UC 1 Install and Configure Computer Systems Final
UC 1 Install and Configure Computer Systems Final
You are required to go through a series of learning activities in order to complete each
of the learning outcomes of the module. In each learning outcome there are Information
Sheets, Operation Sheets, and Activity Sheets. Follow these activities on your own and
answer the Self-Check at the end of each learning activity.
If you have questions, don’t hesitate to ask your teacher for assistance.
You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o already have completed training in this area.
If you can demonstrate to your teacher that you are competent in a particular skill or
skills, talk to him/her about having them formally recognized so you don’t have to do he same
training again. If you have a qualification or Certificate of Competency from previous trainings
show it to your teacher. If the skills you acquired are still current and relevant to this module,
they may become part of the evidence you can present for RPL. If you are not sure about the
currency of your skills, discuss it with your teacher.
After completing this module ask your teacher to assess your competency. Result of
your assessment will be recorded in your competency profile. All the learning activities are
designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more than
one learning activity.
INTRODUCTION:
This unit covers the outcomes required in installing and configuring desktop and
workstation computers systems. It consists of competencies to assemble computer hardware,
install operating system and drivers for peripherals/devices, and install application software as
well as to conduct testing and documentation
LEARNING OUTCOMES:
2. Prepare installer
ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies and procedures are
followed in accordance with systems requirements
2. Materials necessary to complete the work are identified and obtained in accordance
with established procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct
operation and safety
4. Computer hardware is assembled in accordance with established procedures and
systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in accordance with
hardware requirements.
6. Portable bootable devices are created in accordance with software manufacturer
instruction
7. Customized installers are prepared in accordance with software utilization guide and
end user agreement.
8. Installation of portable applications are carried out in accordance with software user
guide and software license
9. Operating system (OS) is installed in accordance with established installation
procedures and to comply with end-user requirements
10. Peripherals/devices drivers are installed and configured in accordance with
manufacturer’s instructions and/or OS installation procedures.
11. OS and drivers updates/patches are accessed and installed in accordance with
manufacturer’s recommendations and requirements
12. On-going checks of the quality of the work are undertaken in accordance with
established procedures
13. Application software are installed based on software installation guides, end-user
requirements and software license agreement
Local Area Network- the smallest of the three network types, consist of PCs
connected together within a limited area, such as within the same building, floor or
department.
Metropolitan Area Network – are network that spans no more than 50 miles. It is
design to connect LANs spanning a town or city
Network Switch – It helps determine how data moves over large networks.
Protocol – refers to the specific standards governing the sending and receiving of
data.
Repeater– a device that strengthen signals and allow then to stay clear over longer
distances.
Printer - It is a piece of hardware that produces a paper copy (also known as
‘hardcopy’) of the information generated by the computer.
RAM – Random Access Memory, is a primary memory. This memory is used inside
the computer to hold programs and data while it is running.
RJ 45 – is the connector plugged into the NIC ports on computers and often
connecting the main networking hardware together.
Router – a device that forwards data packets between Local or Wide Area Network
groups.
Scanner- it is an input device that read text or illustration printed on paper, translates
the information into a form that a computer can use.
Server – is a part of a network. It is a special computer that users on the network can
asses to carry out a particular job.
Software – programs and data that a computer uses.
Sub notebook computer - A portable computer that is slightly lighter and smaller than
a full-sized notebook computer. Typically, sub notebook computers have a smaller
keyboard and screen, but are otherwise equivalent to notebook computers.
UTP – (Unshielded Twisted Pair) least expensive and most popular network media.
USB – Universal Serial Bus, a hardware interface for low-speed peripherals such as
the keyboard, mouse, joystick, scanner, printer and telephony devices.
Video Camera - camera using videotape: a camera that records onto videotape
Wide Area Network – used to distribute information thousand of miles among
thousands of users.
Workstation- is any network computer that connects to and request resources from a
network
CONTENTS:
1. Safety procedures
2. Basic terms, concepts, functions and characteristics of PC hardware components
3. Structure of operating systems
4. Familiarization with the various computer systems’ components and peripherals
5. Assembling computer hardware
ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies and procedures
are followed in accordance with systems requirements
2. Materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct
operation and safety
4. Computer hardware is assembled in accordance with established procedures and
systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in accordance with
hardware requirements.
CONDITION:
Students/trainees must be provided with the following:
Protective eyewear
IC insertion/extraction
Digital multi-meter
tool
Wire stripper with bolt cutter
Mirror (inspection)
Pliers (assorted)
RS 232 pin insertion/
Screw drivers (assorted)
extraction tool
Soldering iron
Sharp pointed tweezers
Desoldering tool
Antistatic wrist wrap
Allen wrench (0.05 – 0.25 inch)
LAN Tester
Flashlight
EVALUATION METHOD:
1. Lecture
2. Discussion
3. Demonstration
4. Viewing multimedia
4. Answer self-check 1.1-2 Compare your answer to the answer key 1.1-2. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not review
the information sheet and go over the self-check
again.
5. Read information sheet 1.1-3 If you have some problem on the content of the
“Structure of Operating System” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self check provided in the module.
6. Answer self-check 1.1-3 Compare your answer to the answer key 1.1-3. If you
got 100% correct answer in this self-check, you can
now move to the next task sheet. If not review the
information sheet and go over the self-check again.
7. Read information sheet 1.1-4 If you have some problem on the content of the
“System Configuration / Settings of information sheet don’t hesitate to approach your
computer system and devices” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self check provided in the module.
8. Answer self-check 1.1-4 Compare your answer to the answer key 1.1-4. If you
got 100% correct answer in this self-check, you can
now move to the next Learning Outcome. If not
review the information sheet and go over the self-
check again.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify and apply
OHS policies and procedures in Computer Systems Servicing NC II.
Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.
Do not work on components that are plugged into their power source.
Remove all jewelry when working inside any computer related equipment.
When you shut down your computer, be sure to shut it down properly. Do not
turn it off with the case switch.
Directions:
Identify at least 10 Occupation health and Safety (OHS) policies and procedures in
CHS.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
4. Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.
5. Do not work on components that are plugged into their power source.
7. Remove all jewelry when working inside any computer related equipment.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify the Basic
Terms, Concepts, Functions and Characteristics of PC Hardware Components
Types of Computer
Workstation
Desktop computer
Tablet PC
Home theater PC
A home theater PC (HTPC) is a convergence
device that combines the functions of a personal
computer and a digital video recorder. It is connected
to a television or a television-sized computer display
and is often used as a digital photo, music, video
player, TV receiver and digital video recorder.
1. Scanner
2. CPU (Microprocessor)
3. Primary storage (RAM)
4. Expansion cards (graphics cards, etc.)
5. Power supply
6. Optical disc drive
7. Secondary storage (Hard disk)
8. Motherboard
9. Speakers
10. Monitor
11. System software
12. Application software
13. Keyboard
14. Mouse
15. External hard disk
16. Printer
Motherboard
Main memory
A PC's main memory is fast storage that is directly accessible by the CPU,
and is used to store the currently executing program and immediately needed data.
Hard disk
Keyboard
Other components
Mass storage
All computers require either fixed or removable storage for their operating
system, programs and user generated material.
Formerly the 5¼ inch and 3½ inch floppy drive were the principal forms of removable
storage for backup of user files and distribution of software.
Computer communications
Internal modem card
Modem
Network adapter card
Router
BIOS – Basic Input/Output System, chip that controls the most basic functions
of the computer and performs a self-test every time you turn it on.
A. Multiple Choice
Direction: Choose the best answer of the given choices. Use a separate sheet of
paper in answering.
1. 2.
3. 4.
5. 6.
7. 8.
9. 10.
A. MULTIPLE CHOICE
1. A 7. B
2. C 8. A
3. B 9. C
4. D 10. D
5. A
6. B
B. IDENTIFICATION
1. Monitor
2. Video card
3. Hard Disk
4. Memory/ RAM
5. Mother Board
6. Processor
7. Keyboard
8. Mouse
9. Printer
10. Scanner
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar and
use the Personal Protective Equipment properly.
Performance Objective:
https://www.youtube.com/watch?v=d2pc7ElcPNghttps://www.youtube.com/watch?
v=d2pc7ElcPNg
The will be divided into groups. Each group has their own respective leader.
The group will prepare a skit regarding personal protective equipment. After the
activity they will be assessed thru the given Performance Criteria Checklist below:
PERFORMANCE CHECKLIST
Did you…
Yes No
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to familiarize Computer
hardware and enumerate its functions and uses.
INPUT DEVICES. Performs the two most basic computing tasks: issuing
commands and entering data. Common input devices are the following:
- Keyboard – is a standard input device of most computers
MOUSE
KEYBOARD
JOYSTICK
LIGHT PEN
- Light pen – a device used to draw, write, or issue commands when it touches a
specially designed screen.
VIDEO
MONITOR
SPEAKERS
Speakers- play sounds transmitted as electrical signals from the sound card.
Modem – a device that sends and receives data over telephone lines to and
from computers.
Modem
THE SYSTEM UNIT. The system unit is the part of the computer which is
responsible for accepting and processing the data brought in by the input
devices. It also responsible for passing the resulting information to the users via
the output devices.
The Bus. is responsible for transporting electronic signals from place to place
or specific predefined routes.
The CPU – The CPU is the computer’s processor, controller and storage
device
Case and Power Supply – is also known as the system unit, the case or
system cabinet is the box that houses the processor chip (CPU), the memory
chips, and the motherboard with power supply, as drive, and CD-ROM or
DVD drive. It include a power supply unit and a fan to keep the circuitry free
from overheating.
POWER SUPPLY
Clock – it synchronizes the operation of all parts of the PC, and provides the
basic timing signal for the CPU.
Memory cards
BIOS – The BIOS (Basic Input / Output System) is a ROM chip that
provide.
CMOS – stores the configuration of the PC (example the password, disk type,
amount of memory installed, current time and data). CMOS stands for
Complimentary Metal-Oxide Semiconductor.
FLOPPY DISK
MODEM
IDE CABLE / FLOPPY CABLES
POWER CABLES – it supplies power from the power supply to the drive. The power
cables are red, yellow and black. The yellow wire furnishes 12 volts of power, the
red wire furnishes 5 volts of power, the two black wire are ground wire for each.
IDE AND FLOPPY DISK RIBBON CABLE – IDE stands for Integrate Device
Electronics. It shows how to connect an IDE cable to two devices namely the top
device (master) and the bottom device (slave).
1.
2.
3.
4.
5.
information.
5. Main memory is where programs and data are kept on along term basis.
1. Modem - allows a given computer to share data or otherwise a device which let
computers exchange information
2. Mouse – It is used for pointing and also to easily access other commands
3. Keyboard – It is primarily used in entering and editing data
4. Speaker – It play sounds transmitted as electrical signals from the sound card.
5. Monitor – It displays activity inside the computer
B.True or False
1. False
2. True
3. True
4. True
5. False
After reading this INFORMATION SHEET, YOU MUST be able disassemble and
assemble computer system.
Introduction
Computer assembly is a large part of a technician's job.
Work in a logical, methodical manner when working with computer
components
Improve computer assembly skills dramatically with practice
CPU on Motherboard
The CPU and motherboard are sensitive to
electrostatic discharge so use a grounded
antistatic mat and wear an antistatic wrist strap.
CAUTION: When handling a CPU, do not touch
the CPU contacts.
The CPU is secured to the socket on the
motherboard with a locking assembly.
Thermal Compound
1. Align the CPU so that the Connection 1 indicator is lined up with Pin 1 on the
CPU socket.
2. Place the CPU gently into the socket.
3. Close the CPU load plate and secure it by closing the load lever and moving it
under the load lever retention tab.
Install RAM
The Motherboard
Install Motherboard
An optical drive is a storage device that reads and writes information to CDs or
DVDs.
Optical drive installation steps:
1. Position the optical drive to align with the 5.25 inch drive bay.
2. Insert the optical drive into the drive bay so that the optical drive screw
holes align with the screw holes in the case.
3. Secure the optical drive to the case using the proper screws.
A floppy disk drive (FDD) is a storage device that reads and writes information
to a floppy disk.
FDD installation steps:
1. Position the FDD so that it aligns with the 3.5 inch drive bay.
2. Insert the FDD into the drive bay so that the FDD screw holes align
with the screw holes in the case.
3. Secure the FDD to the case using the proper screws.
1.
Plug the SATA power connector into the HDD.
2.
Plug the Molex power connector into the optical drive.
3.
Plug the 4-pin Berg power connector into the FDD.
4.
Connect the 3-pin fan power connector into the appropriate fan header
on the motherboard, according to the motherboard manual.
5. Plug the additional cables from the case into the appropriate
connectors according to the motherboard manual.
PATA Cables
SATA Cables
1. Plug the motherboard end of the PATA cable into the motherboard socket.
2. Plug the connector at the far end of the PATA cable into the optical drive.
3. Plug one end of the SATA cable into the motherboard socket.
4. Plug the other end of the SATA cable into the HDD.
5. Plug the motherboard end of the FDD cable into the motherboard socket.
6. Plug the connector at the far end of the FDD cable into the floppy drive.
NOTE: Plug in the power cable after you have connected all
other cables.
POST checks to see that all of the hardware in the computer is operating
correctly.
If a device is malfunctioning, an error or a beep code alerts the technician that
there is a problem.
Typically, a single beep denotes that the computer is functioning properly.
If there is a hardware problem, the computer may emit a series of beeps.
Each BIOS manufacturer uses different codes to indicate hardware problems.
Consult the motherboard documentation to view beep codes for your
computer.
BIOS Setup
The BIOS contains a setup program used to configure settings for hardware
devices.
The configuration data is saved to a special memory chip called a
complementary metal-oxide semiconductor (CMOS).
CMOS is maintained by the battery in the computer.
If this battery dies, all BIOS setup configuration data will be lost.
Replace the battery and reconfigure the BIOS settings.
1
4
2
5
A
B C
D
E
1. C
2. B
3. E
4. D
5. A
Steps/ Procedure:
1. Confirm that the hardware works...
- Does your video monitor work?
Does your PC boot?
Do your floppy drive and CD/DVD drive work?
Does the hard drive work?
Do the keyboard and mouse functioning?
1. Discharge yourself of all static electricity by touching the PC’s chassis (or the ground screw on
the receptacle.)
2. Safety NOTE!! Beware of sharp edges!!! The cheaper chassis have very sharp edges that can
cut you easily. Be very careful and take your time. Remember, SAFETY FIRST.
3. As you remove each board and disk drive, document the information listed in the attached
Specifications document (note some parts of the spec sheets wont apply to this lab).
4. Assemble the PC
- To assemble the PC, reverse the procedure above or follow the procedures in the
information sheet “Disassembling & Assembling PC.
Assessment Method:
CRITERIA Yes No
Did you…
Followed Safety procedures
manufacturer’s instruction
instruction
ASSESSMENT CRITERIA:
1. Portable bootable devices are created in accordance with software
manufacturer instruction
2. Customized installers are prepared in accordance with software
utilization guide and end user agreement.
3. Installation of portable applications are carried out in accordance with
software user guide and software license
CONDITION:
Trainees must be provided with the following:
Protective eyewear
Digital multi-meter
Wire stripper with bolt cutter
Pliers (assorted)
Screw drivers (assorted)
Soldering iron
Desoldering tool
Allen wrench (0.05 – 0.25 inch)
Flashlight
IC insertion/extraction tool
Mirror (inspection)
RS 232 pin insertion/ extraction tool
Sharp pointed tweezers
Antistatic wrist wrap
LAN Tester
Crimping tools
EVALUATION METHOD:
Written Examination
Practical Examination
Demonstration
LEARNING OUTCOME SUMMARY
Learning Experiences
1. Read information sheet 2.1-1 If you have some problem on the content of the
information sheet don’t hesitate to approach your
DIFFERENT TYPE OF BOOT DEVICE facilitator.
If you feel that you are now knowledgeable on
the content of the information sheet, you can
answer self-check provided in the module.
2. Answer Self Check 2.1-1 Compare your answer to the answer key 2.1-1. If
you got 100% correct answer in this self-check,
you can now move & do the Activity Sheet. If not
review the information sheet and go over the
self-check again.
INFORMATION SHEET 2.1-1
DIFFERENT TYPE OF BOOTABLE DEVICES
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar with the
different type of Bootable devices, creating bootable device with different operating
system.
A boot device is any piece of hardware that can read or contains the files
required for a computer to start. For example, a hard drive, floppy disk drive, CD-
ROM drive, DVD drive, and USB jump drive are all considered bootable devices.
However, unless the necessary boot files are stored on the drive, diskette, or
disc, the computer will not be able to boot from that device.
The most commonly used boot device or boot drive is the hard drive. When
an operating system, such as Microsoft Windows, is installed onto the hard drive, it
copies the boot files and drivers required to load Windows onto the computer. When
installing a new operating system, troubleshooting the computer, or booting from
another drive, such as the CD-ROM drive, a bootable disc or setup disc is inserted into
the drive. If the boot sequence is setup correctly in CMOS setup and the bootable disc
is in the computer, it will load from the disc instead of the hard drive.
In the past, Microsoft Windows was installed by disc, CD- or DVD-ROM, or the floppy
disc – and optical data carriers are also gradually disappearing from the scene. Instead,
the operating system is either preinstalled on the system partition of a new computer or
laptop, or you acquire Windows directly online, complete with a digital license, and
download it yourself.
But if you need an external installation medium, many people nowadays use a bootable
USB drive. It’s quicker and more compact that an optical data carrier, and so is perfectly
suited for setting up (or resetting) a system – there are also many other possible uses.
Why do you need a bootable USB?
There are lots of uses for a bootable USB drive. The most important is, of
course, booting the PC if it will no longer start itself because of a virus, serious system
failure, defective hard drive, or partition problems. The small piece of hardware is the
standard solution for hosting an entire operating system and/or a recovery system like
the multi-virus scanner Sardu and using it to successfully reboot and repair the
computer.
Hardly any commercial USB drives are suitable from the outset for these diverse tasks.
This is because most models are only loaded with a single file system when you first get
them, for example, an FAT32 or exFAT file system. They’re missing the “master boot
record” (MBR) that’s absolutely necessary for booting most PCs (specifically those with
a “basic input/output system” (BIOS)). You have to make a new USB stick bootable on
your own.
Fact
BIOS (basic input/output system) is a program that is preinstalled on the mainboard of
most computers and activates the hardware when the system boots so that the
operating system can communicate and interact with it.
A bootable USB drive can of course be created on a different computer than the one
you want to use it on later. There are basically two possible methods: either manually or
using automated tools. The first option seems a bit complicated at first glance, and
because of the various manual steps is slightly more error-prone, but it’s still doable
even if you’re not an expert.
Regardless of which option you choose, you always need the following things:
1. The Windows utility program DiskPart or an external tool with the same functions.
2. A USB drive with at least 4GB of storage (for a 32-bit operating system) or at
least 8GB (for a 64-bit system). To obtain a high working speed (or enable the
creation of a portable operating system), the selected drive should support the
standard USB 3.0. If the drive is already being used, make sure that it doesn’t
contain any important or indispensable data.
3. An ISO file for the desired operating system that contains all setup files that you
need for installation. These files used to be found on a CD- or DVD-ROM, which
came with a new computer or could be acquired separately. Today, Windows is
generally preinstalled on a system partition of a matching PC or laptop. You
can create such an ISO file yourself, though, for example with the use of tools
like WinISO, UltraISO, or the burn program InfraRecorder. But it’s simpler to
just download the required operating system from the internet. In the case of
Windows 10, this can be done completely legally via the media creation tool from
Microsoft. Downloading directly from the company’s website is also possible
for Windows 7 and Windows 8, for example.
Make a bootable USB drive with the Windows utility program DiskPart
If you dare to do the necessary work by hand, you can simply use the cmd.exe application, better
known as “Command Prompt”, to create a bootable USB drive on all operating systems from
Windows Vista (including Windows 10). This goes as follows:
Search for the “cmd” application in the Windows start menu, right-click on the item, and
select “Run as administrator” from the context menu. This opens a small window with white
text on a black background.
Type the command “diskpart” and confirm your input with the enter key (you’ll also do this
after every other entered command). This starts the storage device manager.
Enter the command “list disk” to display all available storage devices.
You can recognize your USB by its storage capacity, and it’s usually listed as “disk 1”. In the
system partition, “disk 0” is usually your PC, so a hard drive or solid state drive in your
computer.
Based on the assumption that your USB has the label “disk 1”, enter the command “sel disk
1” to select it (or the corresponding “disk 2”, etc.).
Enter then command “clean” to delete all files from the USB.
Enter the command “list par” and select the newly created main partition with “sel par 1”.
Format the USB with the command “format fs=FAT32 label=“WINDOWSUSB” quick
override” (in place of “WINDOWS USB” you can also choose another label, so long as it
doesn’t contain any spaces or special characters. The drive will later be displayed under this
name if you plug into a running Windows computer). Formatting may take a while. You can
track its progress in the percentage bar.
As soon as the process is finished, enter the command “assign” to automatically assign a
drive letter (for example “G:”) to your USB.
Enter “exit” to close DiskPart, and then “exit” again to close the command prompt.
To start the “Command Prompt” on your PC, simply enter “cmd” in the Windows search bar.
To finish the process, you just have to copy the Windows ISO file to a bootable USB
stick. This is done with a basic drag-and-drop. If you’re using an installation disc, you
can also drag all setup files from there onto your drive (use the folder options to display
all of the hidden files first). That’s all possible in the command prompt as well. For a
source media with the drive letter “D:” and a USB drive with the letter “G:”, the
corresponding command would look as follows: “xcopy D:\*.* G:\*.* /S /E /F” (all of the
spaces are intentional).
Create Bootable USB with Rufus
Rufus is widely considered to be the fastest and most reliable tool for the creation of a bootable
USB. It also supports UEFI (“Unified Extensible Firmware Interface”), a new mainboard firmware
that replaced the old BIOS and can already be found on almost all newer computers. From Windows
8, it’s also possible to install “Windows2Go” as a portable operating system on an external
storage device with Rufus.
Select “Create a bootable disk using” and the option “ISO Image”
Under “New volume label”, you can enter whatever name you like for your USB drive
You’ll receive the warning “ALL DATA ON THIS DEVICE WILL BE DESTROYED”, which
you can confidently confirm with “OK”– at this point, you’ve ideally already saved any
important files from the USB drive
Click on “Start”
ASSESSMENT CRITERIA:
1. Operating system (OS) is installed in accordance with established
installation procedures and to comply with end-user requirements
2. Peripherals/devices drivers are installed and configured in accordance
with manufacturer’s instructions and/or OS installation procedures.
3. OS and drivers updates/patches are accessed and installed in
accordance with manufacturer’s recommendations and requirements
4. On-going checks of the quality of the work are undertaken in
accordance with established procedures
CONDITION:
Trainees must be provided with the following:
Windows
MAC OS X
Linux
Printer
Scanner
Interface cards
TV tuner
video card
sound card
EVALUATION METHOD:
Hands-on
Direct observation
Practical demonstration
Learning Experiences
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar with the
different operating systems, navigate on the different OS components and install
Operating system and device drivers.
Below is a listing of common operating systems available today, and who developed them.
Operating system Developer Operating system Developer
Corel Linux Corel MS-DOS 5.x Microsoft
Linux Linux Torvalds MS-DOS 6.x Microsoft
MAC OS 8 Apple Windows 2000 Microsoft
MAC OS 9 Apple Windows 2003 Microsoft
MAC OS 10 Apple Windows 95 Microsoft
MAC OS X Apple Windows 98 Microsoft
Mandrake Linux Mandrake Windows CE Microsoft
MS-DOS 1.x Microsoft Windows ME Microsoft
MS-DOS 2.x Microsoft Windows NT Microsoft
MS-DOS 3.x Microsoft Windows Vista Microsoft
MS-DOS 4.x Microsoft Windows XP Microsoft
Real Mode
Executes only one program at a time
Addresses only 1 MB of system memory at a time
Directly accesses memory and hardware
Subject to crashes
Available to all modern processors
Only used by DOS and DOS applications
Protected Mode
Has access to all memory
Can manage multiple programs simultaneously
Allows the system to use virtual memory
Provides 32-bit access to memory, drivers, and I/O transfers
Each program is assigned a space in memory
Computer is protected from program errors
To customize any of these, simply right-click the item and then select Properties.
Taskbar
Recycle Bin
Desktop background
Window appearance
The Start Menu
Customized to two styles, XP and Classic
Accessed by clicking the Start button
The Start menu includes:
A nested list of all installed applications
A list of recently opened documents
A list of other elements, including; a
search feature, a help center, and
system settings
My Computer
When you right-click My Computer and select Properties,
there are several settings that can be customized:
Computer name
Hardware settings
Virtual memory
Automatic updates
Remote access
Files can also be moved and copied using My Computer
Launching Applications
Applications can be launched in several ways:
Click the application on the Start menu
Double-click the application shortcut icon on the desktop
Double-click the application executable file in My Computer
Launch the application from the Run window or command line
To view and configure network connections, right-click the My Network Places icon.
Connect to or disconnect from a network drive
Right-click Properties to configure existing network connections, such as a wired
or wireless LAN connection
Task Manager
View all applications that are currently running
Close any applications that have stopped
responding
Monitor the performance of the CPU and virtual
memory
View all processes that are currently running
View information about the network connections
Performance Settings
Settings for advanced visuals and for virtual
memory
Upgrading to Windows XP
1. Insert the Windows XP CD. Select Start > Run.
2. In the Run box, where D is the drive letter for the CD-ROM, type D:\i386\winnt32
and press Enter. The Welcome to the Windows XP Setup Wizard displays.
3. Choose Upgrade to Windows XP and click Next. The License Agreement page
displays.
4. Read the license agreement and click the button to accept this agreement.
5. Click Next. The Upgrading to the Windows XP NTFS File System page displays.
6. Follow the prompts and complete the upgrade. When the install is complete, the
computer will restart.
Automatic Updates
An automatic update service scans the system for needed updates, and
recommends what should be downloaded and installed.
Automatic update services can setup to download and install updates as soon as
they are available or as required, and install them when the computer is next
rebooted.
Restore Point
An image of the current computer settings. If the computer crashes, the OS can roll
back to a restore point.
The restore point utility only operates on OS and application files.
Anti-virus software should be run to remove malware before creating a restore
point.
When to create a restore point:
Before updating or replacing the OS
When an application or driver is installed
Manually at any time
Types of Backups
Clear
Description
marker
Daily Selected files and folders that changed during the day No
SELF-CHECK 3.1-1
Operating System
Steps/ Procedure:
1. Start Computer
a. Check cable connections if it is properly connected.
b. Connect the power cord to the power outlet.
c. Switch on the AVR & UPS
d. Switch on the CPU & Monitor
2. Go to CMOS setup & change boot option to CD or DVD Drive
a. Press the Del key or F1
b. On boot option select CD or DVD drive as your first boot & hard disk in
the second.
c. Save and restart the computer.
3. Install Operating System using Fresh installation.
Start your computer from the Windows XP CD-ROM. To do this,
insert the Windows XP CD-ROM into your CD drive or DVD drive,
and then restart your computer.
When you see the "Press any key to boot from CD" message,
press any key to start the computer from the Windows XP CD-
ROM.
At the Welcome to Setup screen, press ENTER to start Windows
XP Setup.
Read the End-User License Agreement, and then press F8.
Follow the instructions on the screen to delete, create select and
format a partition where you want to install Windows XP.
Note: Delete partition and create another two partition using NTFS.
Follow the instructions on the screen to complete Windows XP
Setup.
Assessment Method:
Demonstration
CRITERIA Yes No
Did you….
Deleted partition/s
CONTENTS:
ASSESSMENT CRITERIA:
Application software are installed based on software installation guides, end-user
requirements and software license agreement
Variation to application software installation is carried out in accordance to
customer/client requirements
Software updates are accessed and installed in accordance with manufacturer’s
recommendations and requirements
CONDITION:
Trainees must be provided with the following:
Windows
MAC OS X
Linux
Printer
Scanner
Interface cards
TV tuner
video card
sound card
Productivity tools
Utilities
Anti-virus
Virtualization software
Disk management software
Optical disk burning tool
EVALUATION METHOD:
Hands-on
Direct observation
Practical demonstration
Learning Experiences
1. Read information sheet 4.1-1 If you have some problem on the content
“Introduction to Computer Operating of the information sheet don’t hesitate to
System” approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can answer self-
check provided in the module.
2. Answer Self Check 4.1-1 Compare your answer to the answer key
4.1-1. If you got 100% correct answer in
this self-check, you can now move & do
the Activity Sheet. If not review the
information sheet and go over the self-
check again.
INFORMATION SHEET 4.1-1
Software Packages and Use of Application Programs
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to use Software
Packages and Application Programs.
1. System Software
2. Application Software
3. Programming Language
System Software. This software tells the CPU what to do, a more common term is
Operating System (OS). The most popular OS in use for PC microcomputer is
Microsoft’s MS DOS. DOS for short is a collection of various programs that help control
your PC. Other operating systems are Microsoft Windows (from the early Windows 95
and 98 to the current windows Vista, OS 2, MAC OS, UNIX, Linux and Apple’s OS 9.
Word Processor – This serves as an electronic typewriter and even more. With
word processors, the user can easily produce quality documents like memos and
reports. Popular word processors include MS Word and Word Perfect.
Spreadsheets- These are programs that simulate a paper divided into rows and
columns, where values can be placed. These are used for advanced numerical
analysis and calculations. Some of the more common spreadsheet programs are
Lotus 1-2-3 and, Ms Excel and Open Calculate.
Desktop Publishing Software – This allow the user to create page makeups
and do simple typesetting to produce various materials, such as books
pamphlets, reports, and booklets. Example of DTP software are MS Publisher,
and PageMaker.
Network Software – These are programs that make it possible for computers in
different areas to be connected, allowing their users to communicate with each
other.
A. True or False
1. False
2. True
3. True
4. False
5. False
LEARNING
CONDUCT TESTING AND DOCUMENTATION
OUTCOME 5
CONTENTS:
ASSESSMENT CRITERIA:
1. Devices / systems and/or installation is tested to determine whether it conforms to
requirements
2. Stress test is conducted to ensure reliability of equipment in accordance with
manufacturer’s instructions and system requirements
3. 5S and 3Rs are followed according to environmental policies
4. Documentation in relation to the test is forwarded to appropriate personnel and/or
authority in accordance with requirements
CONDITION:
Trainees must be provided with the following:
processor
video card
memory
hard disk
EVALUATION METHOD:
Written Examination
Direct observation
Practical demonstration
Learning Experiences
2. Read information sheet 5.1-1 If you have some problem on the content
“Conducting Test and Documentation of the information sheet don’t hesitate to
Results” approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can answer self-
check provided in the module.
2. Answer Self Check 5.1-1 Compare your answer to the answer key
5.1-1. If you got 100% correct answer in
this self-check, you can now move & do
the Activity Sheet. If not review the
information sheet and go over the self-
check again.
INFORMATION SHEET 5.1-1
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know how to conduct
test and documentation results
Conduct Tests
Conduct the tests using the previously prepared test scenarios and test scripts and
document the results of the tests. Use Conduct the Integration Test for integration
testing and Conduct Tests and Analyze Results for system and acceptance testing, to
complete this process.
Save any documentation that shows the actual results of the tests, as required to
support the investigation and correction of faults. If the customer requires the
documentation as an audit trail, it is typically created by customer staff during
an Acceptance Test.
Report Problems
Complete a Fault Reports for any errors found during the testing and forward the
report, along with any supporting documentation, to the team member responsible for
assigning problem reports for correction. Use the Guidelines for Preparing a Fault
Report to assist with this process.
a) What are you expecting to find? You can look for things like:
Spelling mistakes (Sounds too silly? I don’t think so, one time I wrote “Wed
Object” instead of “Web Object” in one of my articles – Changes the meaning
entirely. Almost makes it too silly to be taken seriously.)
Format/template compliance
Functionality coverage and correctness
Ease of understanding
Standards followed – naming conventions, consistent numbering …etc.
b) Make a checklist– Checklists are very versatile. It can be as complicated as a
review checklist or as simple as a grocery list. All it takes is some time to make it and
once you do, it is as simple as checking ON or OFF.
c) How to report the results? – Choose whatever is convenient, preferably a method
that can be recorded and tracked.
Sometimes this can be as simple as adding an extra column in the excel sheet
with test cases and writing something in red when it is not what it is supposed to
be.
Can be word of mouth
A list in an email
a) Using the checklist you made earlier, verify the document and provide your feedback.
a) Again, using the method decided in step 1, record and report your results.
b) When reporting your comments or suggestions for change, treat it no differently than
reporting a defect. Don’t overlook anything. Be detailed.
a) Nobody likes to be told that their work is incorrect or incomplete. So keep in mind the
following guidelines when you are providing negative feedback.
Provide constructive criticism – Remember not to be critical of the person but
point out flaws in this product
Don’t get competitive – just because he turned in 30 review comments on your
test cases, don’t try to beat it.
Give reasons to back your comments
b) Obtain a sign-off.
c) Have the changes made
a) Don’t delete the older versions of any of the documents. Name them appropriately
and keep them in a centralized project folder. After all, this is the evidence to all our
work
a) Once all the changes are incorporated, version saved, give the review process a
sign-off and move on to using the document for what it was created for.
b) Another question that comes up is – do we recheck after the changes are made?
How many times is this process going to go on – work- review-fix-and then reviewed
again? Until when?
No, a review does not have to happen over and over again. It is a quality control activity
that focuses on verifying if the testing aides are created right or not. As always, zero
defect documents are impossible. So a reasonable level of review- one time by a peer is
acceptable.
There, you are done. Isn’t this process simple?
Points to remember:
1. Every project does not have to follow this formalized method of review, but even
if they have an informal method in place, these steps will help set the expectation
and guide you along.
2. Test documentation timeline estimates are typically based on the time required
for creating and reviewing the documents- so it is inbuilt into it even though we
don’t always recognize it.
3. Reviewing is not a process that is limited to manual testing teams. Automation
teams also perform code walkthroughs, design reviews etc.
Lastly, this is how a typical review comments document for test cases looks like. The
comments are in red. Not necessarily real comments, but something to show how it’s
done.
The 5S Method of Improvement - Enhancing Safety,
Productivity and Culture
Costs pile up in the form of defects and waste. Consider these all-too-familiar situations:
• Output does not meet its potential due to crew-to-crew variations.
5S consists of:
• Sorting -- separating the needed from the unneeded. Sorting activities aim to
eliminate unneeded items from the work area and to perform an initial cleaning.
• Simplifying -- a place for everything and everything in its place, clean and ready for
use. Simplifying arranges the workplace to ensure safety and efficiency.
• Systematic Cleaning -- cleaning for inspection. Systematic daily cleaning and
inspection of work areas and equipment help you understand current conditions and
determine if corrective action is required.
• Standardizing -- developing common methods for consistency. Standardizing aims to
make abnormal conditions noticeable and to document agreements to ensure
consistency and sustainability.
• Sustaining -- holding the gains and improving. Sustaining is aimed at maintaining the
improvements from the other 5S activities and improving further.
Implementing 5S
Often, companies mistakenly view 5S as a housekeeping activity. Housekeeping is
housekeeping, not 5S. 5S is a visual system and a system for engaging employees. 5S
must be a team effort and the results must enable anyone to "tell at a glance" what is
right and what is out of place. It also must make doing the work easier. Implementing 5S
occurs in two phases: initial implementation and later refinement.
Since organizing is a key to 5S, eliminating unneeded items comes first. It is wasteful to
find a home for something that is not needed.
Sorting -- Sorting clears the deck for the remaining activities. It can often take weeks to
accomplish in any given area or department. The steps of sorting are:
• Establish criteria for what is not needed. For example, if something hasn't been used
for a year, it may be a candidate for disposal.
• Identify the unneeded items and move to a holding area.
• Dispose of the not needed items, either by transferring to a department that needs
them, selling them, or discarding them.
• Conduct an initial cleaning.
Once the initial sorting is completed, the natural sequence is to get the work area
organized. Simplifying, systematic cleaning, and standardizing go hand-in hand. Simply
simplifying - organizing the work - area will deteriorate if the standards are not set. The
next paragraphs cover each "S" separately, but they work as a system, and must be
performed at the same time, or nearly so.
Simplifying -- Simplifying finds a home for everything. The home should be where the
item will most efficiently be stored. Frequently-used items must be as close to where
they are used as possible. The steps of simplifying are:
• Determine a location for each item based on frequency of use and proper safety zone
(decreasing the likelihood of strain injuries, for example).
• Develop shadowboards and label items - a home for everything.
• Determine how to replenish supplies.
• Document layout, equipment, supplies, and agreements for returning items to their
homes.
Systematic Cleaning -- Systematic cleaning provides a way to inspect, by doing a clean
sweep around a work area. This means visually as well as with a broom or rags. The
idea is make the job of doing daily cleaning and inspections easier. The steps of
systematic cleaning are:
• Identify points to check for performance.
• Determine acceptable performance.
• Mark equipment and controls with visual indicators (e.g., gauges show the correct
range).
• Conduct daily cleaning and visual checks.
Standardizing -- Standardizing assures that everyone knows what is expected. Since
the workplace team establishes the standards, everyone should have had some
involvement in establishing the 5S in their work area. Still, it is important to make these
standards very clear. The steps in standardizing are:
• Establish a routine check sheet for each work area. The check sheet is like a pilot's
pre-flight check list. It shows what the team should check during self-audits.
• Establish a multi-level audit system where each level in the organization has a role to
play in ensuring that 5S is sustained in the work areas and that the 5S system evolves
and strengthens.
• Establish and document standard methods across similar work areas.
• Document any new standard methods for doing the work.
Sustaining -- Sustaining is usually thought of as the toughest "S." However, it doesn't
need to be. The trick is to let the 5S system work for you. When you get to this point,
you should have engaged everyone in the work area during 5S activities and have a
"tell at a glance" visual workplace. If this is so, then sustaining is much easier. That is
important, but not sufficient. A more systematic way to prevent backsliding and to foster
continuous improvement is needed. The steps of sustaining are:
• Determine the 5S level of achievement - the overall grade.
• Perform worker-led routine 5S checks using the 5S check list.
• Address backsliding and new opportunities found during routine checks.
• Conduct scheduled, routine checks by team leads or supervisors or by people from
outside of the workgroup.
• Perform higher-level audits to evaluate how well the 5S system is working overall. For
example, are there systemic issues with sustaining 5S? Often, the company's safety
committee is an excellent body for conducting these audits.
It is through sustaining activities that the practice of 5S is refined. When items aren't
returned to their homes, the cause is most likely to be that the home was inconvenient.
When the work team addresses these problems, they improve the sustainability of 5S
and, more importantly, they improve safety, morale, and productivity.
Measuring the 5S Level of Achievement
Applying the adage, "what gets measured gets done", 5S uses a five-level maturity
matrix to grade the 5S level (illustrated in Figure 3). To illustrate the use of the matrix,
look at the levels from I to V for Simplifying. Level I is a typical starting level where the
work area is an unorganized mess. Achieving Level II for Simplifying requires that
needed items are safely stored according to frequency of use. Frequently-used items
should be close to the point of use. Achieving Level III requires that the correct
quantities of those items have a clearly marked home. Often work areas can achieve
this level relatively quickly by installing shadowboards (outlines showing visually where
items belong). Levels IV and V require additional refinement. Level IV requires that the
number of items in an area are minimized. That means fewer consumables, fewer files
or paperwork, and fewer tools. Level V requires that anyone, even people unfamiliar
with the area, can retrieve any needed item within 30 seconds and with minimal
movement. The overall 5S Level of Achievement is the lowest level attained for any of
the S's. 5S is only as good as its weakest link. If a work area has not addressed
Standardizing and Sustaining, no matter how high the level achieved for the other S's,
the area will eventually revert to a non-5S state.
3R’S
The term the "3Rs" is an acronym for "Reduce,
Reuse, and Recycle." The Ministry of Economy,
Trade and Industry (METI) and other government
agencies are promoting the "3Rs" in order to create a
sustainable society based on the 3Rs: a society that
pursues environmental protection as well as
economic growth.
A. ENUMERATION
1.
2.
3.
4.
5.
6.
7.
8.
B. IDENTIFICATION
A. ENUMERATION
5’S
1. Sorting
2. Simplifying
3. Systematic Cleaning
4. Standardizing
5. Sustain
3’R
1. Reduce
2. Recover
3. Recycle
B. IDENTIFICATION
1. Sustain
2. Standardizing
3. Systematic Cleaning
4. Simplifying
5. Sorting