0% found this document useful (0 votes)
67 views23 pages

Core 1

This document provides competency-based learning materials for the unit "Install and configure computer systems" for the qualification of Computer System Servicing NC II. The module covers assembling computer hardware, preparing installers, installing operating systems and drivers, installing application software, and conducting tests. Learners will complete learning activities including information sheets, operation sheets, job sheets, assignments, and worksheets to develop the skills and knowledge outlined in each of the five learning outcomes. Upon completing this module, learners will be able to assemble computer hardware, prepare installers, install operating systems and drivers, install application software, and conduct tests to configure computer systems.

Uploaded by

ISSE ALICIA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views23 pages

Core 1

This document provides competency-based learning materials for the unit "Install and configure computer systems" for the qualification of Computer System Servicing NC II. The module covers assembling computer hardware, preparing installers, installing operating systems and drivers, installing application software, and conducting tests. Learners will complete learning activities including information sheets, operation sheets, job sheets, assignments, and worksheets to develop the skills and knowledge outlined in each of the five learning outcomes. Upon completing this module, learners will be able to assemble computer hardware, prepare installers, install operating systems and drivers, install application software, and conduct tests to configure computer systems.

Uploaded by

ISSE ALICIA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 23

COMPETENCY-BASED

LEARNING MATERIALS

Sector: ELECTRONICS SECTOR

Qualification: COMPUTER SYSTEM SERVICING NC II


Unit of
Competency:
Install and configure computer systems

Module Title: Installing and configuring computer systems

P a g e 1 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
HOW TO USED COMPETENCY BASED LEARNING MODULE
Welcome to the module in “Installing and configuring computer systems”. The module
contains training materials and activities for you to complete.

This unit of competency “Install and configure computer systems “contains knowledge,
skills and attitude“, required for COMPUTER SYSTEM SERVICING NC II. It is one of the
specialized modules at National Certificate Level (NC II).

You are required to go through a series of learning activities in order to complete each
outcome of the module. In each learning outcome are:

1. Information Sheet – this will provide you with information (concepts, principles and
other relevant information) needed in performing certain activities.
2. Operation Sheet – this will guide you in performing single task, operation or process in a
job.
3. Job Sheet – this is designed to guide you how to do that will contribute to the
attainment of the learning outcome.
4. Assignment Sheet – is to guide you to enhance what you have learned in the
information sheet, operation sheet or job sheet.
5. Work Sheet – are different forms that you need to fill up in certain activities that you
performed.

Follow these activities on your own and answer the Self-Check, perform the procedural
checklist at the end of each learning outcome.

You may remove the blank Answer Sheet at the end of each module (or get one from your
facilitator/trainer) to write your answer for its self-check.

If you have questions, don’t hesitate to ask your facilitator for assistance.

Recognition of Prior Learning (RPL)


You may already have some of the most of the knowledge and skills covered in this learner’s
guide because you have:
• Been working for some time
• Already completed training in this area

If you can demonstrate to your trainer that you are already competent in a particular skill or
skills, talk to him/her about having them formally recognized so don’t have to do the same
training again.

If you have a qualification or Certificate of Competency from previous training, show it to


your trainer.

If the skill you acquired is still current and relevant to the unit/s of competency they may
become part of the evidence you may present to RPL.
If you are not sure about the currency of your skills, discuss with your trainer.
P a g e 2 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
At the end of this module is a Learner’s Diary. Use this diary to record important date, jobs
undertaken and other workplace events that will assist you in providing further details to
your trainer assessor.

A record of achievement is also provided for your trainer to complete once you complete
the module.

This module was prepared to help you achieve the required competency in “Installing and
configuring computer systems”.

This will be source of information for you to acquire knowledge and skill into this particular
trade independently and at your own place, with minimum supervision or help from your
instructor.
• Talk to your trainer and agree on how both will organize training of this unit. Read
through module carefully. It is divided into sections, which cover all the skill and
knowledge you need to successfully complete this module.
• Work through all the information and complete all the activities in each section. Read
the information sheets and job sheets and complete the self-check and perform the
procedural check list. Suggested references are included to supplement the material in
the module.
• Most probably your trainer will also be your supervisor or manager. She/he is there to
support you and show the correct way to do things.
• Your trainer will tell you about the important things you need to consider when you are
completing activities and it is important that you listen and take notes
• You will be given plenty of opportunity to ask questions and practice on the job, make
sure that you practice new skill during regular work shift. This way you will improve
both your speed and memory and your confidence
• Talk to the more experience workmate and ask for their guidance.
• Use self-check questions at the end of each section to test your own progress.
• When you are ready ask your trainer to watch you perform the activities outline in this
module
• As you work to your activities, ask for written feedback on your progress. Your trainer
keeps feedback/pre assessment reports for this reason when you have successfully
completed each element, as your trainer to mark on the reports that you are ready for
assessment.
• When you have completed this module (or several modules) and feel confident that you
have had sufficient practice, your trainer will arrange an appointment with registered
assessor to assess you. The result of your assessment will be recorded in your
competency achievement record.

P a g e 3 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
LIST OF CORE COMPETENCIES

No. Unit of Competency Module Title Code

Install and configure computer Installing and configuring


ELC724331
1. systems computer systems

Set-up Computer Networks Setting-up Computer Networks ELC724332


2.

Set-up Computer Servers Setting-up Computer Servers ELC724333


3.

Maintain and Repair Computer Maintaining and Repairing


ELC724334
4. Systems and Networks Computer Systems and Networks

P a g e 4 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
MODULE CONTENT
Unit of Competency : Install and configure computer systems.
Module Title : Installing and configuring computer systems.
Module Descriptor : This unit covers the outcomes required in installing and
configuring desktop and workstation computers systems. It consists
of competencies to assemble computer hardware, install operating
system and drivers for peripherals/devices, and install application
software as well as to conduct testing and documentation.

Nominal Duration : 50 hours

Qualification Level : NC II

Summary of Learning Outcomes:

Upon completion of this module, the students/ trainees must be able to:

LO1. Assemble computer hardware

LO2. Prepare installer

LO3. Install operating system and drivers for peripherals/ devices

LO4. Install application software

LO5. Conduct test

P a g e 5 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
LEARNING OUTCOME # 1 Assemble computer hardware
SUMMARY OF ASSESSMENT CRITERIA:
1. Unit Assembly Is Planned And Prepared To Ensure OHS Policies And Procedures Are Followed
In Accordance With Systems Requirements
2. Materials Necessary To Complete The Work Are Identified And Obtained In Accordance With
Established Procedures And Checked Against Systems Requirements
3. Tools, Equipment And Testing Devices Needed To Carry Out The Installation Work Are
Obtained In Accordance With Established Procedures And Checked For Correct Operation
and Safety
4. Computer Hardware Is Assembled In Accordance With Established Procedures And Systems
Requirements
5. 5. Basic-Input-Output-System (Bios) Configuration Is Performed In Accordance With
Hardware Requirements.
CONTENTS:

 Safety procedures
 Basic terms, concepts, functions and characteristics of PC hardware
components
 Structure of operating systems
 Familiarization with the various computer systems’ components and peripherals
 System configuration/ settings of computer systems and devices
CONDITION: Students/trainees must be provided with the following:
 Personal Protective equipment ( ex. protective eyewear, anti-static wrist wrap)
 Electronic laboratory hand tools (assorted pliers, assorted screw
drivers, soldering iron & desoldering tool)
 LAN tester
 Crimping tools
 RS 232 pin exertion/ extraction tool
 Flashlights
 Mirror (inspection)
 Hand-outs
METHODOLOGIES:

 Lecture-demonstration
 Self-paced instruction
 Group discussion
ASSESSMENT METHODS:

 Hands-on
 Direct observation
 Practical demonstration

P a g e 6 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
LEARNING ACTIVITIES SPECIAL INSTRUCTION
Read Information Sheet # 1.1-1, If you have some problems on Information Sheet # 1.1-
1, don’t hesitate to approach your facilitator. If you feel
1. Safety procedures you are knowledgeable on the content of Information
Sheet # 1.1-1, you can now answer Self-Check # 1.1-1.
Compare your answer with the Answer Key # 1.1-1, If
Answer Self Check # 1.1-1 you got 100% correct answer in this self-check, you can
now move to the next information sheet. If not, review
the information sheet and go over the self-check again.
Read Information Sheet # 1.1-2, If you have some problems on Information Sheet # 1.1-
2. Basic terms, concepts, functions 2, don’t hesitate to approach your facilitator. If you feel
and characteristics of PC you are knowledgeable on the content of Information
hardware components Sheet # 1.1-2, you can now answer Self-Check # 1.1-2.
Compare your answer with the Answer Key # 1.1-2, If
you got 100% correct answer in this self-check, you can
Answer Self-Check # 1.1-2 now move to the next information sheet. If not, review
the information sheet and go over the self-check again.
Read Information Sheet # 1.1-3, If you have some problems on Information Sheet # 1.1-
3, don’t hesitate to approach your facilitator. If you feel
3. Structure of operating systems you are knowledgeable on the content of Information
Sheet # 1.1-3, you can now answer Self-Check # 1.1-3.
Compare your answer with the Answer Key # 1.1-3, If
Answer Self Check # 1.1-3 you got 100% correct answer in this self-check, you can
now move to the next information sheet. If not, review
the information sheet and go over the self-check again.
Read Information Sheet # 1.1-4, If you have some problems on Information Sheet # 1.1-
4. Familiarization with the various 4, don’t hesitate to approach your facilitator. If you feel
computer systems’ components you are knowledgeable on the content of Information
and peripherals Sheet # 1.1-4, you can now answer Self-Check # 1.1-4.
Compare your answer with the Answer Key # 1.1-4, If
you got 100% correct answer in this self-check, you can
Answer Self-Check # 1.1-4 now move to the next information sheet. If not, review
the information sheet and go over the self-check again.
Read Information Sheet # 1.1-5, If you have some problems on Information Sheet # 1.1-
5, don’t hesitate to approach your facilitator. If you feel
5. System configuration/ settings of you are knowledgeable on the content of Information
computer systems and devices Sheet # 1.1-5, you can now answer Self-Check # 1.1-5.
Compare your answer with the Answer Key # 1.1-5, If
Answer Self Check # 1.1-5 you got 100% correct answer in this self-check, you can
now move to the next information sheet. If not, review
the information sheet and go over the self-check again.
Learning Outcome: 1. Assemble computer hardware
Information Sheet # 1.1-1
P a g e 7 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
Safety Procedures

Learning Objectives: After reading this module, the learner must be able to:
1. Learn safety procedures in assembling computer hardware
2. To understand standard operating procedures in computer system servicing.

Occupational Health and Safety for


Computer Hardware Servicing
The following are the examples of OHS that is related to computer hardware servicing.

1. Contingency measures during workplace


accidents, fire and other emergencies are
recognized.

2. Personal protective equipment are correctly


used in accordance with organization OHS
procedures and practices.

P a g e 8 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
3. Hazard/risks in the workplace and their
corresponding indicators are identified to
minimize or eliminate risk to co-workers,
workplace and environment.

4. Always discharge yourself before touching any


part of the computer.

5. Be careful with tools that may cause short


circuit. Wear rubber sole shoes when standing on the ground or in a concrete floor.

6. Always power off and unplug the computer before working on it.
When making circuit changes, switch off and unplug the power cord from the equipment then
discharge the capacitors. 

7. Replace only fuses with those proper rating.

8. Hold the components by the edges and do not touch the IC’s. 

9. Read and follow instructions on the manual


carefully.

10. Do not use excessive force if things don’t quite


slip into place.

SELF-CHECK #1.1-1
P a g e 9 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
I – What are the Ten Occupational Health and Safety Procedures for Computer Hardware
Servicing.

1. _________________________________________________________________.

2. _________________________________________________________________.

3. _________________________________________________________________.

4. _________________________________________________________________.

5. _________________________________________________________________.

6. _________________________________________________________________.

7. _________________________________________________________________.

8. _________________________________________________________________.

9. _________________________________________________________________.

10. ________________________________________________________________.

ANSWER KEY #1.1-1


P a g e 10 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
I – What are the Ten Occupational Health and Safety Procedures for Computer
Hardware Servicing.

1. Contingency measures during workplace accidents, fire and other emergencies are
recognized.

2. Personal protective equipment are correctly used in accordance with organization


OHS procedures and practices.

3. Hazard/risks in the workplace and their corresponding indicators are identified to


minimize or eliminate risk to co-workers, workplace and environment.

4. Always discharge yourself before touching any part of the computer.

5. Be careful with tools that may cause short circuit. Wear rubber sole shoes when
standing on the ground or in a concrete floor.

6. Always power off and unplug the computer before working on it.

When making circuit changes, switch off and unplug the power cord from the
equipment then discharge the capacitors.

7. Replace only fuses with those proper rating.

8. Hold the components by the edges and do not touch the IC’s.

9. Read and follow instructions on the manual carefully.

10. Do not use excessive force if things don’t quite slip into place.

Information Sheet # 1.1-2


P a g e 11 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
Basic terms, concepts, functions and characteristics of PC hardware
components

Learning Objectives: After reading this module, the learner must be able to:

1. Understand and learn basic terms, concepts, functions and characteristics of PC


hardware components

Computer System refers to the overall set-up, consisting of hardware, software,


data and its users. Computer system as a whole includes:

 People – to supply the data and to make decisions from the output supplied
from the system information, which is based on the results from processing data
and the output from an ICT system.
 Hardware e.g. input devices, storage, processor, output devices and
communication devices.
 Procedures – to determine what needs to be done and when. This causes
the passing of data or information between people.
 Software – the computer programs which provide the step-by-step
instructions to complete the task.
 Data – raw material that is processed by the system to provide the information
for the output provided by the system. Data can come in different formats, such as
sounds, images, and videos, etc.

P a g e 12 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
Computers are programmable electronic
devices designed to accept data, perform
prescribed mathematical and logical
operations at high speed, and display the
results of these operations.

Computers are used in Information


Technology (IT) – which is a subset of ICT.

Computers store, transmit, retrieve and


manipulate data for businesses and other enterprises.

Computers refer to the hardware, and since computers cannot initiate functionality
on their own, they start functioning as soon as they receive data to work with (to
process). This data is then stored on the computer, the computer manipulates the
data according to the instructions it has received, before sending the new information
back to the user.

Thus, we can say that Information technology (IT) is the development, maintenance
and use of computer systems, software, and networks for processing and
communicating data.

THE GENERAL MODEL OF A COMPUTER

P a g e 13 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
The following illustration demonstrates a general model of a computer and shows
that the functions of a computer are similar to the steps of the information processing
cycle. All basic computers consist of four functions: input, storage, processing and
output.

Figure 1.1: The general model of a computer

IPO is often called IPOS or input, process, output, storage. The computer receives
input, processes the input as per user instructions and provides output and can be
stored in a desired format. Computer input is called data and the output obtained
after processing it, is called information. Raw facts and figures that can be processed
using arithmetic and logical operations to obtain information are called data.

The general model of computers can be used to explain how each computer (or
smartphone) works.

Once you understand how a computer operates, it becomes a lot easier to think
about creating your own programs. When you begin learning about coding a
program, you need to understand that you must create a set of step-by-step
instructions that manages the flow of information: from when your program receives
data from the user, up to the point when it returns output back to the user.

SELF-CHECK #1.1-2
P a g e 14 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
I – There are five (5) referrals to the overall set-up, consisting of hardware, software,
data and its users of a Computer System. Explain each referrals.

 People – ______________________________________________________
________________________________________________________________

 Hardware - ____________________________________________________
________________________________________________________________

 Procedures – __________________________________________________
________________________________________________________________

 Software – ____________________________________________________
________________________________________________________________

 Data – _______________________________________________________
________________________________________________________________

ANSWER KEY #1.1-2


P a g e 15 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
I – There are five (5) referrals to the overall set-up, consisting of hardware, software,
data and its users of a Computer System. Explain each referrals.

 People – to supply the data and to make decisions from the output supplied
from the system information, which is based on the results from processing data
and the output from an ICT system.

 Hardware - input devices, storage, processor, output devices and


communication devices.

 Procedures – to determine what needs to be done and when. This causes


the passing of data or information between people.

 Software – the computer programs which provide the step-by-step


instructions to complete the task.

 Data – raw material that is processed by the system to provide the information
for the output provided by the system. Data can come in different formats, such
as sounds, images, and videos, etc.

P a g e 16 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
Information Sheet # 1.1-3

Structure of operating systems

Learning Objectives: After reading this module, the learner must be able to:

1. Know the structures of operating system of computer hardware servicing.

Operating System Structure


Introduction: Here you will learn about the structure of operating systems. In other
word, you will see what operating systems looks like from the outside or the
programmer's interface.

Here we will take a look at five different structures of operating systems.

Here are the list of all those five designs or structures of the operating systems, we
will examine.
1. Monolithic Systems
2. Layered Systems

3. Virtual Machines

4. Exokernels

5. Client-Server Systems

P a g e 17 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
Now let's describe briefly about all the above different-different structures of
operating systems.

Monolithic Systems

The operating system (OS) is written as a collection of procedures, each of which


can call any of the other ones, whenever it needs to.

When this technique is used, then each procedure in the system has a well-defined
interface in terms of parameter, and results, and each one is free to call any of the
other ones, if the latter provides some useful computation that the former needs.

Monolithic systems provides a basic structure for the operating system.

 a main program that invokes the requested service procedure


 a set of service procedures that carry out the system calls
 a set of utility procedures that help the service procedure

In Monolithic system model, there is one service procedure for each system call that
takes care of it. The utility procedures do jobs that are needed by several service
procedures, such as fetching the data from the user programs.

This division of the procedures into the following three layers:

1. Main Procedure
2. Service Procedures
3. Utility Procedures

The figure given below shows all the layered provided above in monolithic system
model of operating system.

P a g e 18 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
Layered Systems
This system has 6 layers as shown in the table given below.

Layer Function

5 The operator

4 User programs

3 I/O management

2 Operator-process communication

1 Memory and drum management

0 Processor allocation and multiprogramming


Here, are the description provided layer by layer.
 Layer 0 - This layer dealt with allocation of the processor, switching between
processes when interrupts occurred or timers expired
 Layer 1 - This layer did the memory management

 Layer 2 - This layer handled the communication between each process and
the operator console
 Layer 3 - This layer took care of managing the Input/Output devices and
buffering the information streams to and from them
 Layer 4 - On this layer, user programs were found
 Layer 5 - On this layer, the system operator process was located

Virtual Machines

The system originally called CP/CMS, later renamed VM/370, was based on an
astute observation. That was a time sharing system, provides multiprogramming and
an extended machine with a more convenient interface than the bare hardware.

The heart of the system known as virtual machine monitor that runs on the bare
hardware and does the multiprogramming, providing several virtual machines to next
layer up as shown in the given figure.

P a g e 19 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
These virtual machines aren't extended machines, with files and other nice features.
They are the exact copies of the bare hardware, including the kernel/user mode,
Input/Output, interrupts, and everything else the real machine has.

Exokernels

Exokernels is a program present at the bottom layer, running in the kernel mode.

The work of exokernel is just to allocate the resources to the virtual machines and
check attempts to use them to make sure no machine is trying to use some other's
resources.

Exokernels saves a layer of mapping which is the advantage of the exokernel


scheme.

Client-Server Model

In the client-server model, as shown in the figure given below, all the kernel does is
handle the communication between the clients and the servers.

By splitting the operating system (OS) up into parts, each of which only handles one
fact of the system, such as file service, terminal service, process service, or memory
service, each part becomes small and manageable.

P a g e 20 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
The adaptability of the client-server model, to use in distributed system is the
advantage of this model.

SELF-CHECK #1.1-3
I – TRUE or FALSE. Write “T” if the answer is True and write “F” if the answer is False.

_____ 1. Monolithic systems provides a basic structure for the operating system as
follows:

 a main program that invokes the requested service procedure


 a set of service procedures that carry out the system calls
 a set of utility procedures that help the service procedure

_____ 2. Layered Systems has 6 layers provided layer by layer.

• Layer 0 - This layer dealt with allocation of the processor, switching


between processes when interrupts occurred or timers expired
• Layer 1 - This layer did the memory management
• Layer 2 - This layer handled the communication between each process
and the operator console
• Layer 3 - This layer took care of managing the Input/Output devices
and buffering the information streams to and from them
• Layer 4 - On this layer, user programs were found
• Layer 5 - On this layer, the system operator process was located

_____ 3. Virtual Machines

- Is just to allocate the resources to the virtual machines and check


attempts to use them to make sure no machine is trying to use some
other's resources.

_____ 4. Exokernels

- The system originally called CP/CMS, later renamed VM/370, was


based on an astute observation. That was a time sharing system,
provides multiprogramming and an extended machine with a more
convenient interface than the bare hardware.

P a g e 21 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
_____ 5. Client-Server Model

- By splitting the operating system (OS) up into parts, each of which


only handles one fact of the system, such as file service, terminal
service, process service, or memory service, each part becomes small
and manageable.

ANSWER KEY #1.1-3


I – TRUE or FALSE. Write “T” if the answer is True and write “F” if the answer is False.

___T___ 1.

___T___ 2.

___F___ 3.

___F___ 4.

___T___ 5.

P a g e 22 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City
P a g e 23 | 22

CBLM’s on Date Revised: 2023 Issued by:


COMPUTER SYSTEM SERVICING NC II Developed by: Wellcare Institute
CORE # 1: JOHN LESTER M. ESQUEJO of Science and
INSTALL AND CONFIGURE (Trainer) Technology, Inc.
COMPUTER SYSTEM Urdaneta City

You might also like