Beep codes — A beep code is a series of beeps that indicates an error
condition.
28
routine, troubleshoot the diskette drive or hard-disk drive subsystem, as
appropriate.
NOTICE: Before you proceed with the internal visual inspection described in this
section, ensure that the user has saved all open files and exited all open application
programs if possible.
A simple visual inspection of a computer’s interior hardware can often lead to the
READY
PRINTTO
source of a problem, such as a loose expansion card, cable connector, or mounting
screw. To perform the internal visual inspection, perform the following steps:
1. Turn off the system, including any attached peripherals, and disconnect all the 779
AC power cables from electrical outlets.
CAUTION: Before beginning to work inside the computer, disconnect the power
supply from the power source and the power supply cables from the power
supply.
CAUTION: The heat sink assembly can get extremely hot during system
operations. Be sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp edges
on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of
each
chip.
6. Check all cable connectors inside the computer to verify that they are firmly 788
attached to their appropriate connectors.
8. Reconnect the computer and any attached peripherals to their power sources, 791
and
29
turn them on.
Is your PC healthy? Don't be too sure. Think back to when you heard a kerklunk sound
coming from the hard drive. Or maybe you remember the last time your Internet
connection was down.
The best way to find out what's wrong is to take a proactive approach: Check under
your PC's hood with the following mostly free diagnostic tools, and see if anything is
amiss--before disaster strikes.
READY
PRINTTO
Three Major Components of Computer System:
o Hardware
o Software
o Firmware
4. Power supply
o Power cord
o Fuse
30
Testing Your Software
Check the different software installed in the computer.
1. Operating system
Run live updates for your operating systems to get the latest patches and
protection for your OS.
Run registry scanners to check the OS registry configuration
2. Application Software
Check for live updates
3. Anti-virus software
Run anti-virus program
Check for virus signature updates
READY
PRINTTO
Check for spyware updates
1. First, it will check all the basic components including among other things the system
clock, the processor, RAM, the keyboard controller and the Video
2. After the video has been tested the BIOS will then indicate any errors encountered by
displaying either a numeric code or a text message on the screen.
When a device fails the first part of the POST, the BIOS will send a series of beeps
from the PC's speaker (internal) to inform the PC user that there is a problem these
beeps are coded allowing the user to diagnose the troublesome component. When the
POST has been completed successfully, the PC will make a short beep to let the user
know everything is as it should be.
31
Three (3) major brands of BIOS chip
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS
READY
PRINTTO
Self-Check1.5-1
32
I. Identify what computer error is illustrated on the following situations.
READY
PRINTTO
system loads it doesn't continue and it will take a lifetime if you're going to
wait for it to load.
__________6. This happens even if you try installing the hardware. When you
restart your set it will happen again.
__________7. When you try going to safe mode all you will see is a list of files
in Command prompt style.
__________8. Upon loading he operating system, you will hear a loading sound
and then the sound stops, when you try running an audio file, no sound
will be heard
__________9.This will happen only in standby mode, when you move your
mouse or type something, your system will automatically restart
and the worst part is it will delete a file at random.
__________10. Just like the mouse problem, when you open a program that
will take the whole screen like for example a game and/or a program
applications, when you close it, it will cause your system to restart.
Test II. List down 5 common computer problems and their solutions
Common Computer Problems Solutions
1..
2..
3..
4..
5..
Post-Test
33
1. What does BIOS stand for?
a. mother
READY
PRINTTO
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
a. RAM
b. Operating system
c. CPU
d. HDD
34
c. spyware
d. all of the choices
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
READY
PRINTTO
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
35
b. Operating System
c. Only Read Software
d. On-demand System
Generalization
READY
PRINTTO
This module gave you the opportunity to develop your knowledge, hone your
skills, behavior and motivations required in Installing and Configuring Computer
Systems that is in line with the industry standards.
You learned to Assemble computer hardware, Prepare installer, Install operating
system and drivers for peripherals/devices, install application software and conduct
testing and documentation.
This will prepare you to move on to the next lessons to improve and gain
important knowledge and skills in Setting up Computer Networks.
36
Glossary of Terms
Soldering - is a term that describes the process of joining two pieces of metal using a
filler metal.
READY
PRINTTO
Memory - Memory is a temporary storage area that holds data and instructions for an
electronic device to function.
Motherboard -A motherboard is a printed circuit board containing the components of an
electronic device.
Processor -This is the hardware within a computer that executes programs.
Microprocessor-A microprocessor is a central processing unit, or CPU, contained on a
single integrated circuit.
Power Supply -The power supply converts main AC current to low-voltage regulated
DC current used to power an electronic device.
Expansion Card -An expansion card is a circuit board that can be added to the
motherboard to give extra memory for processing data.
RAM-Random Access Memory, or RAM, is the term given to computer data storage
used to store frequently accessed data to increase the speed of the system.
38
PS/2 -PS/2 is a six-pin mini-DIN connector used to connect some PC compatible
computers with keyboards and mice.
USB-USB stands for Universal Serial Bus. It is used to connect a computer to devices
and peripherals.
Serial Ports-A serial port is a communication interface that transfers one bit of data in
or out to modems, terminals, and peripherals.
Parallel Ports- A parallel port is a communication interface that transfers several bits of
data simultaneously to peripherals.
Disk Cleanups -Disk cleanups are designed to free up disk space on a computer’s hard
READY
PRINTTO
drive.
Antivirus Software -Antivirus software detects and destroys computer viruses. A
computer virus is code that is capable of copying itself to corrupt a system or destroy
data.
Antimalware-Antimalware is software that protects a computer from infections that are
aimed at stealing data from the user or computer.
39
Author
Alexis V. Larosa
Teacher II
Alubijid National Comprehensive High School-Senior High School
Division of Misamis Oriental
READY
PRINTTO
Bachelor of Science in Computer Engineering
Master’s in Management in Engineering Management
Doctor of Philosophy in Educational Supervision & Admin
40
Key Answers
READY
PRINTTO
SELF-CHECK 1.1-1
SELF-CHECK 1.1-2
41
SELF CHECK NO. 1.1-3
READY
PRINTTO
SELF-SCHECK 1.1-5
Self-Check 1.1-6
42
READY
Self-Check 1.2-1
PRINTTO
Self-Check1.5-1
References
1. http://www.workcover.nsw.gov.au/OHS/default.htm
2. www.cengageasia.com
43
3. www.wikipedia.com
4. commons.wikimedia.org
Video clips
http://PCitYourself.com
https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw
5S –
http://www.kaizenworld.com/_Media/5s-explanation_med_hr.jpeg
http://www.canstockphoto.com/images-photos/
READY
PRINTTO
http://www.netanimations.net/computers.htm
3R –
http://www.ecocentric.co.in/site/wp-content/uploads/2013/07/reduce-reuse-recycle.jpg
http://www.neptunoeng.com/images/3r.png
http://ogs.ny.gov/Global/Images/BU/BA/RPM/Rx3.gif11/2/15
http://www.mymcpl.org/_uploaded_resources/go_green_0.jpg
Effects of contaminants -
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
http://media.salon.com/2015/01/discarded_computers_resize.jpg
44