M04 Adminstrate Network & H.P
M04 Adminstrate Network & H.P
August, 2022
Addis Ababa, Ethiopia
CPU Business & Information Technology College
Department of Information Communication Technology
Table of content
Acknowledgement 4
We would like to thank First of all God for giving me strength and health to start and finishing
TTLM. And next we thanks Ministry of Labor and Skills that MoLS gives available environment
like dormitory, hotel, water, coffee ceremony and other facilities for the all TVE trainers to work
this Teaching, Training and Learning Materials (TTLM).
Acronym
List of abbreviation
This module provide you to acquire knowledge of Network devices and hardware peripherals
that allow user interface and networking systems, how to connect network devices and computer
hardware peripherals in general.
This module covers the units:
For effective use this modules trainees are expected to follow the following module instruction:
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
Client peripheral requirements
Client requirements and peripherals
Client requirements
Client support expectations
This unit will also support you to accomplish the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
The internet
The use of the PSTN for dial-up modems only
Private lines
Data and voice.
Workstations
Personal computers
Modems or other connectivity devices
Printers
Hard drives
Monitors
Switches
Hubs
Personal digital assistant (PDA)
Other peripheral devices
Software may included:-
May include but is not limited to commercial,
Domestic
Packaged or adapted software.
Consumables may include:-
Consumables are goods used by individuals and businesses that must be replaced regularly
because they wear out or are used up. They can also be defined as the components of an end
product that is used up or permanently altered in the process of manufacturing such as
semiconductor wafers and basic chemicals.
ink cartridges
toner cartridges
Ribbons
floppy disks
CD-RW
Correct posture
Lighting
Type of desk
Type of monitor
Style of chair
Typing position
Repetitive strain injury prevention
Ventilation
Light position
Correct lifting method
Length of time in front of computer
Network operating system
May include but is not limited to Novell NetWare 5 or above or any operating system that has
multi-user ability, Linux, Mac OS, Windows 7 or above.
0peration sheet-1
Start up your computer
Step 1:- Connect the power cables on the system unit and monitor.
Step 2:-Connect hardware peripherals to the computer on the back side front side.
Step 3:- Boot you Computer.
Lap test 1
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to
ask your teacher.
1. Operating System
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
2. Client
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
3. Equipment
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
4. OHS
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your
teacher shall advice you on additional work. But if satisfactory, you can proceed to the next topic.
The first step in obtaining a peripheral device is to put suppliers of that device. Then, there are
factors you need to consider about the supplier and the devices on offer, such as support
provided and purchase price. This will help you to compare and choose the most appropriate
supplier and the exact model of the device according to client requirements. Finally, you are
ready to place an order for your organization or client to purchase the device.
v. Newspapers
Major newspapers have computer/IT sections or classified advertisements which can be a source
for finding suppliers.
Contacting the manufacturer directly
Manufacturers generally have their own websites. These may list major suppliers in your area.
Emailing or telephoning the manufacturer may also be a way to find out names of local
suppliers.
vi. Choosing supplier
With so many choices of suppliers available, how do you find the right one? There are a few
factors to consider:
Total price
Delivery point ________________________________
Budget holder’s signature ________________________________
Please come back to the Purchasing Department_________________________
Hardware inventory provides a simple way of finding basic information about your installed
hardware. Hardware includes processors, memory, serial ports, parallel ports, power supplies,
fans, graphics adapters, network adapters.
Computer inventory management is a set of best practices used to keep track of computers within
a systems environment, and it can include information about the following: Files, directories, and
storage devices. Hardware inventory provides you with important information, such as the
configuration and location of computers, which computers require an operating system upgrade,
and which computers have the hardware that is required for a software upgrade.
Storing peripherals
Each manufacturer will have their own recommendations on how to store their peripheral
equipment. In order to guarantee that a peripheral will function correctly throughout its life it is
important to follow guidelines that have been recommended by the manufacturer. Some common
recommendations may include:
Keep equipment in the correct position — After unpacking, most devices will usually have a
proper resting position. If a device is not kept in its natural position, there could be problems
when trying to operate the device later on. For example, when a printer is stored in a vertical
position, components such as the ink cartridges could leak or be dislodged.
Keep equipment away from weather, dust and other harmful material — When finding a storage
location, consider what kind of elements the device may be subjected to. If, for example, you
store a USB drive in a cabinet next to chalk, dust from the chalk could potentially damage the
storage device’s USB connection.
Do not expose equipment to extreme temperatures and high humidity — Sudden changes in
temperature can cause condensation in many peripheral devices. For instance, if a video camera
is taken from a cold place to a warm place, condensation may form on the lens and internal parts.
Avoid storing the device in direct sunlight — Exposure to direct sunlight could damage many of
the external components of a device as well as subject the device to high temperatures.
Do not expose equipment to water or moisture — If water gets inside many peripheral devices
there is a risk of electric shock.
When positioning peripherals in their permanent locations it is important to take into account
many OH&S considerations as follows.
A. Positioning of the monitor
It is essential to position a monitor correctly to ensure it will suit the needs of the user. Tips
include:
Try to make sure that monitor is in a position away from the glare of sunlight.
Check that the brightness and contrast controls of the screen have been adjusted to suit lighting
conditions in the room.
The top of the screen should be the same level as the user’s eye level.
A. Positioning of other equipment
Some general Occupational Health and safety guidelines to consider when positioning other
peripheral equipment are:
Make sure that you can reach the peripheral device and its components without having to strain
your back.
Place equipment such as scanners and printers at a suitable height so a user is easily able to reach
paper trays, open scanner lids, etc.
Make sure that equipment such as speakers is easily accessible if settings such as volume control
need to be changed.
B. Ensuring electrical safety
Some tips to ensure electrical safety are:
Do not be tempted to add too many extension cables or double socket adapters to your existing
electrical sockets.
C. Never use damaged plugs or leads.
If possible, ask an electrician to check the safety of your system.
Position electrical leads where they will not cause tripping hazards to people.
D. Physical security of devices
In many situations it is important to consider the physical security of the peripheral devices.
Some devices, such as digital cameras, data projectors and USB drives, may not be permanently
connected to a computer so it will be necessary to find a secure location to store the device.
Make sure that these kinds of devices are secured in a lockable storage cupboard, cabinet or safe
when not required. Some organizations install security devices onto desks to guarantee that
computers are secure and will not be able to be taken from their position unless unlocked.
Storing consumables
The term “consumables” are a product that is used once and then replaced by others
Example they include:-
Paper, CD or DVD and printer cartridge. These needs to placed at safe and dry environment
i. Paper
Paper needs to be stored in an area which is cool and dry, to prevent moisture from fusing pages
together.
ii. Ink cartridges and toner
Make sure to store cartridges/toner in a cool dry place, away from sparks and open flames, with
adequate ventilation and do not expose the device to high temperatures.
Also ensure that the cartridges are not taken out of their packaging until they will be used within
the printer, as the ink will dry out before use.
When possible, make sure that CDs are kept in their protective case, to minimize the chances of
being scratched. Also keep them out of direct sunlight and extreme temperatures.
Operation sheet 2
Documenting peripherals used with each computer
If the peripheral is an essential part of the computer system (for example mouse, keyboard or
monitor) it is logical to record information about the device within the documentation for the
computer to which it is connected. Individual computer inventories will often contain detailed
information about the computer’s related hardware and software. It may also be more practical to
record information about the peripheral inside the computer’s record, if the device is also
permanently connected to a computer (for example a printer or scanner).
Manufacturer: Dell
Model: OptiPlex GX280MT Monitor: Dell UltraSharp
Minitower—Power 1905FP flat panel,
Operating System: Windows XP Printer: HP LaserJet IID
Serial number: 12345 Keyboard: Dell USB keyboard
RAM: 128 Mb Pointing device: Dell USB 2-button
optical mouse with
scroll
Hard disk space: 160 Gb
If the device is shared between several computers, it makes more sense to keep information
about the peripheral as an individual entry in an inventory. Devices such as digital cameras, data
projectors and USB drives would more likely to be used by many computers, thus it would make
more sense to record their details separate to the computer details.
printer
cartridge
power cable
USB cable
sample paper
feeding device
CD driver
Be attentive when unpacking a peripheral device — handle the packaging and contents with care,
as you do not want to damage your new device. Remove any packing material surrounding and
also within the device. Some printers, for example, have soft foam and plastic pieces inside the
device to ensure that parts are locked into the correct position. Make sure that you remove these
pieces and foam before installation.
Lap test 2
Name: _____________________________ IDNo _____________Level ____________
Instructions: You are required to perform the following individually with the presence of your
teacher.
From ________________________
Date ________________________
Total price
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
Schedule hardware installation time
Remove old peripherals
Connect the new peripherals
Test peripherals
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to:
Schedule installation time
Explain removing old peripherals
Explain connecting the new peripherals
Identify configuration of a computer with the new peripherals
Test peripherals
Installation (or setup) of a computer program (including device drivers and plug-in), is the act of
making the program ready for execution. Installation refers to the particular configuration of a
software or hardware with a view to making it usable with the computer.
Thorough planning ensures that you have everything to meet all the prerequisites for the successful setup
and installation of the system. Planning minimizes errors during installation and enables a quicker
upgrade or installation.
Guidelines for hardware/software installation plan. Burn-in means to configure the hardware and run it for
some period of time, usually 24-72 hours.
Open the My Computer window, right-click on the peripheral device (usually labeled Removable Disk)
and select Eject from the contextual menu. open the My Computer window, select the peripheral device
(usually labeled Removable Disk) and then select Eject this Disk from the Common Tasks pane of the
window.
The most common peripherals are a printer, scanner, keyboard, mouse, tape device,
microphone, and external modem that are externally connected to the computer.
A test procedure is a formal specification of test cases to be applied to one or more target
program modules. Test procedures are executable. A process called the VERIFIER applies a test
procedure to its target modules and produces an exception report indicating which test cases, if
any, failed. Simply right-click on the Windows button in the bottom-left corner of your screen,
and then click System. In the window that opens, look near the middle for Device specifications.
That's where you'll find the Device name, Processor, Installed RAM, and other information.
Column A Column B
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Computer networking refers to interconnected computing devices that can exchange data and
share resources with each other. These networked devices use a system of rules, called
communications protocols, to transmit information over physical or wireless technologies.
A computer network, also referred to as a data network, is a series of interconnected nodes that
can transmit, receive and exchange data, voice and video traffic. Examples of nodes in a network
include servers or modems. Computer networks commonly help endpoint users share resources
and communicate.
Advantage of Networking:
Share Documents
Exchange e-mail messages
Live audio and video broadcast
Using one device for many computers like printer
Sharing external memory like Hard disk.
Security.
LAN stands for local area network. A network is a group of two or more connected computers,
and a LAN is a network contained within a small geographic area, usually within the same
building. Home WiFi networks and small business networks are common examples of LANs.
A personal area network (PAN) is a computer network for interconnecting electronic devices
within an individual person's workspace. A PAN provides data transmission among devices such
as computers, smart phones, tablets and personal digital assistants.
One of the most common real-world examples of a PAN is the connection between a Bluetooth
earpiece and a Smartphone. PANs can also connect laptops, tablets, printers, keyboards, and
other computerized devices.
Features of PAN :
A Wide Area Network is not limited to a single location, but it spans over a large geographical
area through a telephone line, fibre optic cable or satellite links.
The internet is one of the biggest WAN in the world.
A Wide Area Network is widely used in the field of Business, government, and education.
c. Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
d. Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, Whatsapp, Skype allows you to communicate with friends.
e. Sharing of software and resources: In WAN network, we can share the software and
other resources like a hard drive, RAM.
f. Global business: We can do the business over the internet globally.
g. High bandwidth: If we use the leased lines for our company then this gives the high
bandwidth. The high bandwidth increases the data transfer rate which in turn increases
the productivity of our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area Network:
a. Security issue: A WAN network has more security issues as compared to LAN and
MAN network as all the technologies are combined together that creates the security
problem.
b. Needs Firewall & antivirus software: The data is transferred on the internet which can
be changed or hacked by the hackers, so the firewall needs to be used. Some people can
inject the virus in our system so antivirus is needed to protect from such a virus.
c. High Setup cost: An installation cost of the WAN network is high as it involves the
purchasing of routers, switches.
d. Troubleshooting problems: It covers a large area so fixing the problem is difficult.
Category of computer Network by its Functional Relationship:
1. Peer-to-Peer Networking:
2. Client-Server Network
Peer-to-Peer Networking:
In peer-to-peer (P2P) networking, a group of computers are linked together with equal
permissions and responsibilities for processing data. Unlike traditional client-server networking,
no devices in a P2P network are designated solely to serve or to receive data.
In a peer-to-peer network, computers on the network are equal, with each workstation providing
access to resources and data. This is a simple type of network where computers are able to
communicate with one another and share what is on or attached to their computer with other
users.
The primary goal of peer-to-peer networks is to share resources and help computers and devices
work collaboratively, provide specific services, or execute specific tasks. As mentioned earlier,
P2P is used to share all kinds of computing resources such as processing power, network
bandwidth, or disk storage space.
Other key uses of a P2P network include: File sharing: The use of P2P in file sharing is
extremely convenient for businesses. P2P networking can also save you money with this feature
because it eliminates the need to use another intermediate server to transfer your file.
Peer-to-Peer computer network is a network that relies on computing power at the edges of a
connection, there is no hierarchy among the computers.
Advantages
Much easier to set up than a client-server network - does not need specialist knowledge
Less initial capital – no need for a dedicated server
No need for system administration (administrator)
Disadvantages
Ensuring that viruses are not introduced to the network is the responsibility of each
individual user
Decentralized – no central repository for the files and application.
Security – does not provide the security available on a client/server network.
Client-Server Network
In the environment with more than 10 users, a peer to peer network will not adequate. There
need comes to use a dedicated computer which optimized (increase) the service of network to
clients quickly and ensure the security of files. Therefore, there will be one or more server
computers which serve other station (client) computers to optimized network system. A
dedicated computer with software that carries out some task on behalf of users.
What is Server?
Server is a dedicated computer that provide resources to Network users or Client computers.
Advantages of server-based network
Centralized – resources and data security are controlled through the server
Scalability – any or all elements can be replaced individually as need increase.
Flexibility – new technology can be easily integrated into system
Interoperability – all components (client/network/server) work together
Accessibility – server can be accessed remotely and across multiple platforms.
Disadvantages of server-Based computer networks
Expensive – requires initial investment in dedicated server
Maintenance – large networks will require a staff to ensure efficient operations
Dependence- when a server goes down, operations will cease across the network.
Server may fail- incase the server failed, the entire network goes down
Types of Server:
- File and Printer server
- Mail server
- Communication server
- Directory service server
- Application server
- Fax server
- Backup Server
Network Topology
It is often referred to as a “linear bus” because the computers are connected in a straight line.
This is the simplest and most common method of networking computers.
In a bus topology, all computers are connected to a shared communication line, called a trunk or
a backbone.
The computers are connected to the backbone using T-connectors.
Both ends of the backbone use terminators in order to prevent reflection of signals.
If the terminator is missing or is deliberately removed, the data transmissions are disrupted.
There is no central device or any special configuration.
Advantages
A bus network is the cheapest of all topologies.
No special configuration is required.
It is easy to install, and no special equipment is
needed for installation.
It needs less cable length than do other topologies.
Disadvantages
1. A break in cable or a missing terminator can
2. bring down the entire network.
3. It is not possible to add or remove computers
4. without disrupting the network.
5. It is difficult to troubleshoot and administer.
6. Addition of more computers degrades performance.
Star Topology
Star topology is a network topology in which each network component is physically connected to
a central node such as a router, hub or switch. In a star topology, the central hub acts like a server
and the connecting nodes act like clients.
A star network is a local area network (LAN) in which all nodes (workstations or other devices)
are directly connected to a common central Hub or Switch.
Every workstation is indirectly connected to each other through the central Hub or Switch.
Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination. The hub, switch, or concentrator manages and controls all functions of the network.
It also acts as a repeater for the data flow. This configuration is common with twisted pair cable;
however, it can also be used with coaxial cable or fiber optic cable.
Advantages Disadvantages
Straightforward Adaptability
Easy to install Unprotected use
Mesh Topology
A mesh topology is a network setup where each computer and network device is interconnected
with one another. This topology setup allows for most transmissions to be distributed even if one
of the connections goes down. It is a topology commonly used for wireless networks.
In a mesh topology, all computers in the network are connected to every other computer, forming
a mesh of connections and each computer makes a point-to-point connection to every other
computer.
Wireless/Unguided Transmission Media consists of a means for the data signals to travel but
nothing to guide them along a specific path. The data signals are not bound to a cabling media
and as such are often called Unbound Media.
Commonly types of guided transmission are:-
Twisted Pair Cable
Coaxial Cable
Optical fiber cable
Twisted pair cable
Twisted Pair Cable
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of improving electromagnetic compatibility.
Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The oldest, least expensive and most commonly used transmission media.
Two types of twisted-pair cable:-
1. Unshielded twisted-pair (UTP)
2. Shielded twisted-pair (STP) cable.
UTP cables are mostly used for LAN networks. They can be used for voice, low-speed data,
high-speed data, audio and paging systems, and building automation and control systems. UTP
cable can be used in both the horizontal and backbone cabling subsystems.
Depending on the bandwidth offered there are seven types of UTP cables such as Cat-1,Cat-
2,cat-3,cat-4,cat-5,cat-6 and cat-7
The Most commonly used UTP cables are category-5 cables and its bandwidth is 1000Mbps.
Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n
and around the wire pairs
Much less susceptible to interference and supports higher transmission rates than UTP
uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs.
telephone’s 4 wires)
Coaxial Cable
Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the
other conductor woven around it providing a shield. An insulating protective coating called a
jacket covers the outer conductor.
The outer shield protects the inner conductor from outside electrical signals. The distance
between the outer conductor (shield) and inner conductor plus the type of material used for
insulating the inner conductor determine the cable properties or impedance. Typical impedances
for coaxial cables are 75 ohms for Cable TV, 50 ohms for Ethernet Thinnet and Thicknet. The
excellent control of the
impedance characteristics of the cable allow higher data rates to be transferred than Twisted Pair
cable.
Optical fiber is the technology associated with data transmission using light pulses travelling
along with a long fiber which is usually made of plastic or glass. Metal wires are preferred for
transmission in optical fiber communication as signals travel with fewer damages. Optical fibers
are also unaffected by electromagnetic interference. The fiber optical cable uses the application
of total internal reflection of light. An optical fiber consists of an extremely thin cylinder of
glass, called the core, surrounded by a concentric layer of glass, known as the cladding. The
fibers are sometimes made of plastic. Plastic is easier to install, but cannot carry the light pulses
for as long a distance as glass.
The basic function of any optical fiber is to guide light, i.e., to act as a dielectric waveguide.
Light injected into one end should stay guided in the fiber. In other words, it must be prevented
from getting lost e.g. by reaching the outer surface and escaping there. We explain this here for
glass fibers, but the operation principle of plastic optical fibers is the same.
In principle, the simplest solution for guiding light would be a homogeneous glass rod. If it is
thin enough, it can also be bent to some degree. The outer surface can reflect light via total
internal reflection. Due to the large refractive index contrast, this works for a considerable range
of input beam angles, and in principle there don't need to be any power losses.
Figure 1: Total internal reflection can be used to guide light in a homogeneous fiber. Note that
only partial reflection occurs at the end faces, where the angle of incidence is smaller.
However, this simple solution has some crucial disadvantages.
Due to the high index contrast, even tiny scratches of the glass on the outer surface could lead to
substantial optical losses by scattering. Therefore, the outer surface would have to be made with
high optical quality and well protected against damage and dirt. This problem can be mitigated
only to some extent with some suitable buffer coating around the fiber. Such coatings, not being
highly homogeneous, can hardly provide very low optical losses.
Even if the fiber were pretty thin (e.g., with a diameter of 0.1 mm), it would support a huge
number of modes which is bad e.g. when preserving a high beam quality is important.
One can, however, modify the idea of a very clean coating. Use another glass region, having a
slightly smaller refractive index than the core glass, as a cladding:
Figure 2: A multimode glass fiber with a cladding, made of glass with a slightly lower refractive
index. Total internal reflection can occur at the glass/glass interface, but the incidence angles
need to be larger.
That gives us several advantages. Glass can be much more clean and homogeneous than a plastic
buffer coating. That already reduces the losses.
Due to the reduced index contrast at the reflection points, small irregularities of the interface do
not cause as serious optical losses as for a glass/air interface. Irregularities at the outer interface
do not matter anymore, as the light cannot “see” them.
The guiding region – called the fiber core – can now be made much smaller than the total fiber, if
this is wanted. One can adapt the core size e.g. to the size of some small light emitter.
With a combination of small core size and weak index contrast one can even obtain single-mode
guidance (see below).
Note, however, that smaller index contrasts imply a smaller acceptance angle: total internal
reflection can only occur if the incidence angle is above the critical angle. The maximum angle
of incidence at the input face of the fiber is then determined by the numerical aperture (NA).
Two types of optical fiber are commonly available:
4. S
i
n
g
le-mode and Multimode.
Single-mode fiber is used for long runs because it can transmit data 50 times further than
multimode fiber and at a faster rate. For example, single-mode fiber might be used on an
organization’s corporate campus between buildings. Single-mode fiber (SMF), on the other hand,
has a small core that allows only a single light beam to pass. The light transmissions in single-
mode fiber pass through the core in a direct line, like a flashlight beam.
So what's better? Single mode or multimode Well, they are different.... Single mode cable is less
expensive, supports higher bandwidths and longer distances; however, the cost of electronics is
greater.
Multimode fiber (MMF) has a larger core than single-mode. This larger core allows hundreds of
light rays to flow through the fiber simultaneously.
The numerous light beams in multimode fiber bounce around inside the core, inching toward
their destination. Because light beams bounce within the core, the light beams slow down, reduce
in strength, and take some time to travel along the cable. Multimode fiber provides high
bandwidth at high speeds over medium distances (up to about 3000 feet) but can be inconsistent
for very long runs.
Cabling system
Three types of Ethernet cables are available
Straight-through cable
Crossover cable
Rolled cable
Making Ethernet 10Base-T cables:
Straight-through cable: PC-to-HUB.
Crossover cable: PC-to-PC.
Switch to switch
Hub to hub
Host to host
Hub to switch
Router direct to host
Pc to Pc
Rolled Cable
You can use a rolled Ethernet cable to connect a host to a router console serial communication
(com) port.
Repeater
Access Point
HUB
A network hub is a node that broadcasts data to every computer or Ethernet-based device
connected to it. A hub is less sophisticated than a switch, the latter of which can isolate data
transmissions to specific devices. Network hubs are best suited for small, simple local area
network (LAN) environments.
In general, a hub refers to a hardware device that enables multiple devices or connections to
connect to a computer. An example is a USB hub, which allows multiple USB devices to connect
to one computer, even though that computer may only have a few USB connections.
There are three types of network hubs: passive, active, and intelligent. network. They do not
improve the performance of local area networks (LANs), and may limit maximum media
distances. Typically, passive hubs are connected to other devices in a star configuration.
Switch
Just like a hub and a bridge, a switch is also used to connect multiple devices in a LAN segment.
A switch is the upgraded version of the bridge. Besides providing all the functionalities of a
bridge, it also offers several additional features.
The biggest advantage of a switch is that it makes switching decisions in hardware by using
application-specific integrated circuits (ASICs).
Unlike the generic processors that we use in our PC, ASICs are specialized processors built only
to perform particular tasks. Usually, the ASICs in switches have a single task and that is
switching the frames as fast as they can.
An ASIC occupied switch performs this task blazingly fast. For example, an entry-level 2960
Catalyst Switch can process 2.7 million frames per second.
Router
A router connects different network segments. It switches data packets between networks that are
either located in different logical segments or constructed with different network-layer protocols.
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet.
When a router receives a data packet on any of its interfaces, it checks the destination address of
that packet, and based on that destination address, forwards that data packet to the interface that
is associated with the destination address.
To forward data packets to their destination, the router keeps a record of the connected network.
These records are maintained in a database table known as the routing table. Routing tables can
be created statically or dynamically.
A bridge can connect two different types of media or network architecture, but it cannot connect
two different types of network layer protocols such as TCP/IP or IPX. It requires the same
network-layer protocols across all segments.
Local Bridge: - The Bridge directly connects two LAN segments. In Ethernet implementations,
this is known as a transparent bridge. In the Token Ring network, this is called a source-routed
bridge.
Remote Bridge: - This Bridge connects with another Bridge over the WAN link.
Wireless Bridge: - This Bridge connects with another Bridge without using wires. It uses radio
signals for connectivity.
In networking models such as the OSI layers model and TCP/IP model, the functionalities of
Bridges are defined in the physical layer and data link layer.
Just like a Hub, a Bridge is also no longer used in the computer network. Bridges have been
replaced by switches.
Gateway
Gateway is used to forward packets that originate from a local host or a local network and are
intended for remote networks. If a data packet does not get its destination address in the local
network then it takes the help of the gateway device to find the destination address in the remote
network. The gateway device knows the path to the remote destination address. If necessary, it
also encapsulates the packet so that it can travel through other networks to reach its destination
address.
The following image shows a gateway device.
Examples of the Gateway
Email Gateway: - An email gateway translates SMTP e-mails in standard X.400 format before
forwarding.
GSNW Gateway: - A GSNW gateway allows Windows clients to access resources from the
NetWare server.
PAD Gateway: - A PAD gateway provides connectivity between a LAN network and an X.25
network.
Modem
In simple language, a modem is a device that is used to connect to the Internet. Technically, it is
the device that enables digital data to be transmitted over telecommunication lines.
A Telco company uses entirely different data transmission technology from the technology that a
PC uses for data transmission. A modem understands both technologies. When it receives signals
from the PC, it converts them into the format that the Telco company understands. When it
receives signals from the Telco company, it converts them into a format that the PC understands.
It enables communication between the PC (Known as the DTE device) and the Telecom
company's office (Known as the DCE device).
Repeater
Repeaters are usually used to strengthen signals going long distances.
A repeater amplifies the signal it receives on one port before it transmits it on other ports.
Because the repeater does not check on the contents of the data it receives or retransmits, frames
that are corrupted by noise and other factors can also be repeated.
The development of the hub replaced the repeater for all practical purposes, because it performs
the same functions, and can include additional features.
Network Interface Cards (NICs)
NICs are the mechanisms by which computers connect to a network.
NICs come in all shapes and sizes, and they come in prices to suit all budgets.
Known as network card, network adapter, and LAN adapter, etc.
When buying one consider
1. Network compatibility – Ethernet/Token Ring
2. Bus compatibility – PCI/ ISA /PCI-e
3. Port compatibility – UTP/ Fibre
4. Hardware compatibility – Easy to install / Recognized by many OS’s
are a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals.
Depending on the size of the network, one or more WAPs may be required. Additional WAPs
are used to allow access to more wireless clients and to expand the range of the wireless network.
Transceivers
The term transceiver does not necessarily describe a separate network device but rather an
integrated technology embedded in devices.
transceiver = transmitter and a receiver
device that receives data, converts it, and then sends it to another location
RF transceivers, fiber-optic transceivers, Ethernet transceivers, are examples
can also be used in pairs to insert a fiber segment into copper networks
Firewall
a hardware or software system that is used to
separate one computer or network from another one.
The most common type is used to protect a computer or an entire network from unauthorized
access from the Internet.
can also be used to control the flow of data to and from multiple networks within the same
organization. Firewalls
can be programmed to filter data packets based on the information that is contained in the
packets.
IP Terminology
Bit A bit is one digit, either a 1 or a 0.
Byte A byte is 7 or 8 bits, depending on whether parity is used.
Octet An octet, made up of 8 bits, is just an ordinary 8-bit binary number.
Network address This is the designation used in routing to send packets to a remote network for
example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
You can depict an IP address using one of three methods:
Dotted-decimal, as in 172.16.30.56
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
Summary of the three classes of networks
Subnet Masks
A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network
ID portion of the IP address from the host ID portion of the IP address.
The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
The 1s in the subnet mask represent the positions that refer to the network or subnet addresses.
The Network Security Configuration feature lets apps customize their network security settings
in a safe, declarative configuration file without modifying app code. These settings can be
configured for specific domains and for a specific app.
How to Set Up a Secure Network: Back to Basics
1. Step One: Locate and Open Up Your Router Settings Page.
2. Step Two: Create a Password for Your Router.
3. Step Three: Change the Name of Your Network's SSID.
4. Step Four: Enable Network Encryption.
5. Step Five: Filter Out Your Mac Addresses.
6. Step Six: Reduce Your Wireless Signal's Range.
8 ways to improve wired network security
1. Perform auditing and mapping.
2. Keep the network up-to-date.
3. Physically secure the network.
4. Consider MAC address filtering.
5. Implement VLANs to segregate traffic.
6. Use 802.1X for authentication.
7. Use VPNs to encrypt select PCs or servers.
8. Encrypt the entire network.
Start first with establishing neutral posture in the chair with your feet on the floor or footrest.
Then progress to keyboard and mouse placement (keyboard tray), followed by desk height
adjustment as able, then monitor height, and lastly, organize everything else within easy reach.
Good ergonomics takes practice.
A good workstation ergonomic arrangement will allow any computer user to work in a neutral,
relaxed, posture that will minimize the risk of developing any injury. An ideal keyboard
arrangement is to place this on a height-adjustable negative-tilt tray.
Workstation management also involves Maintaining and monitoring them to ensure they are
running efficiently. It's hard to monitor machines that are remote so there is a number of agents
out there you can install to allow you to both manage and monitor machines both inside and
outside your network.
How do you manage a workstation?
Workstation management also involves Maintaining and monitoring them to ensure they are
running efficiently. It's hard to monitor machines that are remote so there is a number of agents
out there you can install to allow you to both manage and monitor machines both inside and
outside your network.
Self check-4
Name: _____________________________ IDNo_________ Date: ___________________
Time started: ____________ Time finished: ________________
Instruction:-Choose the correct answer from the given alternatives and write your own choice.
1. If the break in a cable or fault computer can bring slow down entire
network_____________ type of topology.
A. Centralized C. Accessibility
B. Scalability D. All
1. ___________ usually used to strengthen signals going long distances.
A. Switch B. Repeater C. HUB D. None
2. A device that is used to connect to the Internet and changes digital data to analog signal.
A. Modem B. Digital camera C. NIC D. All
3. From the following alternatives one is an advantage client-server based network.
A. Centralized
B. Scalability
C. Flexibility
D. All are answers
Part II. Write “True” if the given question is correct and say “False” if it is incorrect.
4. A good workstation ergonomic arrangement is important for our health & minimize the
risk of developing any injury.
5. Hub broadcasts data to every computer or Ethernet-based device connected to it.
Part III. Match the following their correct answers column A with B
Column A Column B
Lap test 4
Name: _____________________________ IDNo_________ Date: ___________________
Part I. Instruction:-Answer the following questions from number 1-3 and choose the
correct one.
A. 1 only
B. 2 only
C. 3 and 4 only
D. 1 and 5 only
E. 2 and 5 only
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:-
Indentify priority
Configure network maintenance schedule settings
Demonstrate peripheral supporting methods
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Explain and identifying priority
Identify network configuring setting
Demonstrating peripheral supporting methods
Maintenance Objectives
A network maintenance plan is the range of services a company intends to use to keep the network
running smoothly. That plan may include tasks performed by internal resources as well as those that are
easier to team up with network hardware support experts to complete.
Maintaining your computer network is important because there are many factors that can go
wrong on a daily basis. Regular maintenance can keep the big problems away, while helping to
maintain your networks optimal performance.
The your networked computers should maintained regularly within 24 hours or in weeks.
You must build processes and procedures for performing your network maintenance tasks; this is called
network maintenance planning.
1. Scheduling maintenance
2. Formalizing change-control procedures
3. Establishing network documentation procedures
4. Establishing effective communication
5. Defining templates/procedures/conventions standardization.
6. Disaster Recovery.
Scheduled Maintenance
The benefits of scheduled maintenance include the following:
Network downtime is reduced.
Long-term maintenance tasks will not be neglected or forgotten.
Predictable lead times for change requests.
Disruptive maintenance tasks can be scheduled during assigned maintenance
windows, reducing downtime during production hours.
During maintenance periods, ITS will be performing the following types of maintenance:
File server maintenance.
Email and antivirus maintenance.
Firmware updates and directory maintenance on the Email and file servers.
Switch and router firmware/software maintenance.
Dorm-Net and Network Security Systems maintenance.
Things to Maintain and Repair Computer System and Networks
Usage logs
Every activity within a network is considered a security event. Emails, firewall updates, and user
activity are all recorded in a complex series of logs that define your network's environment. The
resulting data logs contain a huge amount of information that would make threats impossible to
detect with the human eye.
A peripheral device provides input/output (I/O) functions for a computer and serves as an
auxiliary computer device without computing-intensive functionality.
A peripheral activity or issue is one which is not very important compared with other activities or
issues. A peripheral or peripheral device is an auxiliary device used to put information into and
get information out of a computer.
There are many other examples of peripherals, such as a microphone, web camera, headphones,
external hard drive and flash drive. Most computer users have at least several of these peripheral
devices.
5. A Prioritization system that correctly identifies jobs that can be planned from rush
jobs is key to a proactive maintenance program.
6. The best priority system is one developed, controlled and executed by the
Maintenance Organization.
Instruction: Choice Part
7. The Best process for distributing Maintenance Work Schedules is:
A. Job start and completion are assigned to crew and published more
than 3 days prior to starting work.
B. Schedules of job start, completion and crew assignments are
distributed the day before starting the work.
C. Schedules of job start, completion and crew assignments are
distributed the day to do the work.
D. Job assignments are given out to crews 1 -2 days prior to starting
work or the day to do the work.
8. Schedule performance is measured and reported until it exceeds 90%.
A. True.
B. False
9. Schedule breakers and reactive work are managed by and responsibility of:
A. Planner and Scheduler
B. Operations and Maintenance Manager
C. Production and Maintenance Supervisors
D. Mechanics and Operators
10. Maintenance and Production schedules should be combined into an
integrated shop floor schedule to eliminate confusion on priorities,
equipment out of service and work flow patterns.
A. True
B. False
Operation sheet 4
Here is a simple list to go over once per month to keep your equipment running at peak
performance.
Be sure to always backup your data. This is one of the most crucial rules in the IT industry. Loss
of company and customer data is a serious issue that can be easily prevented. Being proactive
with backups will give you peace of mind, as well as protect your data from numerous possible
threats.
Lap test 4
Name _____________________________ IDNo __________ Level __________
Instruction: Your teacher will evaluate your output either satisfactory or unsatisfactory. If
unsatisfactory, your teacher shall advice you on additional work. But if satisfactory, you can
proceed to the next topic.
This learning guide is developed to provide you the necessary information regarding the
following content coverage and topics
Indentify command-line environment
Differentiate command-line and graphical user interface
Apply command-line tools
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
The environment of the command line refers to the settings and preferences of the current user. It
enables users to set greetings, alias commands, variables, and much more.
The command line, also called the Windows command line, command screen, or text interface,
is a user interface that's navigated by typing commands at prompts, instead of using a mouse. For
example, the Windows folder in a Windows command line is "C:\Windows>" (as shown in the
picture).
A Command line is a horizontal line on an interface that allows the user to type in various
commands. Typically, there is a command prompt at the left side of a screen, with a blank line
extending to the right where commands are typed.
A command-line interface (CLI) is a text-based user interface (UI) used to run programs, manage
computer files and interact with the computer. Command-line interfaces are also called
command-line user interfaces, console user interfaces and character user interfaces.
Click Run As Administrator. When you open the Command Prompt window as Administrator,
an operating-system dialog appears that asks you if you want to continue. Click Continue to
proceed.
When you run these command-line tools from a Command Prompt, run them from a Command
Prompt window that is launched by performing the following actions: Right-click a Command
Prompt shortcut. Click Run As Administrator.
The main difference between GUI and CLI is that the Graphical User Interface (GUI) allows the
user to interact with the system using graphical elements such as windows, icons, menus while
the Command Line Interface (CLI) allows the user to interact with the system using commands.
An operating system is an interface between the user and the hardware components. It performs
different tasks. An operating system provides GUI or CLI for the user to perform tasks. Some
operating systems only provide CLI while others provide both GUI and CLI. A GUI consists of
controls or widgets to interact with the computer. On the other hand, when using the CLI, the
user should enter commands to perform the tasks. Overall, GUI is more user-friendly, but the
execution speed is higher in CLI.
What is GUI
GUI stands for Graphical User Interface. It takes the advantage of computer graphics. It allows
the user to interact with the computer using components such as windows, icons, labels, text
boxes, and radio buttons. It is easy for the user to perform tasks using GUI as it does not require
remembering commands. He can easily click on icons, drag and drop objects using the mouse.
There are various GUI components. The window is the complete visible screen to the user. It has
a rectangular shape and it can overlap with the area of other windows. A text box is a component
for the user to enter input data. A menu provides a list of options for the user to select an option.
A button allows selecting one particular option. A radio button appears as a group and the user
can select one option at a time. Moreover, checkbox is a graphical element that allows the user to
select an option out of multiple alternatives.
A GUI is a type of user interface that allows users to interact with electronic devices through
graphical icons and visual indicators.
What is CLI
CLI stands for Command Line Interface. CLI is also called Command Language Interpreter,
Console User Interface or Character User Interface. It allows the users to enter commands to
the terminal to perform the task. When the user enters a command and presses “enter” key, the
terminal or the shell will interpret that command and will display the response back to the
terminal. Likewise, the user can communicate with the operating system.
A CLI is an interface for the user to issue commands in the form of successive lines of text or
command lines to perform the tasks.
Usability
It is easy to use the GUI. It is not necessary to have a vast knowledge to operate the system using
the GUI. Even a beginner can easily handle the tasks using the GUI. On the other hand, CLI is
complex. The user should have good knowledge of the commands. Miss pelt commands are of
no use.
Memory Requirement
GUI requires more memory as it contains a lot of graphical components. CLI is a command
interface, and it does not require more memory.
Speed
GUI is slower but the CLI is fast.
Customizability
Command line tools are scripts, programs, and libraries that have been created with a unique
purpose, typically to solve a problem that the creator of that particular tool had himself. Because
of that, we have divided this roundup of the best command line tools to include different
categories, like Web Development, Utilities, Productivity, and others. Beyond being categorized,
note that the following 50 command line tools are listed in no particular order — they’re not
ranked or rated, but are numbered simply to make a list easier to navigate.
Windows Command-line Tools
PowerShell
ConEmu
PSReadLine
Chocolatey
Babun (optional)
A. PowerShell
Significantly closer to a real 'shell' than cmd.exe, offering us a powerful scripting environment
for task automation. It's fair to compare it to Bash or zsh.
Supports piping, like Unix. Unlike Unix, it pipes objects rather than text streams. This requires
getting used to but avoids reparsing when you want to get out a property.
Supports modules. PSGet is a package manager for PowerShell allowing you to easily extend it.
If you're interested in trivia, here's an answer to why MS created PowerShell from the
lead architect.
B. ConEmu(console host)
An advanced console emulator where you can run your shell of choice.
Supports opening multiple terminals in different tabs. Makes it trivial to launch terminals as
different users.
Extremely customizable - everything from shortcuts to text selection and status bar colors can be
changed.
Supports a split-screen view
Simple GUI apps can be run in tabs
Support for Windows 7+ Jump Lists
Supports smooth window resizing
Windows font anti-aliasing
Starting tabs can be fully customized to start in a particular directory
Intelligent copy/paste
Syntax highlighting whenever you start typing commands. Clearly indicates syntax errors with a
red ">" character.
D. Bash-style autocompletion
Bash/zsh interactive history search (Ctrl + R). Powerful command history traversal too. Easily
view previous multi-line commands using arrow keys rather than just the last line of the
command.
Proper support for copy/paste/cut (Ctrl+C/X/V should all work just fine)
Good support for undo/redo
History saving is automatic
E. Chocolatey (package manager)
Basically homebrew for Windows, allowing you to pull in your favorite Windows apps
conveniently. There are currently ~3K packages available that can be updated using Chocolatey
directly.
Differs from Nuget. NuGet is for development libraries. Chocolatey is a binary machine package
manager and is built on NuGet infrastructure.
Offers effectively silent builds
You may also be interested in learning about OneGet, Microsoft's package manager..manager,
which should work with Chocolatey under Windows 10.
Cygwin (the Linux-like env for Windows) minus some of the historically known quirks. The
overall setup is significantly more straight-forward using the Babun installer. If you're
particularly experienced with Unix and would prefer to avoid learning PowerShell,
cygwin/Babun are worth considering.
Includes a package manager called pact (a little similar to brew) similar to apt-get. This is a big
deal as you currently have to re-run the Cygwin installer when adding packages vs. just using
pact.
Vim pre-installed and pre-configured
Integrated support for oh-my-zsh
Auto-updates
Self check 6.
Name _______________________________________ IDNo _____________ Level
________________
Start time ____________________ Finish _____________________
Instruction:-Say true of False
1. A command-line interface is a text-based user interface used to run programs, manage
computer files and interact with the computer.
2. GUI allows the user to interact with the computer using components
3. CLI requires more memory as it contains a lot of graphical components and GUI is a
command interface, and it does not require more memory.
4. CLI is faster than but GUI requires more memory.
5. It is not possible to change the CLI that User to change the appearance
Column A Column B
6. CLI A. Slow
7. GUI B. Highly customizable key bindings
8. Simple GUI apps can be run in tabs C. Good support for undo/redo
9. Bash-style auto completion. D. ConEmu(console host)
10. PSReadLine (console editing helpers) E. Fast
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics
Identify regular maintenance schedule
Replace consumables
Identify peripheral failures
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to
Identify regular maintenance schedule according to guidelines
Identify replacing consumables
Identify command-line tools
Identify peripheral failures
This activity entails the repair and maintenance of all types of computers and peripheral
equipment (printers, displays, keyboards, modems, scanners, smart card readers, computer
projectors etc.)
Use an anti-static cloth to lightly dust your computer casing. Do not use furniture cleaners or
strong solvents. Use a can of compressed air to blow out debris from the air intake slots.
Ammonia diluted with water—or glass cleaner comprised mostly of ammonia and water—is a
safe cleaning solution for computer surfaces.
What is the first step to performing hardware maintenance? Turn off the computer and remove
its power source. All-in-one computers are easier to service and upgrade but occupy more space
than desktop computers.
Keeping computers well maintained can prevent viruses and malware, and keep your computer
in good working order. Regular maintenance ensures that your antivirus software is kept up to
date and working properly. Nothing could be more annoying than a computer running too
slowly.
Types of maintenance
Predictive.
Preventive.
Corrective.
Predictive
Predictive maintenance (PdM) is a type of condition-based maintenance that monitors the
condition of assets through sensor devices. These sensor devices supply data in real-time, which
is then used to predict when the asset will require maintenance and thus, prevent equipment
failure.
Predictive maintenance techniques are designed to help determine the condition of in-service
equipment in order to estimate when maintenance should be performed. This approach promises
cost savings over routine or time-based preventive maintenance, because tasks are performed
only when warranted.
Some of the main components that are necessary for implementing predictive maintenance
are data collection and preprocessing, early fault detection, fault detection, time to failure
prediction, maintenance scheduling and resource optimization.
Predictive maintenance presents you with the best time to work on an asset so that maintenance
frequency is minimal and reliability is as high as possible while eliminating unnecessary costs.
Preventive
The higher the failure consequences, the greater the level of preventive maintenance that is
justified.This ultimately implies a trade-off between the cost of performing preventive
maintenance and the cost to run the equipment to failure.
Corrective maintenance
Corrective maintenance refers to action only taken when a system or component failure has
occurred. It is thus a retro-active strategy. The task of the maintenance team in this scenario is
usually to effect repairs as soon as possible. Costs associated with corrective maintenance
include repair costs (replacement components, labor, and consumables), lost production and lost
sales. To minimize the effects of lost production and speed up repairs, actions such as increasing
the size of maintenance teams, the use of back-up systems and implementation of emergency
procedures can be considered. Unfortunately, such measures are relatively costly and/or only
effective in the short-term.
Hardware Fault means any fault, issue or matter relating to any Supported Equipment excluding.
Hardware Fault means a Hardware fault arising solely or primarily from the failure of a physical
component of the Hardware but excluding any arising from any Application Fault or any
Firewall Downtime.
Some of the most common PC hardware problems that need troubleshooting are:
The Computer Won't Start. A computer that suddenly shuts off or has difficulty starting up could
have a failing power supply.
The Screen is Blank.
Abnormally Functioning Operating System or Software. ...
Instruction:-Read the given questions below and write your own answers on time.
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics
Identify Configured Operating system
Explain Install and upgrade application software
Identify Use graphical user interface and command-line interface
Use third-party operating system utilities
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to
Types of peripheral devices
Identifying peripheral devices
Obtaining and storing peripheral devices
An operating system (OS) is the program that, after being initially loaded into the computer by a
boot program, manages all of the other application programs in a computer. The application
programs make use of the operating system by making requests for services through a defined
application program interface (API). In addition, users can interact directly with the operating
system through a user interface, such as a command-line interface (CLI) or a graphical UI (GUI).
The operating system (OS) manages all of the software and hardware on the computer. It
performs basic tasks such as file, memory and process management, handling input and output,
and controlling peripheral devices such as disk drives and printers.
An operating system brings powerful benefits to computer software and software development.
Without an operating system, every application would need to include its own UI, as well as the
comprehensive code needed to handle all low-level functionality of the underlying computer,
such as disk storage, network interfaces and so on. Considering the vast array of underlying
hardware available, this would vastly bloat the size of every application and make software
development impractical.
Although the fundamental roles of an operating system are ubiquitous, there are countless
operating systems that serve a wide range of hardware and user needs.
Windows is Microsoft's flagship operating system, the de facto standard for home and
business computers. Introduced in 1985, the GUI-based OS has been released in many
versions since then. The user-friendly Windows 95 was largely responsible for the rapid
development of personal computing.
Mac OS is the operating system for Apple's Macintosh line of PCs and workstations.
Unix is a multiuser operating system designed for flexibility and adaptability. Originally
developed in the 1970s, Unix was one of the first operating systems to be written in the
Linux is a Unix-like operating system that was designed to provide PC users a free or
low-cost alternative. Linux has a reputation as an efficient and fast-performing system.
Controls the backing store and peripherals such as scanners and printers.
Deals with the transfer of programs in and out of memory.
Organizes the use of memory between programs.
Organizes processing time between programs and users.
Maintains security and access rights of users.
Uses of operating system
Manage the computer's resources, such as the central processing unit, memory, disk
drives, and printers,
Establish a user interface, and
Execute and provide services for applications software.
Application Software is a type of computer program that performs specific functions. These
functions, performed by application software, can be personal, business as well as educational.
Thus, application Software is also known as end-user software or productivity software.
Application software enables the user to complete tasks such as creating documents,
spreadsheets, databases, and publications, doing online research, sending email, designing
graphics, running businesses, and even playing games.
When a user interacts directly with a piece of software, it is called application software. The sole
purpose of application software is to assist the user in doing specified tasks. Microsoft Word and
Excel, as well as popular web browsers like Firefox and Google Chrome, are examples of
application software.
Watts Humphrey, the “Father of Software Quality,” passed away at his residence in Florida on
October 28, 2010. His unparalleled contribution to software engineering made him one of the
icons of the discipline.
Web browsers.
Presentation software.
Spreadsheet software.
Graphic software.
Word processors.
Database software.
Multimedia software.
Education software.
Their single greatest favorable position is that it meets exact requirements of client.
In computers, a utility is a small program that provides an addition to the capabilities provided
by the operating system. In some usages, a utility is a special and nonessential part of the
operating system. The print "utility" that comes with the operating system is an example.
Third Party Utilities means computer programs provided by third parties which OSHPD is
authorized under this Agreement to access through the Services, where OSHPD is not obligated
to enter into a separate agreement with a third party to use such computer programs.
This software is focused on how OS works on that basis it perform task to enable smooth
functioning of computer.
Windows 10 allows you to tweak the looks and feels of the OS, making it appear and
work as you want. To access these customization options, press the “Win + I” shortcut
keys on your keyboard to open the settings app and then select “Personalization” from the
options.
Click File > New, then select Dialog System Screen set on the New dialog box, and click
OK. Click Yes on the message asking if you want to create a project. Select Windows
GUI Project. Enter Welcome as the name of the project.
Instruction:- Read the following questions carefully and answers your choices.
I. Choose the correct answer from 1-10 and write your answer.
A. Small program that provides an addition to the capabilities provided by the __________.
A. Application software C. Data base management
B. Operating system D. None
B. An Application software provide for the end user __________________.
A. To complete the tasks like
B. To run Business
C. No answer
D. A & B are
C. From the following alternatives one is well described about Operating system.
A. Operating system Manages all of the software and hardware on the computer
B. Operating system should be installed after Application software being installed
C. All Operating system hasn’t GUI
D. None
D. Which one of the following is function of an operating system.
A. Organizes the use of memory between programs
B. Uses of operating system
C. Maintains security and access rights of users
D. Establish a user interface
E. What is an operating system?
A. Interface between the hardware and application programs
B. Collection of programs that manages hardware resources
C. System service provider to the application programs
D. All of the mentioned
6. Which one of the following errors will be handle by the operating system?
A. Lack of paper in printer
B. Connection failure in the network
C. Power failure
D. All of the mentioned
7. Where is the operating system placed in the memory?
A. Either low or high memory (depending on the location of interrupt vector)
B. In the low memory
C. In the high memory
D. None of the mentioned
8. The main memory accommodates ____________
C. Cpu C. operating system
II. From question number 11-13 say True if the question is correct and False if it is
incorrect.
11. A user interacts directly with a piece of software called application software. T
12. Unix is a multiuser operating system designed for flexibility and adaptability developed
in the 1970s. T
III. Match the following columns
A B
1. Application software A. Windows
2. Operating system B. Web browsers
3. 1 gigahertz (GHz) processor speed C.NIC
D. Windows 10 requirements
Operation Sheet 5.
Install Windows 10
Operation sheet-6
Install and Microsoft Office
Lap test 5
1. Install Windows 10:
Follow Full installation procedure
1. Check your device meets the Windows 10 system requirements.
2. Create USB installation media.
3. Run the installer tool.
4. Use your installation media.
5. Change your computer's boot order.
6. Restart your device.
7. Complete the installation.
8. Create you account called ITL2
3. Install antivirus
1. Using an antivirus is essential when trying to keep your computer healthy and
free from viruses.
2. Install an Antivirus.
3. Keep Your Software up to Date.
4. Backup Your Computer.
5. Use a Strong Password.
6. Watch the Downloads.
7. Install an Ad-block.
8. Run a Virus Scan Often
Avast Free Antivirus really is free — you'll never need to pay for it and it'll provide you with
essential online security and protection. If you're looking for more security and privacy features,
our Avast Premium Security software is the right product for you.
This guide will also assist you to attain the learning outcome stated in the cover page.
In computing, an input device is a piece of equipment used to provide data and control signals to
an information processing system, such as a computer or information appliance. Examples of
input devices include keyboards, mouse, scanners, cameras, joysticks, and microphones.
Input and output devices allow the computer system to interact with the outside world by moving
data into and out of the system. An input device is used to bring data into the system. Some input
devices are:
Keyboard
Mouse
Microphone
Bar code reader
Graphics tablet
An Input/output device error on the computer happens when a drive is inaccessible. So when
you try to open a drive, you would see the error message – the request could not be performed.
I/O errors cause a panic because sometimes, your files may get deleted. And often, there is no
feasible way to recover them.
An I/O device error is a problem with the device that prevents Windows from perusing its
content or writing on it. It can show up on the hard drive (HDD or SSD), external hard disk,
USB, SD card, CD/DVD, and so on. If the external hard drive is showing a disk I/O error, you
can't move PC data to and from that drive. The most common cause of a non-accessible I/O error
is a disconnected cable. When the computer tries to access a device and it gets no response after
several tries, it will generate this type of error. Another common cause is when a program tries to
access a file that has been removed or deleted.
What Is an I/O Device Error? Input Output device errors are quite common.
Restart Your Computer.
Check Your Cables and Connections.
Try an Alternative USB Port.
Run CHKDSK and SFC.
Update the Device Driver.
Change Your Drive Letter. ...
Use Speccy to Check Drive Health.
Computer printers.
Graphic cards.
Modems.
Network cards.
Sound cards.
Drivers are part of the OS. They run with the same privilege level as the OS kernel, and to write
a driver you must know a good deal about the OS internals.
What would be the benefits of driver software?
Driver management software solves the lack of visibility, as it alerts the managers or dispatch
team of any trouble in real-time. There will be alerts if accidents, mechanical trouble, or any
other problems on the road occur, allowing the dispatch team or managers to respond quickly to
the incident.
Check Driver software work properly
Open Start
Search for Device Manager and
click the top result to open the experience.
Expand the branch for the device that you want to check the driver version.
Right-click the device and select the Properties option.