0% found this document useful (0 votes)
40 views108 pages

UC 1 Install and Configure Computer Systems Final

Uploaded by

Lancee Lott
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views108 pages

UC 1 Install and Configure Computer Systems Final

Uploaded by

Lancee Lott
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 108

Sector:

ELECTRICAL AND ELECTRONICS


Qualification:
COMPUTER SYSTEMS SERVICING NC II
Unit of Competency:

INSTALL AND CONFIGURE COMPUTER SYSTEMS


Module Title:

INSTALLING AND CONFIGURING COMPUTER SYSTEMS

GREEN VALLEY COLLEGE FOUNDATION, INC.


SUMMARY OF COMPETENCY-BASED LEARNING MATERIALS

1. Install computer systems and Installing computer ELC724331


networks systems and networks
2. Setting-up Computer ELC724332
Set-up Computer Networks
Networks
3. Setting-up Computer ELC724333
Set-up Computer Servers
Servers
Maintaining and Repair
4. Maintain and Repair Computer ELC724334
Computer Systems and
Systems and Networks
Networks

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 2 of 108
System Revision No.:
REY G. SOMBRERO
HOW TO USE THIS MODULE
Welcome to the Module “Installing and Configuring Computer System”. This
module contains training materials and activities for you to complete.

The unit of competency “Install and Configure Computer Systems” contains


knowledge, skills and attitudes required for a Computer Systems Servicing NC II course.

You are required to go through a series of learning activities in order to complete each
of the learning outcomes of the module. In each learning outcome there are Information
Sheets, Operation Sheets, and Activity Sheets. Follow these activities on your own and
answer the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a particular skill or
skills, talk to him/her about having them formally recognized so you don’t have to do he same
training again. If you have a qualification or Certificate of Competency from previous trainings
show it to your teacher. If the skills you acquired are still current and relevant to this module,
they may become part of the evidence you can present for RPL. If you are not sure about the
currency of your skills, discuss it with your teacher.

After completing this module ask your teacher to assess your competency. Result of
your assessment will be recorded in your competency profile. All the learning activities are
designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more than
one learning activity.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 3 of 108
System Revision No.:
REY G. SOMBRERO
MODULE CONTENT

QUALIFICATION COMPUTER SYSTEMS SERVICING NC II


UNIT OF COMPETENCY Install and Configure Computer Systems
MODULE TITLE Installing and Configuring Computer Systems

INTRODUCTION:

This unit covers the outcomes required in installing and configuring desktop and
workstation computers systems. It consists of competencies to assemble computer hardware,
install operating system and drivers for peripherals/devices, and install application software as
well as to conduct testing and documentation

LEARNING OUTCOMES:

1. Assemble computer hardware

2. Prepare installer

3. Install operating system and drivers for peripherals/ devices

4. Install application software

5. Conduct testing and documentation

ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies and procedures are
followed in accordance with systems requirements
2. Materials necessary to complete the work are identified and obtained in accordance
with established procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct
operation and safety
4. Computer hardware is assembled in accordance with established procedures and
systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in accordance with
hardware requirements.
6. Portable bootable devices are created in accordance with software manufacturer
instruction
7. Customized installers are prepared in accordance with software utilization guide and
end user agreement.
8. Installation of portable applications are carried out in accordance with software user
guide and software license
9. Operating system (OS) is installed in accordance with established installation
procedures and to comply with end-user requirements
10. Peripherals/devices drivers are installed and configured in accordance with
manufacturer’s instructions and/or OS installation procedures.
11. OS and drivers updates/patches are accessed and installed in accordance with
manufacturer’s recommendations and requirements
12. On-going checks of the quality of the work are undertaken in accordance with
established procedures
13. Application software are installed based on software installation guides, end-user
requirements and software license agreement

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 4 of 108
System Revision No.:
REY G. SOMBRERO
14. Variation to application software installation is carried out in accordance to
customer/client requirements
15. Software updates are accessed and installed in accordance with manufacturer’s
recommendations and requirements
16. Devices / systems and/or installation is tested to determine whether it conforms to
requirements
17. Stress test is conducted to ensure reliability of equipment in accordance with
manufacturer’s instructions and system requirements
18. 5S and 3Rs are followed according to environmental policies
19. Documentation in relation to the test is forwarded to appropriate personnel and/or
authority in accordance with requirements

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 5 of 108
System Revision No.:
REY G. SOMBRERO
TECHNICAL TERMS

 Active Hubs – amplify or boost signals

 Anti-Static – A product that prevents the build up of static electricity


 BIOS – Basic Input/Output System, chip that controls the most basic functions of the
computer and performs a self-test every time you turn it on.
 Flash drive– RAM that can retain data without electrical power. It is widely used for
BIOS chips and for digital camera and digital music storage.
 Graphic tablet – objects are drawn using a pen or a puck. The puck is technically a
tablet cursor, not a mouse.
 Goggles – A large spectacles, with shields around the rims, for protecting the eyes
from dust, excessive light, wind, etc.
 Hard-disk drive – is a storage device that stores billions of characters of data on a
nonremovable disk.
 Hardware- refers to the tangible (things you can touch) components of a computer
system. Hardware components are further divided into three groups namely
 Host – any computer whether mainframe, server, or even PC that acts as an
information source on a network.

 Intelligent Hubs – select which path a specific signal will travel


 Joy Stick - a hand-held control stick that allows a player to control the movements of
a cursor on a computer screen or a symbol in a video game.
 LAN Card – Local area network interface card.
 Laptop computer - A small, portable computer -- small enough that it can sit on your
lap.

 Local Area Network- the smallest of the three network types, consist of PCs
connected together within a limited area, such as within the same building, floor or
department.

 Mainframe: A powerful multi-user computer capable of supporting many hundreds or


thousands of users simultaneously.

 Metropolitan Area Network – are network that spans no more than 50 miles. It is
design to connect LANs spanning a town or city

 Minicomputer: A multi-user computer capable of supporting up to hundreds of users


simultaneously.

 Metropolitan Area Network – is a network that spans no more than 50 miles. It is


design to connect LANs spanning a town or city
 Motherboard – contains the CPU, BIOS, Memory, mass storage interfaces, serial and
parallel ports, expansion slot and all the controllers required to control standard
peripheral devices such as the display screen, keyboard and disk drive

 Modem - (Modulator-Demodulator) The modem is a device that allows a given


computer to share data or otherwise a device which let computers exchange
information

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 6 of 108
System Revision No.:
REY G. SOMBRERO
 Modular Hubs – are popular in networks because they are easily expanded and
always have management option. It is purchased as chassis, or card cage, with
multiple card slots, each of which accepts a communication card, or module
 Multimedia - is the combination of different types of communication media (sound,
print, video, and so on)
 Multitester- is an instrument use to measure voltage, current and resistance.
 NIC – Network Interface Card – The PC expansion board that plug into a personal
computer or server and works with the network operating system to control the flow of
information over the network.
 Network – is a communications system connecting two or more computers.
 Network Bridge – divides network into smaller, more manageable sections helping
reduce network traffic.
 Network Hub - a hardware device that all PCs on a network are connected to by
cabling. The hub manages receiving and transmitting data from networked services.
 Network Server- is a powerful computer whose sole purpose is to serve network
clients.

 Network Switch – It helps determine how data moves over large networks.

 Notebook computer An extremely lightweight personal computer that weighs weigh


less than 6 pounds and are small enough to fit easily in a briefcase.
 OHS – Occupational Health and Safety
 Operating System (Os) -software that controls the allocation and use of programs
and data that a computer uses.
 Passive Hubs – simply connects various cables

 Personal computer: A small, single-user computer based on a microprocessor.


 Port hub /Port – is a connector on the back of a computer or other device. A port is
either a serial port or a parallel port.
 Peers- mean any computer sharing the same protocol layer with another computer.

 Protocol – refers to the specific standards governing the sending and receiving of
data.

 Repeater– a device that strengthen signals and allow then to stay clear over longer
distances.
 Printer - It is a piece of hardware that produces a paper copy (also known as
‘hardcopy’) of the information generated by the computer.

 RAM – Random Access Memory, is a primary memory. This memory is used inside
the computer to hold programs and data while it is running.
 RJ 45 – is the connector plugged into the NIC ports on computers and often
connecting the main networking hardware together.
 Router – a device that forwards data packets between Local or Wide Area Network
groups.
 Scanner- it is an input device that read text or illustration printed on paper, translates
the information into a form that a computer can use.
 Server – is a part of a network. It is a special computer that users on the network can
asses to carry out a particular job.
 Software – programs and data that a computer uses.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 7 of 108
System Revision No.:
REY G. SOMBRERO
 Software applications- enables you to perform specific tasks- solve problems,
perform work, or entertain yourself.
 Sound Device Driver Installer / Sound and Audio Devices – A windows XP Control
Panel applet, called Sounds, and Multimedia in Windows 2000, for configuring the
system’s sound card.
 Stackable Hubs – work just like standalone hubs, except that several of them can be
“stacked” (connected) together, usually by short lengths of cable.
 Standalone Hubs – are single products with a number of ports. It is usually include
some method of linking them to other standalone hubs for network expansion.
 Static – The discharge of electricity between two objects with different electrical
potential

 Sub notebook computer - A portable computer that is slightly lighter and smaller than
a full-sized notebook computer. Typically, sub notebook computers have a smaller
keyboard and screen, but are otherwise equivalent to notebook computers.
 UTP – (Unshielded Twisted Pair) least expensive and most popular network media.
 USB – Universal Serial Bus, a hardware interface for low-speed peripherals such as
the keyboard, mouse, joystick, scanner, printer and telephony devices.
 Video Camera - camera using videotape: a camera that records onto videotape
 Wide Area Network – used to distribute information thousand of miles among
thousands of users.

 Wireless Hubs– are hubs designed for the home

 Workstation- is any network computer that connects to and request resources from a
network

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 8 of 108
System Revision No.:
REY G. SOMBRERO
LEARNING OUTCOME #1 ASSEMBLE COMPUTER HARDWARE

CONTENTS:
1. Safety procedures
2. Basic terms, concepts, functions and characteristics of PC hardware components
3. Structure of operating systems
4. Familiarization with the various computer systems’ components and peripherals
5. Assembling computer hardware
ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies and procedures
are followed in accordance with systems requirements
2. Materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct
operation and safety
4. Computer hardware is assembled in accordance with established procedures and
systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in accordance with
hardware requirements.

CONDITION:
Students/trainees must be provided with the following:
 Protective eyewear
 IC insertion/extraction
 Digital multi-meter
tool
 Wire stripper with bolt cutter
 Mirror (inspection)
 Pliers (assorted)
 RS 232 pin insertion/
 Screw drivers (assorted)
extraction tool
 Soldering iron
 Sharp pointed tweezers
 Desoldering tool
 Antistatic wrist wrap
 Allen wrench (0.05 – 0.25 inch)
 LAN Tester
 Flashlight

EVALUATION METHOD:
1. Lecture
2. Discussion
3. Demonstration
4. Viewing multimedia

LEARNING OUTCOME SUMMARY

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 9 of 108
System Revision No.:
REY G. SOMBRERO
Learning Experiences
Learning Outcome 1: Assemble Computer Hardware

Learning Activities Special Instructions


1. Read information sheet 1.1-1 ” OHS If you have some problem on the content of the
Policies and Procedures” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self check provided in the module.
2. Answer self-check 1.1-1 Compare your answer to the answer key 1.1-1. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not review
the information sheet and go over the self-check
again.
3. Read information sheet 1.1-2 “Basic If you have some problem on the content of the
Terms, Concepts, Functions and information sheet don’t hesitate to approach your
Characteristics Of PC Hardware facilitator.
Components If you feel that you are now knowledgeable on the
” content of the information sheet, you can now
answer self check provided in the module.

4. Answer self-check 1.1-2 Compare your answer to the answer key 1.1-2. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not review
the information sheet and go over the self-check
again.
5. Read information sheet 1.1-3 If you have some problem on the content of the
“Structure of Operating System” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self check provided in the module.
6. Answer self-check 1.1-3 Compare your answer to the answer key 1.1-3. If you
got 100% correct answer in this self-check, you can
now move to the next task sheet. If not review the
information sheet and go over the self-check again.
7. Read information sheet 1.1-4 If you have some problem on the content of the
“System Configuration / Settings of information sheet don’t hesitate to approach your
computer system and devices” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self check provided in the module.
8. Answer self-check 1.1-4 Compare your answer to the answer key 1.1-4. If you
got 100% correct answer in this self-check, you can
now move to the next Learning Outcome. If not
review the information sheet and go over the self-
check again.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 10 of 108
System Revision No.:
REY G. SOMBRERO
INFORMATION SHEET 1.1-1
OHS Policies and Procedures

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to identify and apply
OHS policies and procedures in Computer Systems Servicing NC II.

Occupational Health and Safety Policy


Occupational health and safety is a cross-disciplinary area concerned with
protecting the safety, health and welfare of people engaged in work. The goal of all
occupational health and safety programs is to foster a safe work environment. As a
secondary effect, it may also protect co-workers, family members, employers,
customers, suppliers, nearby communities, and other members of the public who are
impacted by the workplace environment. It may involve interactions among many
subject areas, including occupational medicine, occupational (or industrial) hygiene,
public health, safety engineering, chemistry, health physics.
Safety practices should be learned early and always adhered to when
working with any electrical device, including personal computers and peripherals.
This is for the protection of not only the people working with them, but also for the
devices themselves. The basis for this process begins with your Occupational Health
and Safety Policies.
Personal Safety While Working Along With PC’s
While working inside your computer, do not attempt to service the computer except
as explained in this guide and elsewhere in product documentation. Always follow
the instructions closely.
Computer equipment can be dangerous, and you or others can be injured or
even killed if you don’t follow proper safety guidelines when working along PC’s.
The following are some precautionary measures to take before working with any
computer equipment:
Before you start to work on the computer, perform the following steps in the
sequence indicated:
1. Turn off the computer and all peripherals.

2. Touch an unpainted metal surface on the computer chassis, such as the


metal around the card-slot openings at the back of your computer, before
touching anything inside your computer.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 11 of 108
System Revision No.:
REY G. SOMBRERO
3. Disconnect the computer and peripherals from their electrical outlets. Doing
so reduces the potential for personal injury or shock. Also disconnect any telephone
or telecommunication lines from the computer.
NOTE: Before disconnecting a peripheral from the system or removing a
component from the system board, verify that the standby power light-emitting
diode (LED) on the system board has turned off.
While you work, periodically touch an unpainted metal surface on the computer
chassis to dissipate any static electricity that might harm internal components.
In addition, it is recommended that you periodically review the safety instructions in
your System Information Guide.

Additional Safety tips:

 Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.

 Do not work on components that are plugged into their power source.

 Do not remove expansion cards from a computer when it is turned on.

 Remove all jewelry when working inside any computer related equipment.

 Be sure not to mix electronic components and water.

 When you shut down your computer, be sure to shut it down properly.  Do not
turn it off with the case switch.

 Don’t eat or drinks while working.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 12 of 108
System Revision No.:
REY G. SOMBRERO
Self-Check 1.1.1

Directions:
Identify at least 10 Occupation health and Safety (OHS) policies and procedures in
CHS.

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.

Did the Trainee overall performance meet the


required evidence/standard? Yes No

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 13 of 108
System Revision No.:
REY G. SOMBRERO
ANSWER KEY 1.1-1
10 Occupation health and Safety (OHS) policies and procedures in CHS.

1. Disconnect the computer and peripherals from their electrical outlets.

2. Touch an unpainted metal surface on the computer chassis, such as the


metal around the card-slot openings at the back of your computer, before
touching anything inside your computer

3. Turn off the computer and all peripherals

4. Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.
5. Do not work on components that are plugged into their power source.

6. Do not remove expansion cards from a computer when it is turned on.

7. Remove all jewelry when working inside any computer related equipment.

8. Be sure not to mix electronic components and water.


9. When you shut down your computer, be sure to shut it down properly.  Do not
turn it off with the case switch.
10. Wear anti static materials.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 14 of 108
System Revision No.:
REY G. SOMBRERO
INFORMATION SHEET 1.1-2
Basic Terms, Concepts, Functions and Characteristics of
PC Hardware Components

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify the Basic
Terms, Concepts, Functions and Characteristics of PC Hardware Components

Types of Computer

Workstation

A workstation is a high-end personal computer designed for


technical or scientific applications. Intended primarily to be used
by one person at a time, they are commonly connected to a local
area network and run multi-user operating systems.

Desktop computer

Desktop computers come in a variety of styles ranging from


large vertical tower cases to small form factor models that can
be tucked behind an LCD monitor. In this sense, the term
'desktop' refers specifically to a horizontally-oriented case,
usually intended to have the display screen placed on top to
save space on the desk top. Most modern desktop computers
have separate screens and keyboards.
Single unit
Single unit PCs (also known as all-in-one PCs) are a subtype of desktop
computers, which combine the monitor and case of the computer within a single unit.
Nettop
A subtype of desktops, called nettops, was introduced by Intel in February
2008 to describe low-cost, lean-function, desktop computers.
Laptop

A laptop computer or simply laptop, also


called a notebook computer or sometimes a
notebook, is a small personal computer designed for
portability.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 15 of 108
System Revision No.:
REY G. SOMBRERO
Netbook

Netbooks (also called mini notebooks or subnotebooks) are a rapidly evolving


category of small, light and inexpensive laptop computers suited for general
computing and accessing web-based applications; they are often marketed as
"companion devices," that is, to augment a user's other computer access.

Tablet PC

A tablet PC is a notebook or slate-shaped mobile


computer, first introduced by Pen computing in the early 90s
with their PenGo Tablet Computer and popularized by
Microsoft. Its touchscreen or graphics tablet/screen hybrid
technology allows the user to operate the computer with a
stylus or digital pen, or a fingertip, instead of a keyboard or mouse.
Ultra-Mobile PC
The ultra-mobile PC (UMPC) is a specification for
a small form factor of tablet PCs. It was developed
as a joint development exercise by Microsoft,
Intel, and Samsung, among others. Current
UMPCs typically feature the Windows XP,
Windows Vista, Windows 7, or Linux operating
system and low-voltage Intel Atom or VIA C7-M
processors.

Home theater PC
A home theater PC (HTPC) is a convergence
device that combines the functions of a personal
computer and a digital video recorder. It is connected
to a television or a television-sized computer display
and is often used as a digital photo, music, video
player, TV receiver and digital video recorder.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 16 of 108
System Revision No.:
REY G. SOMBRERO
Pocket PC

A pocket PC is a hardware specification for a handheld-sized


computer (personal digital assistant) that runs the Microsoft Windows
Mobile operating system. It may have the capability to run an alternative
operating system like NetBSD or Linux. It has many of the capabilities of
modern desktop PCs.
HARDWARE

An exploded view of a modern personal computer and peripherals:

1. Scanner
2. CPU (Microprocessor)
3. Primary storage (RAM)
4. Expansion cards (graphics cards, etc.)
5. Power supply
6. Optical disc drive
7. Secondary storage (Hard disk)
8. Motherboard
9. Speakers
10. Monitor
11. System software
12. Application software
13. Keyboard
14. Mouse
15. External hard disk
16. Printer

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 17 of 108
System Revision No.:
REY G. SOMBRERO
Computer case

A computer case is the enclosure that contains


the main components of a computer. Cases are usually
constructed from steel or aluminium, although other
materials such as wood and plastic have been used.
Cases can come in many different sizes, or form
factors.
Processor

The central processing unit, or CPU, is that part of a


computer which executes software program instructions. In
older computers this circuitry was formerly on several printed
circuit boards, but in PCs is a single integrated circuit. Nearly all
PCs contain a type of CPU known as a microprocessor. with a
fan attached via heat sink.

Motherboard

The motherboard, also referred to as systemboard or


mainboard, is the primary circuit board within a personal computer.

Main memory

A PC's main memory is fast storage that is directly accessible by the CPU,
and is used to store the currently executing program and immediately needed data.

Hard disk

Mass storage devices store programs and


data even when the power is off; they do require
power to perform read and write functions during
usage. Although flash memory has dropped in cost,
the prevailing form of mass storage in personal
computers is still the hard disk.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 18 of 108
System Revision No.:
REY G. SOMBRERO
Video card

The video card - otherwise called a graphics card,


graphics adapter or video adapter - processes and renders
the graphics output from the computer to the computer
display, and is an essential part of the modern computer.
Visual display unit

A visual display unit (or monitor) is a piece of


electrical equipment, usually separate from the computer
case, which displays viewable images generated by a
computer without producing a permanent record.

Keyboard

In computing, a keyboard is an arrangement of buttons that each correspond


to a function, letter, or number. They are the primary devices of inputting text.
Mouse

A Mouse on a computer is a small, slidable device that


users hold and slide around to point at, click on, and
sometimes drag objects on screen in a graphical user
interface using a pointer on screen.

Other components

Mass storage
All computers require either fixed or removable storage for their operating
system, programs and user generated material.

Formerly the 5¼ inch and 3½ inch floppy drive were the principal forms of removable
storage for backup of user files and distribution of software.

Computer communications
 Internal modem card
 Modem
 Network adapter card
 Router

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 19 of 108
System Revision No.:
REY G. SOMBRERO
Common peripherals and adapter cards
 Headset
 Joystick
 Microphone
 Printer
 Scanner
 Sound adapter card as a separate card rather than located on the
motherboard
 Speakers
 Webcam

 LAN Card – is a network interface card. This is a


computer circuit board or card that is installed in a
computer so that it can be connected to a
network.
 Modem - (Modulator-Demodulator) The modem
is a device that allows a given computer to share
data or otherwise a device which let
computers exchange information
 USB – Universal Serial Bus, a hardware
interface for low-speed peripherals such as the
keyboard, mouse, joystick, scanner, printer and
telephony devices.
 Scanner- it is an input device that read text or
illustration printed on paper, translates the
information into a form that a computer can use.

 Printer - it is a piece of hardware that produces


a paper copy (also known as ‘hardcopy’) of the
information generated by the computer.

 RAM – Random Access Memory, is a primary memory. This memory is used


inside the computer to hold programs and data while it is running.

 BIOS – Basic Input/Output System, chip that controls the most basic functions
of the computer and performs a self-test every time you turn it on.

 Flash drive– RAM that can retain data without


electrical power. It is widely used for BIOS chips
and for digital camera and digital music storage.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 20 of 108
System Revision No.:
REY G. SOMBRERO
Self-Check 1.1-2

A. Multiple Choice
Direction: Choose the best answer of the given choices. Use a separate sheet of
paper in answering.

1. It is a high end personal computer designed for technical or scientific applications.


Intended primarily to be used by one person at a time, they are commonly connected to
a local area network and run multi-user operating systems.
A. Work Station
B. Nettop
C. Laptop
D. Tablet PC
2. It is a small personal computer designed for portability. Usually all of the interface
hardware needed to operate this computer, such as USB ports (previously parallel and
serial ports), graphics card, sound channel, etc., are built in to a single unit.
A. Work Station
B. Nettop
C. Laptop
D. Tablet PC
3. It is a convergence device that combines the functions of a personal computer and a
digital video recorder.
A. Work Station
B. Home theater PC
C. Laptop
D. Tablet PC
4. It is a hardware specification for a handheld-sized computer (personal digital assistant)
that runs the Microsoft Windows Mobile operating system.
A. Work Station
B. Home theater PC
C. Laptop
D. Pocket PC
5. It is also called mini notebooks or subnotebooks and are a rapidly evolving category of
small, light and inexpensive laptop computers suited for general computing and
accessing web-based applications
A. Netbook
B. Home theater PC
C. Work Station
D. Pocket PC
6. It is the enclosure that contains the main components of a computer.
A. Mother Board
B. Computer Case
C. Processor
D. Hard Disk

7. It is the part of a computer which executes software program instructions.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 21 of 108
System Revision No.:
REY G. SOMBRERO
A. Mother Board
B. CPU
C. Processor
D. Hard Disk
8. It is also referred to as system board or mainboard, and is the primary circuit board within
a personal computer.
A. Mother Board
B. CPU
C. Processor
D. Hard Disk
9. It processes and renders the graphics output from the computer to the computer display.
A. Memory
B. CPU
C. Video card
D. Hard Disk
10. It is a piece of electrical equipment, usually separate from the computer case, which
displays viewable images generated by a computer without producing a permanent
record.
A. Memory
B. CPU
C. Printer
D. Monitor

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 22 of 108
System Revision No.:
REY G. SOMBRERO
B. Identification

Directions: Identify the following computer components


Use a separate sheet of paper in answering.

1. 2.

3. 4.

5. 6.

7. 8.

9. 10.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 23 of 108
System Revision No.:
REY G. SOMBRERO
ANSWER KEY 1.1-2

A. MULTIPLE CHOICE
1. A 7. B
2. C 8. A
3. B 9. C
4. D 10. D
5. A
6. B

B. IDENTIFICATION
1. Monitor
2. Video card
3. Hard Disk
4. Memory/ RAM
5. Mother Board
6. Processor
7. Keyboard
8. Mouse
9. Printer
10. Scanner

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 24 of 108
System Revision No.:
REY G. SOMBRERO
INFORMATION SHEET 1.1-3
Personal Protective Equipment

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to be familiar and
use the Personal Protective Equipment properly.

Personal Protective Equipment


It refers to protective clothing, helmets, goggles, or other gear designed to
protect the wearer's body or clothing from injury by electrical hazards, heat,
chemicals, and infection, for job-related occupational safety and health purposes.
PPE can also be used to protect the working environment from pesticide
application, pollution or infection from the worker (for example in a microchip
factory).
Students even teacher during their laboratory period should require to use of
personal protective equipment. Some of these are:

 Goggles – A large spectacles, with


shields around the rims, for protecting
the eyes from dust, excessive light,
wind, etc.

 Rubber Sole – A special type of shoes


used to prevent electrical shock and for
waterproofing and insulating purposes.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 25 of 108
System Revision No.:
REY G. SOMBRERO
 Apron – A garment worn over the front
of the body as a protection for one’s
cloth.

 Dust Mask- A covering for the face to


prevent the inhaling or absorbing dust
and other chemicals

 Gloves - The covering material with a


separate sheath for each finger used
for hand protection.

Anti-Static and Safety Precautions


The little shock you experienced while you are walking across a carpeted floor
or touched a door knob, table, counter or even another person is a result of static
electricity. Static electricity is the discharge of electricity between two objects with
different electrical potential. Humans can't feel a static shock until it is several
thousand volts strong, but it takes less than 30 volts to fry a sensitive computer
component, such as a stick of RAM or a processor.
That's why computer technicians and home computer builders have to guard
their computers against the deadly ravages of static electricity, as well as take steps
to avoid injury to yourself
Safety and Anti-Static Rules
 When possible, try to avoid working in carpeted areas. Carpeting greatly
increases static buildup within your body.
 Always use an anti-static wrist strap when working on a computer (except
when working on monitors
 Always disconnect a computer from the AC power and from any powered
peripherals while you are working on it.
 Always grasp a metal part of the computer chassis with your bare hand before
you touch anything inside. Do this even if you are wearing an anti-static
wristband.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 26 of 108
System Revision No.:
REY G. SOMBRERO
 Always handle electronic components by a non-conducting (non-metallic)
edge. Don't touch the pins or other connectors.
 Never plug an ATX power supply into AC power unless it is connected either
to a computer's motherboard or to a dummy test load.
 Always use a UL-approved surge protector or an Uninterruptible Power
Supply that incorporates surge and spike protection.
 Never eat, drink, or smoke while working on a computer.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 27 of 108
System Revision No.:
REY G. SOMBRERO
Self-Check 1.1-3

Instruction: Match the following images to their names and uses.

Apron – A garment worn over


the front of the body as a
protection for one’s cloth

. Gloves - The covering


material with a separate sheath
for each finger used for hand
protection.

. Goggles – A large spectacles,


with shields around the rims,
for protecting the eyes from
dust, excessive light, wind, etc.

Rubber Sole – A special type


of shoes used to prevent
electrical shock and for
waterproofing and insulating
purposes

Dust Mask- A covering for the


face to prevent the inhaling or
absorbing dust and other
chemicals

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 28 of 108
System Revision No.:
REY G. SOMBRERO
Answer Key 1.1-3

Apron – A garment worn over


the front of the body as a
protection for one’s cloth

. Gloves - The covering


material with a separate sheath
for each finger used for hand
protection.

. Goggles – A large spectacles,


with shields around the rims,
for protecting the eyes from
dust, excessive light, wind, etc.

Rubber Sole – A special type


of shoes used to prevent
electrical shock and for
waterproofing and insulating
purposes

Dust Mask- A covering for the


face to prevent the inhaling or
absorbing dust and other
chemicals

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 29 of 108
System Revision No.:
REY G. SOMBRERO
ACTIVITY SHEET 1.1-3

PERSONAL PROTECTIVE EQUIPMENT (PPE)

Performance Objective:
https://www.youtube.com/watch?v=d2pc7ElcPNghttps://www.youtube.com/watch?
v=d2pc7ElcPNg

The will be divided into groups. Each group has their own respective leader.
The group will prepare a skit regarding personal protective equipment. After the
activity they will be assessed thru the given Performance Criteria Checklist below:

PERFORMANCE CHECKLIST

Did you…
Yes No

1. Clearly identified personal protective equipment.

1. Utilized actual tools/device in performing the skit.

3. Applied safety precautions during the play.

4. Gave more critical thinking on the personal protective equipment.

1. Cooperatively performed the play.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 30 of 108
System Revision No.:
REY G. SOMBRERO
INFORMATION SHEET 1.1-4
Computer Hardware

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to familiarize Computer
hardware and enumerate its functions and uses.

HARDWARE Refers to the tangible (things you can touch) components of a


computer system. Hardware components are further divided into three groups
namely
 Input Devices
 Output devices
 System Unit

INPUT DEVICES. Performs the two most basic computing tasks: issuing
commands and entering data. Common input devices are the following:
- Keyboard – is a standard input device of most computers

MOUSE

KEYBOARD

- Mouse – is a hand- clicked device used


for pointing. The modern mouse uses a ball for movement and has two to
three buttons.
- Trackball – is like a stationary, upside down mouse.
- Joystick – is an input device which is commonly used for computer
games

JOYSTICK
LIGHT PEN

- Light pen – a device used to draw, write, or issue commands when it touches a
specially designed screen.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 31 of 108
System Revision No.:
REY G. SOMBRERO
OUTPUT DEVICES. After processing the data fed into computer with the use of
input devices, the information must now be outputted in a form understood by
human beings. Output devices are classified according to the output they can
produce. An output which you can hold in your hand is called hard copy. Output
types such as audio and video are referred to as soft copy. The following are
output devices used.

- Printer - - an output device that produces text and graphics on paper

NON-IMPACT PRINTER IMPACT PRINTER

- Video Monitors – The monitor, or display is used to provide soft copy


output. Video monitors are either monochrome or colored

VIDEO
MONITOR

SPEAKERS

 Speakers- play sounds transmitted as electrical signals from the sound card.

 Modem – a device that sends and receives data over telephone lines to and
from computers.

Modem

THE SYSTEM UNIT. The system unit is the part of the computer which is
responsible for accepting and processing the data brought in by the input
devices. It also responsible for passing the resulting information to the users via
the output devices.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 32 of 108
System Revision No.:
REY G. SOMBRERO
 The Main Circuit Board - Also called the "system board," is
the main printed circuit board in an electronic device, which
contains sockets that accept additional boards. In a personal
computer, the motherboard contains the bus, CPU and
coprocessor sockets, memory sockets, keyboard controller
and supporting chips.
MAIN CIRCUIT
BOARD
 Port – is a connection from the main circuit board to a peripheral device such
as a keyboard, a printer or a video monitor. The port is also called an
interface. Ports are arranged at the rear of the main circuit board.

 Expansion Slot – is a receptacle inside a computer or other electronic


system that accepts printed circuit boards.

 The Bus. is responsible for transporting electronic signals from place to place
or specific predefined routes.
 The CPU – The CPU is the computer’s processor, controller and storage
device
 Case and Power Supply – is also known as the system unit, the case or
system cabinet is the box that houses the processor chip (CPU), the memory
chips, and the motherboard with power supply, as drive, and CD-ROM or
DVD drive. It include a power supply unit and a fan to keep the circuitry free
from overheating.

POWER SUPPLY

 Clock – it synchronizes the operation of all parts of the PC, and provides the
basic timing signal for the CPU.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 33 of 108
System Revision No.:
REY G. SOMBRERO
 Memory – The memory in a computer system is of two fundamental types:
The main memory and the secondary memory.

Memory cards

 RAM-(Random Access Memory) is a group of memory chips, typically of the


dynamic RAM (DRAM) type, which function as the computer's primary
workspace. The "random" in RAM means that the contents of each byte of
storage in the chip can be directly accessed without regard to the bytes before
or after it.

 BIOS – The BIOS (Basic Input / Output System) is a ROM chip that
provide.

 CMOS – stores the configuration of the PC (example the password, disk type,
amount of memory installed, current time and data). CMOS stands for
Complimentary Metal-Oxide Semiconductor.

 Secondary Memory – Secondary memory is where programs and data are


kept for a long term basis. Common secondary storage devices are the
floppy disk and hard disk, Compact disk or CD.

 FLOPPY DISK – (or diskette) is as flimsy as a sheet of paper but is protected


by a sturdy, square jacket that encases it. It has a low capacity, and is very,
very slow compared to other storage devices.

FLOPPY DISK

PROCESSOR CHIP FLOPPY DRIVE

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 34 of 108
System Revision No.:
REY G. SOMBRERO
 HARD-DISK DRIVE – A hard-disk drive is a storage device that store billons
of characters of data on a nonremoveable disk platter.

HARD- DISK DRIVE CD-ROM/DVD Drive

 CD-ROM/DVD DRIVE – A CD (computer disk) drive, or its more recent


variant, a DVD (digital video disk, is a storage device that use laser
technology to read data from optical disks.

 VIDEO CARD – is a board that is plugged into a period computer to give it


display capabilities. It connects the processor’s output information into a
video signal that can be sent through a cable to the monitor.

VIDEO CARD SOUND CARD

 SOUND CARD - enhances the computers sound generating capabilities by


allowing sound to be output through speakers.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 35 of 108
System Revision No.:
REY G. SOMBRERO
 MODEM – A modem is a device that sends and receives data over telephone
lines to and from computers.

MODEM
IDE CABLE / FLOPPY CABLES

 POWER CABLES – it supplies power from the power supply to the drive. The power
cables are red, yellow and black. The yellow wire furnishes 12 volts of power, the
red wire furnishes 5 volts of power, the two black wire are ground wire for each.

 IDE AND FLOPPY DISK RIBBON CABLE – IDE stands for Integrate Device
Electronics. It shows how to connect an IDE cable to two devices namely the top
device (master) and the bottom device (slave).

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 36 of 108
System Revision No.:
REY G. SOMBRERO
SELF-CHECK 1.1-4
A. Identification. Label the following peripheral devices and give their functions.
Use a separate sheet of paper in answering.

1.

2.

3.

4.

5.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 37 of 108
System Revision No.:
REY G. SOMBRERO
B. TRUE OR FALSE. Write True if the statement is correct and False if it is
wrong.

1. The main memory is a software component.

2. Processing is the manipulation by which a computer transforms data into

information.

3. The operating system is the part of the system software.

4. Input devices include the keyboard and the mouse.

5. Main memory is where programs and data are kept on along term basis.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 38 of 108
System Revision No.:
REY G. SOMBRERO
ANSWER KEY 1.1-4

1. Modem - allows a given computer to share data or otherwise a device which let
computers exchange information
2. Mouse – It is used for pointing and also to easily access other commands
3. Keyboard – It is primarily used in entering and editing data
4. Speaker – It play sounds transmitted as electrical signals from the sound card.
5. Monitor – It displays activity inside the computer

B.True or False
1. False
2. True
3. True
4. True
5. False

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 39 of 108
System Revision No.:
REY G. SOMBRERO
Information sheet 1.1-5

Disassembling & Assembling Computer System


Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able disassemble and
assemble computer system.

Introduction
 Computer assembly is a large part of a technician's job.
 Work in a logical, methodical manner when working with computer
components
 Improve computer assembly skills dramatically with practice

Open the Case


 Prepare the workspace before opening the computer case:
- Adequate lighting
- Good ventilation
- Comfortable room temperature
- Workbench accessible from all sides
- Avoid cluttering workbench
- An antistatic mat on the table
- Small containers to hold screws and other small parts
 There are different methods for opening cases. To learn how, consult the user
manual or manufacturer's website.

Install the Power Supply


Power supply installation steps include the following:
1. Insert the power supply into the case
2. Align the holes in the power supply with the holes in the case
3. Secure the power supply to the case using the proper screws

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 40 of 108
System Revision No.:
REY G. SOMBRERO
Attach Components to the Motherboard
 As part of an upgrade or repair, a technician may
need to attach components to the motherboard,
and then install the motherboard.

CPU on Motherboard
 The CPU and motherboard are sensitive to
electrostatic discharge so use a grounded
antistatic mat and wear an antistatic wrist strap.
CAUTION: When handling a CPU, do not touch
the CPU contacts.
 The CPU is secured to the socket on the
motherboard with a locking assembly.

Thermal Compound

 Thermal compound helps to keep the CPU cool.


 To install a used CPU, clean it and the base of
the heat sink with isopropyl alcohol to remove
the old thermal compound.
 Follow manufacturer’s recommendations about
applying the thermal compound.

Heat Sink/Fan Assembly

 The Heat Sink/Fan Assembly is a two-part cooling


device.
 The heat sink draws heat away from the CPU.
 The fan moves the heat away from the heat sink.
 The heat sink/fan assembly usually has a 3-pin
power connector.

Install CPU and Heat Sink/Fan Assembly

1. Align the CPU so that the Connection 1 indicator is lined up with Pin 1 on the
CPU socket.
2. Place the CPU gently into the socket.
3. Close the CPU load plate and secure it by closing the load lever and moving it
under the load lever retention tab.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 41 of 108
System Revision No.:
REY G. SOMBRERO
4. Apply a small amount of thermal compound to the CPU and spread it evenly.
Follow the application instructions provided by the manufacturer.
5. Line up the heat sink/fan assembly retainers to the holes on the motherboard.
6. Place the heat sink/fan assembly onto the CPU socket, being careful not to
pinch the CPU fan wires.
7. Tighten the heat sink/fan assembly retainers to secure the assembly in place.
8. Connect the heat sink/fan assembly power cable to the header on the
motherboard.

Install RAM

 RAM provides temporary data storage for the


CPU while the computer is operating.
 RAM should be installed in the motherboard
before the motherboard is placed in the
computer case.
 RAM installation steps:
1. Align the notches on the RAM module
to the keys in the slot and press down
until the side tabs click into place.
2. Make sure that the side tabs have locked the RAM module and visually
check for exposed contacts.

The Motherboard

 The motherboard is now ready to install in the computer case.


 Plastic and metal standoffs are used to mount the motherboard and to prevent
it from touching the metal portions of the case.
 Install only the standoffs that align with the holes in the motherboard.
 Installing any additional standoffs may prevent the motherboard from being
seated properly in the computer case.

Install Motherboard

1. Install standoffs in the computer case.


2. Align the I/O connectors on the back of the
motherboard with the openings in the back of the
case.
3. Align the screw holes of the motherboard with the
standoffs.
4. Insert all of the motherboard screws.
5. Tighten all of the motherboard screws.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 42 of 108
System Revision No.:
REY G. SOMBRERO
Install Internal Drives

 Drives that are installed in internal bays are called


internal drives.
 A hard disk drive (HDD) is an example of an internal
drive.
 HDD installation steps:
1. Position the HDD so that it aligns with the 3.5-inch
drive bay.
2. Insert the HDD into the drive bay so that the screw
holes in the drive line up with the screw holes in the case.
3. Secure the HDD to the case using the proper screws.

Install Drives in External Bays

 Drives, such as optical drives (CD and DVD) and floppy


drives, are installed in drive bays that are accessed from the
front of the case.
 Optical drives and floppy drives store data on removable
media.
 Drives in external bays allow access to the media without
opening the case.

Install Optical Drive

 An optical drive is a storage device that reads and writes information to CDs or
DVDs.
 Optical drive installation steps:
1. Position the optical drive to align with the 5.25 inch drive bay.
2. Insert the optical drive into the drive bay so that the optical drive screw
holes align with the screw holes in the case.
3. Secure the optical drive to the case using the proper screws.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 43 of 108
System Revision No.:
REY G. SOMBRERO
Install Floppy Drive

 A floppy disk drive (FDD) is a storage device that reads and writes information
to a floppy disk.
 FDD installation steps:
1. Position the FDD so that it aligns with the 3.5 inch drive bay.
2. Insert the FDD into the drive bay so that the FDD screw holes align
with the screw holes in the case.
3. Secure the FDD to the case using the proper screws.

Install Adapter Cards

 Adapter cards are installed to add functionality to a


computer.
 Adapter cards must be compatible with the expansion slot.
 Some adapter cards:
1. PCIe x1 NIC
2. PCI Wireless NIC
 PCIe x16 video
adapter card

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 44 of 108
System Revision No.:
REY G. SOMBRERO
Install the Network Interface Card (NIC)

 A NIC enables a computer to connect to a network.


 NICs use PCI and PCIe expansion slots on the motherboard.
 NIC installation steps:
1. Align the NIC to the appropriate slot on the
motherboard.
2. Press down gently on the NIC until the card
is seated.
3. Secure the NIC PC mounting bracket to the
case with the appropriate screw.

Install the Wireless NIC


A wireless NIC enables a computer
to connect to a wireless network.
 Some wireless NICs are installed
externally with a USB connector.
 Wireless NIC installation steps:
1. Align the wireless NIC to the appropriate
expansion slot on
the motherboard.
2. Press down gently on the wireless NIC until the card is
fully seated.
3. Secure the mounting bracket to the case with the appropriate
screw.
Install the Video Adapter Card

 A video adapter card is the interface between a computer and a display


 An upgraded video adapter card can provide better
graphic capabilities for games and graphic
programs.
 Video adapter card installation steps:
1. Align the video adapter card to the
appropriate expansion slot on the
motherboard.
2. Press down gently on the video
adapter card until the card is fully
seated.
3. Secure the video adapter card
PC mounting bracket to the case
with the appropriate screw.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 45 of 108
System Revision No.:
REY G. SOMBRERO
Connect Internal Cables

 Power cables are used to distribute


electricity from the power supply to the
motherboard and other components.
 Data cables transmit data between the
motherboard and storage devices, such as
hard drives.
 Additional cables connect the buttons and
link lights on the front of the computer
case to the motherboard.

Connect Power Cables

Motherboard Power Connections


 The Advanced Technology Extended (ATX) main power connector has either
20 or 24 pins.
 The power supply may also have a 4-pin or 6-pin Auxiliary
(AUX) power connector that connects to the motherboard.
 A 20-pin connector will work in a motherboard with a 24-pin
socket.

Connect Power Cables

 ATA Power Connectors use a 15-pin connector to connect


to hard disk drives, optical drives, or any devices that have
a SATA power socket.
 Molex Power Connectors are used by hard disk drives and
optical drives that do not have SATA power sockets.
 CAUTION: Do not use a Molex connector and a SATA power
connector on the same drive at the same time.
 4-pin Berg Power Connector supplies power to a floppy drive.

Power Connector Installation Steps

1.
Plug the SATA power connector into the HDD.
2.
Plug the Molex power connector into the optical drive.
3.
Plug the 4-pin Berg power connector into the FDD.
4.
Connect the 3-pin fan power connector into the appropriate fan header
on the motherboard, according to the motherboard manual.
5. Plug the additional cables from the case into the appropriate
connectors according to the motherboard manual.
PATA Cables

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 46 of 108
System Revision No.:
REY G. SOMBRERO
 Drives connect to the motherboard using data cables.
 Types of data cables are PATA, SATA, and
floppy disk.
 The PATA cable (sometimes called a ribbon
cable) is wide and flat and can have either 40
or 80 conductors.
 A PATA cable usually has three 40-pin connectors.
 If multiple hard drives are installed, the master drive will connect to the end
connector. The slave drive will connect to the middle connector.
 Many motherboards have two PATA cable sockets, which provides support
for a maximum of four PATA drives.

SATA Cables

 The SATA data cable has a 7-pin connector.


 One end of the cable is connected to the motherboard.
 The other end is connected to any drive that has a SATA data connector.

 Floppy Drive Cables


 The floppy drive data cable has a 34-pin connector and it has a stripe to
denote the location of pin 1.
 One connector at the end of the cable connects to the motherboard. The other
two connectors connect to drives.
 If multiple floppy drives are installed, the A: drive will connect to the end
connector. The B: drive will connect to the middle connector.
 Motherboards have one floppy drive controller which provides support for a
maximum of two floppy drives.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 47 of 108
System Revision No.:
REY G. SOMBRERO
Install Data Cables

1. Plug the motherboard end of the PATA cable into the motherboard socket.
2. Plug the connector at the far end of the PATA cable into the optical drive.
3. Plug one end of the SATA cable into the motherboard socket.
4. Plug the other end of the SATA cable into the HDD.
5. Plug the motherboard end of the FDD cable into the motherboard socket.
6. Plug the connector at the far end of the FDD cable into the floppy drive.

Re-attach Panels, Connect External Cables

 Now that all the internal components


have been installed and connected to
the motherboard and power supply, the
side panels are re-attached to the
computer case.
 The next step is to connect the cables
for all computer peripherals and the
power cable.

Re-attach Side Panels

 Most computer cases have two panels, one on each side.


 Once the cover is in place, make sure that it is secured at all screw locations.
 Refer to the documentation or manufacturer’s website if you are unsure about
how to remove or replace your computer case.
CAUTION: Handle case parts with care. Some computer case covers have sharp or
jagged edges.

Connect External Cables

 After the case panels have been re-attached, connect the


external cables to the back of the computer.
 External cable connections include:
 Monitor USB
 Keyboard Power
 Mouse Ethernet

CAUTION: When attaching cables, never force a connection.

NOTE: Plug in the power cable after you have connected all
other cables.

Connect External Cables

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 48 of 108
System Revision No.:
REY G. SOMBRERO
1. Attach the monitor cable to the video port.
2. Secure the cable by tightening the screws on the connector.
3. Plug the keyboard cable into the PS/2 keyboard port.
4. Plug the mouse cable into the PS/2 mouse port.
5. Plug the USB cable into a USB port.
6. Plug the network cable into the network port.
7. Connect the wireless antenna to the antenna connector.
8. Plug the power cable into the power supply.

Boot Computer for the First Time

 The BIOS is a set of instructions stored in a nonvolatile memory chip.


 When the computer is booted, the basic input/output system (BIOS) will
perform a power-on self test (POST) to check on all of the internal
components.

 A special key or combination of keys on the keyboard is used to enter the


BIOS setup program.
 The BIOS setup program displays information about all of the components in
the computer.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 49 of 108
System Revision No.:
REY G. SOMBRERO
Identify Beep Codes

 POST checks to see that all of the hardware in the computer is operating
correctly.
 If a device is malfunctioning, an error or a beep code alerts the technician that
there is a problem.
 Typically, a single beep denotes that the computer is functioning properly.
 If there is a hardware problem, the computer may emit a series of beeps.
 Each BIOS manufacturer uses different codes to indicate hardware problems.
 Consult the motherboard documentation to view beep codes for your
computer.

BIOS Setup

 The BIOS contains a setup program used to configure settings for hardware
devices.
 The configuration data is saved to a special memory chip called a
complementary metal-oxide semiconductor (CMOS).
 CMOS is maintained by the battery in the computer.
 If this battery dies, all BIOS setup configuration data will be lost.
 Replace the battery and reconfigure the BIOS settings.

BIOS Setup Program


BIOS settings are configured in the BIOS setup program.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 50 of 108
System Revision No.:
REY G. SOMBRERO
Self-Checked 1.1-5

Match the PC Components to its proper location in the motherboard.

1
4

2
5

A
B C

D
E

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 51 of 108
System Revision No.:
REY G. SOMBRERO
Answer Key 1.1.5

1. C
2. B
3. E
4. D
5. A

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 52 of 108
System Revision No.:
REY G. SOMBRERO
JOB SHEET 1.1-5

Title : PC Disassembly and Assembly


Performance Objective : Given personal computer you are going to disassemble & assemble
the unit within 30 minutes.
Supplies, Tools and Materials:
 A small Phillips (star) screw driver and a small flat blade screw driver).
 Bond paper
 Anti-static wrest band
 Pliers
 Anti-static mat

Equipment : A working PC.

Steps/ Procedure:
1. Confirm that the hardware works...
- Does your video monitor work?
Does your PC boot?
Do your floppy drive and CD/DVD drive work?
Does the hard drive work?
Do the keyboard and mouse functioning?

2. Turn OFF the system.


NOTE : read this in its entirety before you begin

1. Discharge yourself of all static electricity by touching the PC’s chassis (or the ground screw on
the receptacle.)
2. Safety NOTE!! Beware of sharp edges!!! The cheaper chassis have very sharp edges that can
cut you easily. Be very careful and take your time. Remember, SAFETY FIRST.
3. As you remove each board and disk drive, document the information listed in the attached
Specifications document (note some parts of the spec sheets wont apply to this lab).

3. Disassemble the Unit

Remove the External I/O Systems:


1. Unplug all power cords, from the commercial outlet
2. Remove all peripherals from the system unit.
3. Disconnect the keyboard from the rear of the unit.
4. Disconnect the monitor power cable.
5. Disconnect the monitor signal cable (video cable) from the video adapter card.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 53 of 108
System Revision No.:
REY G. SOMBRERO
Do the following for each card and drive removed:
 Before removing a card, document any cables that are attached to the card, noting where
they go and their orientation.
 Store screws properly.
 Note the position of the color strip (pin no. 1) on the cables and make a mark for the pin
no.1 if needed on the I/O card or Motherboard and on the Floppy and the hard drive.

Remove the Storage Devices in the System Unit:


1. Remove the floppy drive.
2. Remove the hard drive.

Remove the Interface Cards (Adapter Cards):


1. Remove the video card from the expansion slot.
2. Remove other interface cards if exists.

 Draw a picture of the card. The drawing should accurately show-->


 the shape of the board,
 the connectors on the board, including the card edge connector,
 the number of pins on connectors,
 All jumpers and the jumper settings.
 Label the board with any identification that appears on the card (chip sets or
manufacturer stamps, BIOS stamps, etc...).

4. Assemble the PC
- To assemble the PC, reverse the procedure above or follow the procedures in the
information sheet “Disassembling & Assembling PC.

Assessment Method:

Demonstration, Performance Criteria checklist

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 54 of 108
System Revision No.:
REY G. SOMBRERO
Performance Criteria Checklist

CRITERIA Yes No
Did you…
Followed Safety procedures

Checked Hardware functionality

Observed safety used of tools and equipment in accordance with the

manufacturer’s instruction

Checked PPE condition in accordance with the manufacturer’s

instruction

Disassembled the unit properly

Removed the external I/O system

Removed the storage devices in the system

Removed interface cards

Followed the correct procedures in Assembling the PC

Booted the PC normally

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Installing Computer
Page 55 of 108
System Revision No.:
REY G. SOMBRERO
LEARNING
PREPARE INSTALLER
OUTCOME #2
CONTENTS:
 Creating and preparing portable bootable devices
 Installers preparation and OS installation procedures
Application and devices/drivers installation procedures

ASSESSMENT CRITERIA:
1. Portable bootable devices are created in accordance with software
manufacturer instruction
2. Customized installers are prepared in accordance with software
utilization guide and end user agreement.
3. Installation of portable applications are carried out in accordance with
software user guide and software license

CONDITION:
Trainees must be provided with the following:

 Protective eyewear
 Digital multi-meter
 Wire stripper with bolt cutter
 Pliers (assorted)
 Screw drivers (assorted)
 Soldering iron
 Desoldering tool
 Allen wrench (0.05 – 0.25 inch)
 Flashlight
 IC insertion/extraction tool
 Mirror (inspection)
 RS 232 pin insertion/ extraction tool
 Sharp pointed tweezers
 Antistatic wrist wrap
 LAN Tester
 Crimping tools

EVALUATION METHOD:
 Written Examination
 Practical Examination
 Demonstration
LEARNING OUTCOME SUMMARY
Learning Experiences

Learning Outcome 2: PREPARE INSTALLER

Learning Activities Special Instructions

1. Read information sheet 2.1-1 If you have some problem on the content of the
information sheet don’t hesitate to approach your
DIFFERENT TYPE OF BOOT DEVICE facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
answer self-check provided in the module.
2. Answer Self Check 2.1-1 Compare your answer to the answer key 2.1-1. If
you got 100% correct answer in this self-check,
you can now move & do the Activity Sheet. If not
review the information sheet and go over the
self-check again.
INFORMATION SHEET 2.1-1
DIFFERENT TYPE OF BOOTABLE DEVICES

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to be familiar with the
different type of Bootable devices, creating bootable device with different operating
system.

A boot device is any piece of hardware that can read or contains the files
required for a computer to start. For example, a hard drive, floppy disk drive, CD-
ROM drive, DVD drive, and USB jump drive are all considered bootable devices.
However, unless the necessary boot files are stored on the drive, diskette, or
disc, the computer will not be able to boot from that device.
The most commonly used boot device or boot drive is the hard drive. When
an operating system, such as Microsoft Windows, is installed onto the hard drive, it
copies the boot files and drivers required to load Windows onto the computer. When
installing a new operating system, troubleshooting the computer, or booting from
another drive, such as the CD-ROM drive, a bootable disc or setup disc is inserted into
the drive. If the boot sequence is setup correctly in CMOS setup and the bootable disc
is in the computer, it will load from the disc instead of the hard drive.

A hard disk drive (sometimes abbreviated as hard drive, HD, or HDD) is a non-


volatile memory hardware device that permanently stores and
retrieves data on a computer. A hard drive is a secondary
storage device that consists of one or more platters to which
data is written using a magnetic head, all inside of an air-
sealed casing. Internal hard disks reside in a drive bay,
connect to the motherboard using an ATA, SCSI,
or SATA cable, and are powered by a connection to
the PSU (power supply unit).
A floppy disk, also known as a floppy, diskette, or
simply disk, is a type of disk storage composed of a
disk of thin and flexible magnetic storage medium,
sealed in a rectangular plastic enclosure lined with
fabric that removes dust particles. Floppy disks are
read and written by a floppy disk drive.

An Optical disc drive is a disc drive that uses laser light or


electromagnetic waves within or near the visible light
spectrum as part of the process of reading or writing data to
or from optical discs

A USB flash drive, also known as a thumb drive, pen


drive, gig stick, flash stick, jump drive, disk key, disk on
key, flash-drive, memory stick, USB key, USB stick or
USB memory, is a data storage device that includes
flash memory with an integrated USB interface.

Make a bootable USB drive

In the past, Microsoft Windows was installed by disc, CD- or DVD-ROM, or the floppy
disc – and optical data carriers are also gradually disappearing from the scene. Instead,
the operating system is either preinstalled on the system partition of a new computer or
laptop, or you acquire Windows directly online, complete with a digital license, and
download it yourself.

But if you need an external installation medium, many people nowadays use a bootable
USB drive. It’s quicker and more compact that an optical data carrier, and so is perfectly
suited for setting up (or resetting) a system – there are also many other possible uses.
Why do you need a bootable USB?

There are lots of uses for a bootable USB drive. The most important is, of
course, booting the PC if it will no longer start itself because of a virus, serious system
failure, defective hard drive, or partition problems. The small piece of hardware is the
standard solution for hosting an entire operating system and/or a recovery system like
the multi-virus scanner Sardu and using it to successfully reboot and repair the
computer.

How can you make a bootable USB drive?

Hardly any commercial USB drives are suitable from the outset for these diverse tasks.
This is because most models are only loaded with a single file system when you first get
them, for example, an FAT32 or exFAT file system. They’re missing the “master boot
record” (MBR) that’s absolutely necessary for booting most PCs (specifically those with
a “basic input/output system” (BIOS)). You have to make a new USB stick bootable on
your own.
 Fact
BIOS (basic input/output system) is a program that is preinstalled on the mainboard of
most computers and activates the hardware when the system boots so that the
operating system can communicate and interact with it.
A bootable USB drive can of course be created on a different computer than the one
you want to use it on later. There are basically two possible methods: either manually or
using automated tools. The first option seems a bit complicated at first glance, and
because of the various manual steps is slightly more error-prone, but it’s still doable
even if you’re not an expert.

Regardless of which option you choose, you always need the following things:

1. The Windows utility program DiskPart or an external tool with the same functions.
2. A USB drive with at least 4GB of storage (for a 32-bit operating system) or at
least 8GB (for a 64-bit system). To obtain a high working speed (or enable the
creation of a portable operating system), the selected drive should support the
standard USB 3.0. If the drive is already being used, make sure that it doesn’t
contain any important or indispensable data.
3. An ISO file for the desired operating system that contains all setup files that you
need for installation. These files used to be found on a CD- or DVD-ROM, which
came with a new computer or could be acquired separately. Today, Windows is
generally preinstalled on a system partition of a matching PC or laptop. You
can create such an ISO file yourself, though, for example with the use of tools
like WinISO, UltraISO, or the burn program InfraRecorder. But it’s simpler to
just download the required operating system from the internet. In the case of
Windows 10, this can be done completely legally via the media creation tool from
Microsoft. Downloading directly from the company’s website is also possible
for Windows 7 and Windows 8, for example.
Make a bootable USB drive with the Windows utility program DiskPart

If you dare to do the necessary work by hand, you can simply use the cmd.exe application, better
known as “Command Prompt”, to create a bootable USB drive on all operating systems from
Windows Vista (including Windows 10). This goes as follows:

 Plug the USB drive into your computer’s USB port.

 Search for the “cmd” application in the Windows start menu, right-click on the item, and
select “Run as administrator” from the context menu. This opens a small window with white
text on a black background.

 Type the command “diskpart” and confirm your input with the enter key (you’ll also do this
after every other entered command). This starts the storage device manager.

 Enter the command “list disk” to display all available storage devices.

 You can recognize your USB by its storage capacity, and it’s usually listed as “disk 1”. In the
system partition, “disk 0” is usually your PC, so a hard drive or solid state drive in your
computer.

 Based on the assumption that your USB has the label “disk 1”, enter the command “sel disk
1” to select it (or the corresponding “disk 2”, etc.).

 Enter then command “clean” to delete all files from the USB.

 Enter the command “create partition primary” to create a main partition.

 Enter the command “list par” and select the newly created main partition with “sel par 1”.

 Activate the partition with the command “active”.

 Format the USB with the command “format fs=FAT32 label=“WINDOWSUSB” quick
override” (in place of “WINDOWS USB” you can also choose another label, so long as it
doesn’t contain any spaces or special characters. The drive will later be displayed under this
name if you plug into a running Windows computer). Formatting may take a while. You can
track its progress in the percentage bar.

 As soon as the process is finished, enter the command “assign” to automatically assign a
drive letter (for example “G:”) to your USB.

 Enter “exit” to close DiskPart, and then “exit” again to close the command prompt.
To start the “Command Prompt” on your PC, simply enter “cmd” in the Windows search bar.

Don’t forget to right-click to run the application as an administrator

To finish the process, you just have to copy the Windows ISO file to a bootable USB

stick. This is done with a basic drag-and-drop. If you’re using an installation disc, you
can also drag all setup files from there onto your drive (use the folder options to display
all of the hidden files first). That’s all possible in the command prompt as well. For a
source media with the drive letter “D:” and a USB drive with the letter “G:”, the
corresponding command would look as follows: “xcopy D:\*.* G:\*.* /S /E /F” (all of the
spaces are intentional).
Create Bootable USB with Rufus

Rufus is widely considered to be the fastest and most reliable tool for the creation of a bootable
USB. It also supports UEFI (“Unified Extensible Firmware Interface”), a new mainboard firmware
that replaced the old BIOS and can already be found on almost all newer computers. From Windows
8, it’s also possible to install “Windows2Go” as a portable operating system on an external
storage device with Rufus.

Operation of the tool is simple:

 Open the program with a double-click

 Select your USB drive in “Device”

 Select “Create a bootable disk using” and the option “ISO Image”

 Right-click on the CD-ROM symbol and select the ISO file

 Under “New volume label”, you can enter whatever name you like for your USB drive

 You’ll receive the warning “ALL DATA ON THIS DEVICE WILL BE DESTROYED”, which
you can confidently confirm with “OK”– at this point, you’ve ideally already saved any
important files from the USB drive

 Click on “Start”

 As soon as the green bar is full, click


on “Finish”

 Eject your bootable USB drive with


“Safely eject hardware”
LEARNING INSTALL OPERATING SYSTEM AND DRIVERS FOR
OUTCOME 3 PERIPHERALS/ DEVICES
CONTENTS:
1. Installed operating system and drivers for peripherals/devices
2. Computer operating systems
 Windows / MAC OS X /Linux
3. Installing and configuring Peripheral/Devices drivers

ASSESSMENT CRITERIA:
1. Operating system (OS) is installed in accordance with established
installation procedures and to comply with end-user requirements
2. Peripherals/devices drivers are installed and configured in accordance
with manufacturer’s instructions and/or OS installation procedures.
3. OS and drivers updates/patches are accessed and installed in
accordance with manufacturer’s recommendations and requirements
4. On-going checks of the quality of the work are undertaken in
accordance with established procedures

CONDITION:
Trainees must be provided with the following:
 Windows
 MAC OS X
 Linux
 Printer
 Scanner
 Interface cards
 TV tuner
 video card
 sound card
EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration
Learning Experiences

Learning Outcome 3: INSTALL OPERATING SYSTEM AND DRIVERS FOR


PERIPHERALS/ DEVICES

Learning Activities Special Instructions


1. Read information sheet 3.1-1 If you have some problem on the content
“Introduction to Computer Operating of the information sheet don’t hesitate to
System” approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can answer self-
check provided in the module.
2. Answer Self Check 3.1-1 Compare your answer to the answer key
3.1-1. If you got 100% correct answer in
this self-check, you can now move & do
the Activity Sheet. If not review the
information sheet and go over the self-
check again.
INFORMATION SHEET 3.1-1
Introduction to Computer Operating System

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to be familiar with the
different operating systems, navigate on the different OS components and install
Operating system and device drivers.

Operating System (Os)


 is a software that manages computer resources and provides
programmers/users with an interface used to access those resources.

 is a layer of software which takes care of technical aspects of a computer's


operation. It shields the user of the machine from the low-level details of the
machine's operation and provides frequently needed facilities.

Below is a listing of common operating systems available today, and who developed them.
Operating system Developer Operating system Developer
Corel Linux Corel MS-DOS 5.x Microsoft
Linux Linux Torvalds MS-DOS 6.x Microsoft
MAC OS 8 Apple Windows 2000 Microsoft
MAC OS 9 Apple Windows 2003 Microsoft
MAC OS 10 Apple Windows 95 Microsoft
MAC OS X Apple Windows 98 Microsoft
Mandrake Linux Mandrake Windows CE Microsoft
MS-DOS 1.x Microsoft Windows ME Microsoft
MS-DOS 2.x Microsoft Windows NT Microsoft
MS-DOS 3.x Microsoft Windows Vista Microsoft
MS-DOS 4.x Microsoft Windows XP Microsoft

The Purpose of an Operating System

The operating system (OS) controls almost all functions on a


computer.
Roles of an Operating System
 All computers rely on an operating system (OS) to provide
the interface for interaction between users, applications,
and hardware.
 The operating system boots the computer and manages
the file system.
 Almost all modern operating systems can support more
than one user, task, or CPU.
 The operating system has four main roles:
 Control hardware access
 Manage files and folders
 Provide user interface
 Manage applications
Characteristics of Operating Systems
 Control hardware access
 OS automatically discovers and configures PnP hardware
 File and folder management
 User interface
 Command line interface (CLI)
 Graphical user interface (GUI)
 Application management
 Open Graphics Library (OpenGL)
 DirectX

The Types of Operating Systems


 Command Line Interface (CLI): The user types
commands at a prompt.

 Graphical User Interface (GUI): The user interacts


with menus and icons.

Most operating systems include both a GUI and a CLI.

Compare Operating Systems

Terms often used when comparing operating systems:


 Multi-user – Two or more users can work with programs and share peripheral
devices, such as printers, at the same time.
 Multi-tasking – The computer is capable of operating multiple applications at the
same time.
 Multi-processing – The computer can have two or more central processing units
(CPUs) that programs share.
 Multi-threading – A program can be broken into smaller parts that can be
loaded as needed by the operating system. Multi-threading allows individual
programs to be multi-tasked.

Real Mode
 Executes only one program at a time
 Addresses only 1 MB of system memory at a time
 Directly accesses memory and hardware
 Subject to crashes
 Available to all modern processors
 Only used by DOS and DOS applications
Protected Mode
 Has access to all memory
 Can manage multiple programs simultaneously
 Allows the system to use virtual memory
 Provides 32-bit access to memory, drivers, and I/O transfers
 Each program is assigned a space in memory
 Computer is protected from program errors

Virtual Real Mode


 Allows a real-mode application to run within a protected-mode operating system
 Creates virtual machines for each program that runs in real mode
 Each virtual machine receives 1 MB of memory and access to hardware
 In the event of a program error, only the virtual machine is affected
 OS provides virtual machine to host the code and protect the PC

Compare Operating Systems

Compare Operating Systems


 Desktop operating systems:
 Microsoft Windows: Windows XP
 Macintosh: Mac OS X
 Linux: Fedora, Ubuntu, and others
 UNIX
 A desktop OS has the following characteristics:
 Supports a single user
 Runs single-user applications
 Shares files and folders on a small network with limited
security
Network Operating Systems (NOS)
 Common NOS include:
 Novell Netware
 Microsoft Windows Server
 Linux
 UNIX
 A network OS has the following characteristics:
 Supports multiple users
 Runs multi-user applications
 Is robust and redundant
 Provides increased security compared to desktop
operating systems

Determine Proper Operating System


To select the proper operating system:
 Create an accurate profile of your customer by analyzing the daily, weekly, and
monthly computer activities
 Select appropriate software and hardware to satisfy existing and future
requirements
What Does Your Customer Require?
 Office applications
 word processing, spreadsheets, or presentation software
 Graphics applications
 Photoshop or Illustrator
 Animation applications
 Flash
 Business applications
Accounting, contact management, sales tracking or database

Identify Minimum Hardware Requirements


 Customer may need to upgrade or purchase additional hardware to support the
required applications and OS.
 A cost analysis will indicate if purchasing new equipment is a better idea than
upgrading.
 Common hardware upgrades:
 RAM capacity
 Hard drive size
 Processor speed
 Video card memory and speed

Hardware Compatibility List (HCL)


 Most operating systems have an HCL.
 HCLs can be found on the manufacturer's website.
 HCL includes list of hardware that is known to work with the operating system.

Installing the Operating System


Reasons to perform a clean installation of an OS:
 When a computer is passed from one employee to another
 When the operating system is corrupted
 When a new replacement hard drive is installed in a computer
Before performing a clean installation:
 Back up all data first
 Explain to the customer that existing data will be erased
Confirm that all needed data has been successfully transferred

Hard Drive Setup Procedures


Operating system setup methods:
 Install an OS over a network from a server
 Install from a copy of the OS files stored on the hard drive
 Install from OS files stored on CDs or DVDs
Partitioning and Formatting
 Hard drive must be logically divided (partitioned)
 File system must be created on the hard drive
 During the installation phase, most operating systems will automatically partition
and format the hard drive

Hard Drive Setup Procedures


A technician should understand the process related to hard drive setup.

Prepare the Hard Drive


 The first portion of the installation process deals with formatting and partitioning
the hard drive.
 The second portion prepares the disk to accept the file system.
 The file system provides the directory structure that organizes the user's
operating system, application, configuration, and data files.
 Examples of file systems:
 The FAT32 file system
 The New Technology File System (NTFS)

Install the Operating System

During the Windows XP installation the user must


provide:

 Define currency and numerals


 Text input language
 Name of user
 Name of company
 Product key
 Computer name
 Administrator password
 Date and time settings
 Network settings
 Domain or workgroup information

Create Administrator Account


 Setup creates the administrator account with the user name “administrator”
 Change this name to keep the administrator account secure
 Only use the administrator account occasionally for critical system changes
 Create a fictitious user account to use as a template
 Use secure passwords
 These should be a minimum of 7 characters, containing at least one of each
(letter, number, and symbol)

Complete the Installation


 When Windows XP installation completes:
 Computer will reboot
 Log in for the first time
 Register Windows XP and verify that you are using a legal copy of the OS
 Verification enables you to download patches and service packs
 Use Microsoft Update Manager to scan for new software and to:
 Install all service packs
 Install all patches

Check Device Manager for Conflicts

 Look for warning icons (yellow exclamation points)


 Double-click to learn about the problem
 Click the plus (+) sign to expand the category
 May be able to ignore an error

Custom Installation Options

With Microsoft System Preparation


 Follow these steps for disk cloning:
 Create a master installation on one computer
 Run Sysprep
 Create a disk image of the configured computer using third-party disk-cloning
software
 Copy the disk image onto a server
 When the destination computer is booted,
 A shortened version of the Windows setup program runs
 Setup configures only user-specific and computer-specific settings
 An answer file provides data normally required during set up

The Boot Sequence for Windows XP


 Power On Self Test (POST)
 POST for each adapter card that has a BIOS
 BIOS reads the Master Boot Record (MBR)
 MBR takes over control of the boot process and starts NT Loader (NTLDR)
 NTLDR reads the BOOT.INI file to know which OS to load and where to find the
OS on the boot partition
 NTLDR uses NTDETECT.COM to detect any installed hardware
 NTLDR loads the NTOSKRNL.EXE file and HAL.DLL
 NTLDR reads the registry files and loads device drivers
 NTOSKRNL.EXE starts the WINLOGON.EXE program and displays the
Windows login screen

NTLDR and the Windows Boot Menu


 If more than one OS is present on the disk, BOOT.INI gives the user a chance to
select which to use.
 Otherwise:
 NTLDR runs NTDETECT.COM to get information about installed hardware
 NTLDR then uses the path specified in the BOOT.INI to find the boot partition
 NTLDR loads two files that make up the core of XP: NTOSKRNL.EXE and
HAL.DLL
 NTLDR reads the Registry files, chooses a hardware profile, and loads device
drivers

The Windows Registry

 Recognized by distinctive names, beginning with HKEY_


 Every setting in Windows is stored in the registry
 Changes to the Control Panel settings, File Associations, System Policies, or
installed software are stored in the registry
 Each user has their own section of the registry
 The Windows logon process uses the registry to set the system to the state that it
was in the last time the user logged in

The Windows Registry Files

The NT Kernel and Security Authority

 Next, the NT kernel, NTOSKRNL.EXE, takes over


 It starts the login file, WINLOGON.EXE
 That program starts the Local Security Administration file, LSASS.EXE (Local
Security Administration)
 LSASS.EXE is the program that displays the XP welcome screen
 There are few differences between the Windows XP and the Windows 2000 boot
process

Manipulating Operating System Files


 After you have installed Windows XP, you can use MSCONFIG for post-
installation modifications:
 This boot configuration utility allows you to set programs that will run at startup,
and to edit configuration files
Manipulating Operating System Files
 The registry is a database that contains information and settings for all of the
hardware, software, users and preferences. REGEDIT allows users to edit the
registry.

Manipulating Operating System Files


Pressing the F8 key during the boot process opens the Windows Advanced Startup
Options menu, which allows you to select how to boot Windows.
 Safe Mode – Starts Windows but only loads drivers for basic components, such
as the keyboard and display.
 Safe Mode with Networking Support – Starts Windows identically to Safe Mode
and also loads the drivers for network components.
 Safe Mode with Command Prompt – Starts Windows and loads the command
prompt instead of the GUI interface.
 Last Known Good Configuration – Enables a user to load the configurations
settings of Windows that was used the last time that Windows successfully
started. It does this by accessing a copy of the registry that is created for this
purpose.

Describing Directory Structures


 Windows file system naming conventions:
 Maximum of 255 characters may be used
 Characters such as a period (.) or a slash (\ /) are not allowed
 An extension of three or four letters is added to the filename to identify the file
type
 Filenames are not case sensitive
 Windows filename extension examples:
 .doc - Microsoft Word
 .txt - ASCII text only
 .jpg - graphics format
 .ppt - Microsoft PowerPoint
 .zip - compression format

Describing Directory Structures


 Each file has a set of attributes that control how the file may be viewed or altered.
 The following are the most common file attributes:
 R - The file is read-only
 A - The file will be archived the next backup
 S - The file is marked as a system file and a warning is given if an attempt is
made to delete or modify the file
 H - The file is hidden in the directory display

The ATTRIB Command

NTFS and FAT32


 FAT32 is used where files need to be accessed by multiple versions of Windows.
FAT32 is not as secure as NTFS
 NTFS can support more and larger files than FAT32, and provides more flexible
security features for folders, files, and sizes
 Partitions can be converted from FAT32 to NTFS using the CONVERT.EXE
utility, but not in the reverse direction

Navigating a Graphical User Interface (GUI)


 A GUI provides graphical representations of all the files, folders, and programs
on a computer.
Customizing the Desktop

To customize any of these, simply right-click the item and then select Properties.
 Taskbar
 Recycle Bin
 Desktop background
 Window appearance
The Start Menu
 Customized to two styles, XP and Classic
 Accessed by clicking the Start button
 The Start menu includes:
 A nested list of all installed applications
 A list of recently opened documents
 A list of other elements, including; a
search feature, a help center, and
system settings

My Computer
 When you right-click My Computer and select Properties,
there are several settings that can be customized:
 Computer name
 Hardware settings
 Virtual memory
 Automatic updates
 Remote access
 Files can also be moved and copied using My Computer
Launching Applications
Applications can be launched in several ways:
 Click the application on the Start menu
 Double-click the application shortcut icon on the desktop
 Double-click the application executable file in My Computer
 Launch the application from the Run window or command line
To view and configure network connections, right-click the My Network Places icon.
 Connect to or disconnect from a network drive
 Right-click Properties to configure existing network connections, such as a wired
or wireless LAN connection

Control Panel Applets


Display Settings

 Change the resolution and color quality


 Change wallpaper, screen saver, power settings, and other options, by clicking
the Advanced button

Device Manager
 Used to view settings for devices in the
computer
 An exclamation mark indicates a problem with a
device

Task Manager
 View all applications that are currently running
 Close any applications that have stopped
responding
 Monitor the performance of the CPU and virtual
memory
 View all processes that are currently running
 View information about the network connections

Event Viewer and Remote Desktop


Event Viewer
 Logs a history of events regarding applications, security, and the system.
 These log files are a valuable troubleshooting tool.
Remote Desktop
 Allows one computer to remotely take control of another computer.
 This troubleshooting feature is only available with Windows XP Professional.

Performance Settings
Settings for advanced visuals and for virtual
memory

Add or Remove an Application


 Utility to install or uninstall applications
 Tracks installation files for future thorough uninstall, if desired
Upgrading an Operating System
Upgrade Paths

Upgrading to Windows XP
1. Insert the Windows XP CD. Select Start > Run.
2. In the Run box, where D is the drive letter for the CD-ROM, type D:\i386\winnt32
and press Enter. The Welcome to the Windows XP Setup Wizard displays.
3. Choose Upgrade to Windows XP and click Next. The License Agreement page
displays.
4. Read the license agreement and click the button to accept this agreement.
5. Click Next. The Upgrading to the Windows XP NTFS File System page displays.
6. Follow the prompts and complete the upgrade. When the install is complete, the
computer will restart.

Preventive Maintenance Planning


Components of a preventive maintenance plan:
 Updates to the operating system and applications
 Updates to anti-virus and other protective software
 Hard drive error checking
 Hard drive backup
 Hard drive defragmentation
Schedule Tasks
 The DOS AT command launches tasks at a specified time using the command
line interface
 Information about the AT command is available at this path: Start > Run > cmd
Then type AT /? at the command line.
 The Windows Task Scheduler launches tasks at a specified time using a
graphical interface
 Access the Windows Task Scheduler by following this path: Start > All
Programs > Accessories > System Tools > Scheduled Tasks
 Examples of scheduled tasks to run
 ScanDisk (Windows 2000) and CHKDSK (Windows XP) check the integrity of
files and folders and scan the hard disk surface for physical errors.
 Defrag: Gathers the noncontiguous data into one place, making files run faster

Automatic Updates
 An automatic update service scans the system for needed updates, and
recommends what should be downloaded and installed.
 Automatic update services can setup to download and install updates as soon as
they are available or as required, and install them when the computer is next
rebooted.
Restore Point

An image of the current computer settings. If the computer crashes, the OS can roll
back to a restore point.
 The restore point utility only operates on OS and application files.
 Anti-virus software should be run to remove malware before creating a restore
point.
When to create a restore point:
 Before updating or replacing the OS
 When an application or driver is installed
 Manually at any time

Backup the Hard Drive


 Backup tools allow for recovery of data.
 Use the Microsoft Backup Tool to perform backups.
 Establish a backup strategy that will allow for the recovery of data.
 Decide how often the data must be backed up and the type of backup to perform.
 Windows XP uses Volume Shadow Copying, which allows users to continue to
work even as a backup is taking place.
 It is only necessary to make copies of the files that have changed since the last
backup.

Types of Backups

Clear
Description
marker

Normal Selected files and folders Yes

Copy Selected files and folders No

Selected files and folders that changed since the last


Differential No
backup

Selected files and folders that changed since the last


Incremental Yes
backup

Daily Selected files and folders that changed during the day No

SELF-CHECK 3.1-1

Operating System

Use a separate sheet of paper in answering.

1. Discuss the importance of Operating system.

2. Name some of the common operating systems used nowadays.


ANSWER KEY 3.1-1

1. Operating System configures and manages hardware and it helps to connect


hardware and applications.
2. Common operating systems are MAC OS, Windows, MS-DOS and Linux.
Job Sheet 3.1-1

Title : Installation of Operating System


Performance Objective : Given a working personal computer you are going to
partition the hard disk in two, format in NTFS, install
Operating system & necessary drivers. Duration 1.5
hours.
Supplies, Tools & Equipment :
 Working PC
 OS Installer
 Drivers Software
 Manuals

Steps/ Procedure:
1. Start Computer
a. Check cable connections if it is properly connected.
b. Connect the power cord to the power outlet.
c. Switch on the AVR & UPS
d. Switch on the CPU & Monitor
2. Go to CMOS setup & change boot option to CD or DVD Drive
a. Press the Del key or F1
b. On boot option select CD or DVD drive as your first boot & hard disk in
the second.
c. Save and restart the computer.
3. Install Operating System using Fresh installation.
 Start your computer from the Windows XP CD-ROM. To do this,
insert the Windows XP CD-ROM into your CD drive or DVD drive,
and then restart your computer.
 When you see the "Press any key to boot from CD" message,
press any key to start the computer from the Windows XP CD-
ROM.
 At the Welcome to Setup screen, press ENTER to start Windows
XP Setup.
 Read the End-User License Agreement, and then press F8.
 Follow the instructions on the screen to delete, create select and
format a partition where you want to install Windows XP.

Note: Delete partition and create another two partition using NTFS.
 Follow the instructions on the screen to complete Windows XP
Setup.

4. Install Necessary Drivers.


 Right click My Computer
 Go to Properties
 Click Hardware
 Open Device Manager
 Right Click the device with yellow Question mark
 Click Update drivers
 Select No Not at this time
 Click next
 Select an option if what you want the wizard to do
 Click next
 Wait until the driver will be installed.

Assessment Method:

Demonstration

Performance Criteria checklist


Performance Criteria Checklist 3.1-1

CRITERIA Yes No
Did you….

Started the computer properly

Made CD/DVD Drive as first boot option

Deleted partition/s

Created two partition

Formatted Hard disk in NTFS

Installed Operating System

Installed all necessary drivers

Applied OHS procedures.


LEARNING
INSTALL APPLICATION SOFTWARE
OUTCOME 4

CONTENTS:

1. Installed application software


2. Application and devices/drivers installation procedures
3. Update application software

ASSESSMENT CRITERIA:
 Application software are installed based on software installation guides, end-user
requirements and software license agreement
 Variation to application software installation is carried out in accordance to
customer/client requirements
 Software updates are accessed and installed in accordance with manufacturer’s
recommendations and requirements

CONDITION:
Trainees must be provided with the following:
 Windows
 MAC OS X
 Linux
 Printer
 Scanner
 Interface cards
 TV tuner
 video card
 sound card
 Productivity tools
 Utilities
 Anti-virus
 Virtualization software
 Disk management software
 Optical disk burning tool

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration
Learning Experiences

Learning Outcome 4: INSTALL APPLICATION SOFTWARE

Learning Activities Special Instructions

1. Read information sheet 4.1-1 If you have some problem on the content
“Introduction to Computer Operating of the information sheet don’t hesitate to
System” approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can answer self-
check provided in the module.
2. Answer Self Check 4.1-1 Compare your answer to the answer key
4.1-1. If you got 100% correct answer in
this self-check, you can now move & do
the Activity Sheet. If not review the
information sheet and go over the self-
check again.
INFORMATION SHEET 4.1-1
Software Packages and Use of Application Programs

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to use Software
Packages and Application Programs.

Software is the component of a computer system which refers to the set of


instructions written in a code-that computers can understand and execute. Another
name for this set of instructions is program.

Three Types of Software

1. System Software
2. Application Software
3. Programming Language

System Software. This software tells the CPU what to do, a more common term is
Operating System (OS). The most popular OS in use for PC microcomputer is
Microsoft’s MS DOS. DOS for short is a collection of various programs that help control
your PC. Other operating systems are Microsoft Windows (from the early Windows 95
and 98 to the current windows Vista, OS 2, MAC OS, UNIX, Linux and Apple’s OS 9.

Application Software. This is designed and written to perform specific personal,


business, or scientific processing tasks, such as payroll, processing, human resource
management, or inventory management. Common Application software are the
following:

 Word Processor – This serves as an electronic typewriter and even more. With
word processors, the user can easily produce quality documents like memos and
reports. Popular word processors include MS Word and Word Perfect.

 Spreadsheets- These are programs that simulate a paper divided into rows and
columns, where values can be placed. These are used for advanced numerical
analysis and calculations. Some of the more common spreadsheet programs are
Lotus 1-2-3 and, Ms Excel and Open Calculate.

 Database Programs – These serve to collect a structured collection of data,


which can later be managed and manipulated.

 Presentation Software – These are programs that allow users to create


electronic presentation for reports and other functions.

 Desktop Publishing Software – This allow the user to create page makeups
and do simple typesetting to produce various materials, such as books
pamphlets, reports, and booklets. Example of DTP software are MS Publisher,
and PageMaker.

 Reference Software – These are electronic versions of various references such


as encyclopedia, almanacs, atlases, dictionaries, thesauri, and the like.

 Graphics Programs – These allow the creation and manipulation of graphics,


images, objects, and pictures. Some of the common graphics programs are
CorelDraw, Photoshop, and Computer Aided Design (CAD)
 Educational Software – These include tutorials and electronic lessons that give
students knowledge or training in a particular subject or skill, such as Math or
Science or in gardening or cooking.
7
 Computer Games – These are programs that simulate real games or provide
entertainment and adventure to users.

 Network Software – These are programs that make it possible for computers in
different areas to be connected, allowing their users to communicate with each
other.

 Language Software – These provide programmers with the necessary tools to


write programs and instructions to computer.

Programming Software. Programmers use this software for making computer


programs. Programming software is a tool to make software using different
programming languages.
SELF-CHECK 4.1-1

A. TRUE OR FALSE. Write T if the statement is true and correct and F if it


is not. Use a separate sheet of paper in answering.

______ 1. Word processors are used to create special movie effects.


______ 2. Systems software tells the CPU what to do.
______ 3. Software refers to the set of instructions that computer can understand and
execute.
______ 4. Reference software includes tutorial and electronic lessons that give students
knowledge or training in a particular subject or skill.
______ 5. Graphics Program allow the users to execute electronic presentations for
reports and other functions.

C. Discuss briefly the three types of software.


ANSWER KEY 4.1-1

A. True or False

1. False
2. True
3. True
4. False
5. False

B. System Software – tells the Central processing unit what to do.

Application Software – This is designed and written to perform specific Personal,


business, or scientific processing tasks, such as payroll processing, human resource
management, or inventory management.

Programming Software - to make software using different programming


languages.

LEARNING
CONDUCT TESTING AND DOCUMENTATION
OUTCOME 5

CONTENTS:

1. Conduct testing and documentation


2. Stress Testing Procedure
3. 5S and 3Rs policies
4. Personnel Documentation

ASSESSMENT CRITERIA:
1. Devices / systems and/or installation is tested to determine whether it conforms to
requirements
2. Stress test is conducted to ensure reliability of equipment in accordance with
manufacturer’s instructions and system requirements
3. 5S and 3Rs are followed according to environmental policies
4. Documentation in relation to the test is forwarded to appropriate personnel and/or
authority in accordance with requirements

CONDITION:
Trainees must be provided with the following:
 processor
 video card
 memory
 hard disk

EVALUATION METHOD:
 Written Examination
 Direct observation
 Practical demonstration

Learning Experiences

Learning Outcome 5: CONDUCT TESTING AND DOCUMENTATION

Learning Activities Special Instructions

2. Read information sheet 5.1-1 If you have some problem on the content
“Conducting Test and Documentation of the information sheet don’t hesitate to
Results” approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can answer self-
check provided in the module.
2. Answer Self Check 5.1-1 Compare your answer to the answer key
5.1-1. If you got 100% correct answer in
this self-check, you can now move & do
the Activity Sheet. If not review the
information sheet and go over the self-
check again.
INFORMATION SHEET 5.1-1

CONDUCTING TEST AND DOCUMENTATION TEST RESULTS

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to know how to conduct
test and documentation results

Conduct Tests

 Conduct the tests using the previously prepared test scenarios and test scripts and
document the results of the tests. Use Conduct the Integration Test for integration
testing and Conduct Tests and Analyze Results for system and acceptance testing, to
complete this process.

 Save any documentation that shows the actual results of the tests, as required to
support the investigation and correction of faults.  If the customer requires the
documentation as an audit trail, it is typically created by customer staff during
an Acceptance Test.

Report Problems

 Complete a Fault Reports for any errors found during the testing and forward the
report, along with any supporting documentation, to the team member responsible for
assigning problem reports for correction.  Use the Guidelines for Preparing a Fault
Report to assist with this process.

Stress testing is the process of determining the ability of a computer, network,


program or device to maintain a certain level of effectiveness under unfavorable
conditions. The process can involve quantitative tests done in a lab, such as
measuring the frequency of errors or system crashes.
Types of Reviews:

1. Reviewing your own work – Self Checking


2. Peer- review
3. Supervisory
If validation is one-half of the testing practices then verification is the other, but often the
guidelines are murky – So let’s change that NOW. As it a general practice with the
articles at STH, we will begin with the questions, What –Why-How.
What do we review?  – Everything created has to be reviewed. The following are some
of the common artifacts reviewed:
1. Test plan
2. Test scenarios
3. Test templates
4. Test cases
5. Test data
6. Reports…etc
Why review? – For exactly the same reason we test the software, example:
1. To uncover errors
2. To check for completeness
3. To make sure the standards and guidelines are adhered to or not …etc.
How to review? – The following are the list of activities involved:
1. Define the criteria – Have a checklist of what to look for?
2. Perform the check
3. Record your results
4. Share, discuss and implement the changes required
5. Version control the documents involved
6. Sign off and use the doc as intended.
The process for peer reviews and supervisory reviews is the same according to me
because a supervisor is also a peer despite the higher designation.

Step 1: Define the criteria.

a) What are you expecting to find? You can look for things like:
 Spelling mistakes (Sounds too silly? I don’t think so, one time I wrote “Wed
Object” instead of “Web Object” in one of my articles – Changes the meaning
entirely. Almost makes it too silly to be taken seriously.)
 Format/template compliance
 Functionality coverage and correctness
 Ease of understanding
 Standards followed – naming conventions, consistent numbering …etc.
b) Make a checklist– Checklists are very versatile. It can be as complicated as a
review checklist or as simple as a grocery list. All it takes is some time to make it and
once you do, it is as simple as checking ON or OFF.
c) How to report the results? – Choose whatever is convenient, preferably a method
that can be recorded and tracked.
 Sometimes this can be as simple as adding an extra column in the excel sheet
with test cases and writing something in red when it is not what it is supposed to
be.
 Can be word of mouth
 A list in an email

Step 2: Perform the check

a) Using the checklist you made earlier, verify the document and provide your feedback.

Step 3: Record your results

a) Again, using the method decided in step 1, record and report your results.
b) When reporting your comments or suggestions for change, treat it no differently than
reporting a defect. Don’t overlook anything. Be detailed.

Step 4: Share, discuss and implement the changes required

a) Nobody likes to be told that their work is incorrect or incomplete. So keep in mind the
following guidelines when you are providing negative feedback.
 Provide constructive criticism – Remember not to be critical of the person but
point out flaws in this product
 Don’t get competitive – just because he turned in 30 review comments on your
test cases, don’t try to beat it.
 Give reasons to back your comments
b) Obtain a sign-off.
c) Have the changes made

Step 5: Version control the documents involved

a) Don’t delete the older versions of any of the documents. Name them appropriately
and keep them in a centralized project folder. After all, this is the evidence to all our
work

Step 6: Sign off and use the doc as intended.

a) Once all the changes are incorporated, version saved, give the review process a
sign-off and move on to using the document for what it was created for.
b) Another question that comes up is – do we recheck after the changes are made?
How many times is this process going to go on – work- review-fix-and then reviewed
again? Until when?
No, a review does not have to happen over and over again. It is a quality control activity
that focuses on verifying if the testing aides are created right or not. As always, zero
defect documents are impossible. So a reasonable level of review- one time by a peer is
acceptable.
There, you are done. Isn’t this process simple?

Points to remember:

1. Every project does not have to follow this formalized method of review, but even
if they have an informal method in place, these steps will help set the expectation
and guide you along.
2. Test documentation timeline estimates are typically based on the time required
for creating and reviewing the documents- so it is inbuilt into it even though we
don’t always recognize it.
3. Reviewing is not a process that is limited to manual testing teams. Automation
teams also perform code walkthroughs, design reviews etc.
Lastly, this is how a typical review comments document for test cases looks like. The
comments are in red. Not necessarily real comments, but something to show how it’s
done.
The 5S Method of Improvement - Enhancing Safety,
Productivity and Culture

Costs pile up in the form of defects and waste. Consider these all-too-familiar situations:
• Output does not meet its potential due to crew-to-crew variations.

• Utilization suffers because product changeovers take too long.

• An important part cannot be found, so another is rushed in.


Companies attempt to improve through Lean, Six Sigma, or Total Productive
Maintenance initiatives. However, studies since 1998 report that two-thirds of these
initiatives fail to meet the expectations of company leaders. Learning about the methods
isn't the challenge, putting them into daily practice is, as evident in these situations:
• Process improvements often backslide.

• Continuous improvement is just a phrase.

• The methods of the initiative aren't institutionalized.


The root of these failings is the inability to achieve culture change. An Aberdeen Group
survey (2005) reinforced this conclusion when it found that significant culture change
remains the top challenge in over 80% of the companies surveyed.
One Answer is 5S
Some companies beat the odds and foster strong, positive cultures. Danaher and
Toyota are two of the better known examples.
The method of 5S is one way to engage people and contribute to culture change. 5S is
a visually-oriented system of cleanliness, organization, and arrangement (Figure 1)
designed to facilitate greater productivity, safety, and quality (Figure 2). It engages all
employees and is a foundation for more self-discipline on the job for better work and
better products.
5S is a foundation for more disciplined actions. If workers cannot even put a tool back in
its designated location, will they follow standards for production? Its visual nature makes
things that are out of place stick out like a sore thumb. And, when properly supported, it
builds a culture of continuous improvement. The benefits of 5S are:
• Cleaner and safer work areas -- when a work area is clean and organized tripping
hazards and other dangers are eliminated.
• Less wasted time through more workplace organization -- when tools and
materials are accessible and orderly, workers need less time to "go get" and less time to
search.
• Less space -- when unneeded items are
eliminated and the needed ones are
organized, required floor space is dramatically
reduced.
• Improved self-discipline -- the 5S system,
especially its visual nature, makes abnormal
conditions noticeable and makes ignoring
standards more difficult.
• Improved culture -- when 5S is applied
systematically, it fosters better teamwork and
enthusiasm.
People like to work in a well-organized and
clean environment. They feel better about themselves and better about their work, and
they restore the self-discipline that is found in winning teams.
What are the 5S's?

5S consists of:
• Sorting -- separating the needed from the unneeded. Sorting activities aim to
eliminate unneeded items from the work area and to perform an initial cleaning.
• Simplifying -- a place for everything and everything in its place, clean and ready for
use. Simplifying arranges the workplace to ensure safety and efficiency.
• Systematic Cleaning -- cleaning for inspection. Systematic daily cleaning and
inspection of work areas and equipment help you understand current conditions and
determine if corrective action is required.
• Standardizing -- developing common methods for consistency. Standardizing aims to
make abnormal conditions noticeable and to document agreements to ensure
consistency and sustainability.
• Sustaining -- holding the gains and improving. Sustaining is aimed at maintaining the
improvements from the other 5S activities and improving further.
Implementing 5S
Often, companies mistakenly view 5S as a housekeeping activity. Housekeeping is
housekeeping, not 5S. 5S is a visual system and a system for engaging employees. 5S
must be a team effort and the results must enable anyone to "tell at a glance" what is
right and what is out of place. It also must make doing the work easier. Implementing 5S
occurs in two phases: initial implementation and later refinement.
Since organizing is a key to 5S, eliminating unneeded items comes first. It is wasteful to
find a home for something that is not needed.
Sorting -- Sorting clears the deck for the remaining activities. It can often take weeks to
accomplish in any given area or department. The steps of sorting are:
• Establish criteria for what is not needed. For example, if something hasn't been used
for a year, it may be a candidate for disposal.
• Identify the unneeded items and move to a holding area.
• Dispose of the not needed items, either by transferring to a department that needs
them, selling them, or discarding them.
• Conduct an initial cleaning.
Once the initial sorting is completed, the natural sequence is to get the work area
organized. Simplifying, systematic cleaning, and standardizing go hand-in hand. Simply
simplifying - organizing the work - area will deteriorate if the standards are not set. The
next paragraphs cover each "S" separately, but they work as a system, and must be
performed at the same time, or nearly so.
Simplifying -- Simplifying finds a home for everything. The home should be where the
item will most efficiently be stored. Frequently-used items must be as close to where
they are used as possible. The steps of simplifying are:
• Determine a location for each item based on frequency of use and proper safety zone
(decreasing the likelihood of strain injuries, for example).
• Develop shadowboards and label items - a home for everything.
• Determine how to replenish supplies.
• Document layout, equipment, supplies, and agreements for returning items to their
homes.
Systematic Cleaning -- Systematic cleaning provides a way to inspect, by doing a clean
sweep around a work area. This means visually as well as with a broom or rags. The
idea is make the job of doing daily cleaning and inspections easier. The steps of
systematic cleaning are:
• Identify points to check for performance.
• Determine acceptable performance.
• Mark equipment and controls with visual indicators (e.g., gauges show the correct
range).
• Conduct daily cleaning and visual checks.
Standardizing -- Standardizing assures that everyone knows what is expected. Since
the workplace team establishes the standards, everyone should have had some
involvement in establishing the 5S in their work area. Still, it is important to make these
standards very clear. The steps in standardizing are:
• Establish a routine check sheet for each work area. The check sheet is like a pilot's
pre-flight check list. It shows what the team should check during self-audits.
• Establish a multi-level audit system where each level in the organization has a role to
play in ensuring that 5S is sustained in the work areas and that the 5S system evolves
and strengthens.
• Establish and document standard methods across similar work areas.
• Document any new standard methods for doing the work.
Sustaining -- Sustaining is usually thought of as the toughest "S." However, it doesn't
need to be. The trick is to let the 5S system work for you. When you get to this point,
you should have engaged everyone in the work area during 5S activities and have a
"tell at a glance" visual workplace. If this is so, then sustaining is much easier. That is
important, but not sufficient. A more systematic way to prevent backsliding and to foster
continuous improvement is needed. The steps of sustaining are:
• Determine the 5S level of achievement - the overall grade.
• Perform worker-led routine 5S checks using the 5S check list.
• Address backsliding and new opportunities found during routine checks.
• Conduct scheduled, routine checks by team leads or supervisors or by people from
outside of the workgroup.
• Perform higher-level audits to evaluate how well the 5S system is working overall.  For
example, are there systemic issues with sustaining 5S? Often, the company's safety
committee is an excellent body for conducting these audits.
It is through sustaining activities that the practice of 5S is refined. When items aren't
returned to their homes, the cause is most likely to be that the home was inconvenient.
When the work team addresses these problems, they improve the sustainability of 5S
and, more importantly, they improve safety, morale, and productivity.
Measuring the 5S Level of Achievement
Applying the adage, "what gets measured gets done", 5S uses a five-level maturity
matrix to grade the 5S level (illustrated in Figure 3). To illustrate the use of the matrix,
look at the levels from I to V for Simplifying. Level I is a typical starting level where the
work area is an unorganized mess. Achieving Level II for Simplifying requires that
needed items are safely stored according to frequency of use. Frequently-used items
should be close to the point of use. Achieving Level III requires that the correct
quantities of those items have a clearly marked home. Often work areas can achieve
this level relatively quickly by installing shadowboards (outlines showing visually where
items belong). Levels IV and V require additional refinement. Level IV requires that the
number of items in an area are minimized. That means fewer consumables, fewer files
or paperwork, and fewer tools. Level V requires that anyone, even people unfamiliar
with the area, can retrieve any needed item within 30 seconds and with minimal
movement. The overall 5S Level of Achievement is the lowest level attained for any of
the S's. 5S is only as good as its weakest link. If a work area has not addressed
Standardizing and Sustaining, no matter how high the level achieved for the other S's,
the area will eventually revert to a non-5S state.
3R’S
The term the "3Rs" is an acronym for "Reduce,
Reuse, and Recycle." The Ministry of Economy,
Trade and Industry (METI) and other government
agencies are promoting the "3Rs" in order to create a
sustainable society based on the 3Rs: a society that
pursues environmental protection as well as
economic growth.

3R Recycler is an e-waste recycler situated in IMT Manesar, Gurgaon, Haryana and a


leading sustainable e-waste management service provider. We establish long term
business partnerships with our clients that believe in protection of environment and
committed to E-Waste (Management & Handling) Rules, 2011.
Our promise to our clients is to provide an exceptional, needs-based and carefully
tailored environmental service in line with their corporate social responsibility (CSR)
which will further optimise environmental, social and economic value of their waste and
resources.
At 3R Recycler we are committed to provide an integrated environment friendly
dismantling and recycling facilities for environmentally sound dismantling and recycling
of the end of life electrical & electronic equipments. At the same time, we recognise that
our activity might have health, safety and environmental risks at the workplace(s) & the
surrounding. As our moral responsibility we obligate to take all practical steps to prevent
damage to the environment & the surrounding and to the health & safety of our
employees, clients, vendors and visitors.
3R Recycler promotes protection of the environment by preventing environmental
damage and continuously striving for sustainable ecological balance through recovery
of precious, semi precious and other metals by recycling the e-waste generated from
the end of life of electrical and electronic equipments and thus preventing the further
depletion of natural resources by reducing the dependence on mining. This will help in
long run and will able to present our coming generation with enough of natural
resources. This will definitely help in getting more carbon credits as recovery from ore
needs huge amount of energy in comparison to recovery from e-waste
At 3R Recycler, we are committed to:

 Reduce, Recover and Recycle


 Protect the health and safety of our employees, clients, vendors, visitors & public.
 Prevent damage to the environment.
 Monitor and continually improve quality of our services & processes for the
benefit of the clients and for the goodness of society.
 Identify hazards, analyze their impact and implement controls to reduce risk,
minimizing losses or damage to people, environment, equipment, products and
assets.
 Comply with applicable legislation and regulations in the locations where we
operate.

At 3R Recycler, we will be accompanying our client in their


journey for complying regulatory responsibilities and by
using our services you can…

 Reduce your business costs by adopting a source segregated service.


 Certify your waste management approach and enhance your ‘green’ business
credentials with our Certified Compliance Programme.
 We have extensive experience of implementation of the regulations,
 Ensure on-going compliance with the e-waste management regulations.
 Enhance your overall corporate social responsibility.
3R Recycler’s Environmental Quality, Health and Safety Policy has steps in place for
conducting operations, quality of services & products, health & safety of its employees,
clients, visitors & vendors and to protect environment. This is always being
communicated to all our employees, clients, visitors & vendors at all our establishments
and every location must provide evidence of the implementation of the Policy.
SELF-CHECK 5.1-1

A. ENUMERATION

ENUMERATE 5’S and 3R’S

1.
2.
3.
4.
5.
6.
7.
8.

B. IDENTIFICATION

1. _____________ holding the gains and improving. Sustaining is aimed at


maintaining the improvements from the other 5S activities and improving
further.

2. ______________developing common methods for consistency.


Standardizing aims to make abnormal conditions noticeable and to
document agreements to ensure consistency and sustainability.

3. ______________ cleaning for inspection. Systematic daily cleaning and


inspection of work areas and equipment help you understand current
conditions and determine if corrective action is required.

4. ______________ a place for everything and everything in its place, clean


and ready for use. Simplifying arranges the workplace to ensure safety
and efficiency.

5. _______________ separating the needed from the unneeded. Sorting


activities aim to eliminate unneeded items from the work area and to
perform an initial cleaning
ANSWER KEY 5.1.1

A. ENUMERATION

5’S
1. Sorting
2. Simplifying
3. Systematic Cleaning
4. Standardizing
5. Sustain

3’R
1. Reduce
2. Recover
3. Recycle

B. IDENTIFICATION

1. Sustain
2. Standardizing
3. Systematic Cleaning
4. Simplifying
5. Sorting

You might also like