CSS11 q2 Mod1 InstallandConfigureComputerSystem v5
CSS11 q2 Mod1 InstallandConfigureComputerSystem v5
Computer System
Servicing NCII
MODULE 2:
Install and Configure
Computer Systems
Computer System Servicing NC II0 Grade 11
Alternative Delivery Mode
Quarter 1 – Module 1: Install And Configure Computer Systems
Second Edition, 2021
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency
or office wherein the work is created shall be necessary for exploitation of such work for
profit. Such agency or office may, among other things, impose as a condition the payment
of royalties.
Borrowed materials (i.e., songs, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
Development Team
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Co-Chairpersons: Dr. Victor G. De Gracia Jr. CESO V
Assistant Regional Director
Jonathan S. dela Peña, PhD, CESO V
Schools Division Superintendent
Nimfa R. Lago, PhD, CESO VI
Assistant Schools Division Superintendent
Mala Epra B. Magnaong, Chief ES, CLMD
Greetings!
This module contains training materials and activities for you to finish. You are
required to go through a series of learning activities. If you have questions, don’t
hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems
that is in line with the industry standards. You need to complete this module before
you can perform the next module.
The unit of competency, “Install and Configure Computer Systems“, is one of the
competencies of Computer Systems Servicing NCII, a course which comprises
knowledge, skills and attitudes required for a trainee to possess.
In this module, you are required to go through a series of learning activities in order
to complete each learning outcome. In each learning outcome are Information Sheets,
Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities
on your own. If you have questions, do not hesitate to ask for assistance from your
teacher.
Remember to:
• Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there to
support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way, you
will improve your speed, memory and your confidence.
Introduction
This module is designed to equip you the TVL Open High School Learners with
essential Knowledge, Skills, and Attitude in performing the tasks on Computer System
Servicing which will lead you to acquire National Certificate Level II.
This module includes information and activities to develop desirable values, skills
and understanding through step-by-step procedures and helpful techniques that will guide
you on how to install and configure computer systems. Furthermore, applications to real
life situations are also included for lifelong learning.
1
Pre-Test
What I Know?
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
4. Is the hardware in a computing device where the operating system (OS), application
programs and data in current use are kept so they can be quickly reached by the
device's processor.
a. RAM
b. Operating system
c. CPU
d. HDD
2
6. Identify the malwares.
a. trojan
b. virus
c. spyware
d. all of the choices
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
3
13. What is this?
a. Malware
b. Software
c. Hardware
d. People
4
Definition of Terms
CPU-Central processing unit; the brain of the computer; controls the other elements
of the computer
Disk Drive-A peripheral device that reads and/or writes information on a disk
Hard Drive-A device (usually within the computer case) that reads and writes
information, including the operating system, program files, and data files
Modem-A peripheral device used to connect one computer to another over a phone
line
Monitor-A device used to display information visually
Printer-A peripheral device that converts output from a computer into a printed image
Browser-A program used to view World Wide Web pages, such as Netscape
Navigator or Internet Explorer
Internet-A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols
URL-Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet
Window-A screen in a software program that permits the user to view several programs
at one time
5
What I Need To Know?
Read Information Sheet No. 1.2-2 and find out how much you can
remember. Do Self-Check 1.2-2 to know how much you have learned.
CREATING INSTALLERS
WHAT IS AN IMG OR ISO FILE? An IMG or ISO file is a complete image of physical
media such as a CD-ROM, DVD, floppy disk, etc. that contains all of the files in a
particular package.
6
WHAT DO I DO WITH MY INSTALLATION PACKAGE?
Your installation package contains one of the images identified in the previous section.
To install any software package from an image, the image itself must first be “mounted”
by the Operating System.
• Burning the image directly to DVD making sure to specify the source type as
“image”. Once the burning of the image is complete, the physical media can be
inserted into the computer and will be recognized like any other DVD. You must
have a writable DVD drive. See the Creating Bootable DVD Media section below.
• Burning the image directly to a USB thumbdrive. This is particularly useful for
those people who have Netbooks or other computers without a writable DVD
drive. See the Creating Bootable USB Media section below.
Note: Burning the file to a disk as a “data disk” will simply end up with an
.img or .iso file on the disk, which cannot be used for the installation.
To prepare physical media from a bootable installation image, you require the following:
7
LAUNCHING THE BURNING SOFTWARE
5. Click Burn and wait for the process to Finish , then Exit
.
8
TASK SHEET. 1.2-2
Performance Objective In the Computer Lab, given all the software and a
computer, the learner must be able to create a an installation disk for Drivers,
Applications and Utilities 15 Minutes.
Equipment:
1.Computer
2.Installation Software (Drivers, Application Software and Utilities)
3. PPE
Steps/Procedure:
9
What I Need To Know?
Read Information Sheet No. 1.2-3 and find out how much you can
remember. Do Task Sheet 1.2-3 to know how much you have learned.
To be able Create a Windows bootable USB from an ISO image we must have a
8GB or higher USB and a Windows 10 ISO image downloaded on your computer.
3
5
10
TASK SHEET. 1.2-3
Performance Objective In the Computer Lab, given all the software and a
computer, the trainee must be able to create a bootable Windows in USB Drive in
25 Minutes.
Equipment:
1.Computer
2.Installation Software (Windows ISO File, Rufus, ISO Burner)
3. PPE
Steps/Procedure:
11
What I Need To Know?
Read Information Sheet No. 1.3-1 and find out how much you can
remember. Do Self-Check 1.3-1 to know how much you have learned.
Installing Windows 10
In order to install your copy of the Windows 10 operating system please make sure to
have the following items:
*NOTE: Please make sure to back up all of your important data before proceeding with
this installation.
Boot your computer after popping in the Windows 10 DVD into the DVD Drive/ bootable
USB Drive. In most cases if you do this you'll automatically boot in to the Windows 10
Installation DVD. Bootable USB Drive. But in some cases if the Boot device order is
changed in the BIOS it may boot in to your older OS, instead of our DVD/USB Drive. In
that case you'll need to change the BIOS settings to get it done.
Before the starting installation make sure what type of PC you are using( 32bit or 64 bit)
To do this:
1. Right Click on This PC and click Properties:
2. You will then get the necessary information you need.
12
The steps are pretty straight forward. Please read the descriptions in each pages
carefully before clicking the Next button.
Step 1. Insert the Windows operating
system disk into your DVD/USB drive, and
then restart your computer
Step 2. You will see a prompt that says
‘Press any key to continue’. When you see
this press any key immediately. *NOTE:
The following screen shots may differ from
what you may see during your installation.
Step 3: Starting windows with windows
logo will appear
13
Step 8. “Where do you want to install Windows?” Make
sure the partition is highlighted.
Note: Deleting all the partition will erase all data in the system
14
TASK SHEET. 1.3-1
Performance Objective In the Computer Lab, given all the software and a
computer, the trainee must be able to Install Windows Operating system, Drivers,
Applications and Utilities in 1 hour
Equipment:
1.Computer
2.Installation Software (Windows Operating System Installer, Drivers, Application
Software and Utilities)
3. PPE
Steps/Procedure:
15
What I Need To Know?
Read Information Sheet No. 1.3-2 and find out how much you can
remember. Do Self-Check 1.3-2 to know how much you have learned.
Device driver
More commonly known as a driver, a device driver or hardware driver is a group of files
that enable one or more hardware devices to communicate with the computer's operating
system.
Before searching for the drivers or software of a device, make sure you know the
manufacturer and model of the device.You can often find the drivers available for
download from the manufacturer's web page or the drivers and utilities CD shipped with
your computer. You can find a listing of computer manufacturers in the internet.
16
What order should I install my computer drivers in?
After reinstalling Windows or your operating system you may find that you have to
reinstall many if not all of the drivers for your computer components. Microsoft Windows
and all other operating systems will not require you install drivers in order. As long as you
are installing the correct drivers for your computer you should have no issues installing
the drivers in any order.
follow this link for Tips and Tricks in installing and updating device drivers.
https://www.youtube.com/watch?v=BDtwfRnEl7I
17
What I Need To Know?
Read Information Sheet No. 1.4-1 and find out how much you can
remember. Do Self-Check 1.4-1 to know how much you have learned.
Application software consists of programs designed to perform specific tasks for users.
Both the Microsoft Windows and the Apple Macintosh operating systems use the
concept of a desktop. The desktop is an on-screen work area with common graphical
elements such as icons, buttons, menus, links, windows, and dialog boxes. A software
application can be started by clicking its program name on a menu, or list of commands.
1. People use productivity software to become more effective and efficient while
performing daily activities. Word processing software allows users to create and
manipulate documents that contain text and graphics. With word processing software,
you can insert clip art into a document; change margins; find and replace text; use a
spelling checker to check spelling; place a header and footer at the top and the bottom of
a page; and vary font (character design), font size (character scale), and font style
(character appearance).
2. With spreadsheet software, data is organized in rows and columns, which collectively
are called a worksheet. The intersection of a row and column, called a cell, can contain a
label (text), a value (number), or a formula or function that performs calculations on the
data and displays the result.
18
a notepad to record ideas, reminders, and important information. A software suite is a
collection of individual applications sold as a single package.
6. Project management software allows you to plan, schedule, track, and analyze the
progress of a project. Accounting software helps companies record and report their
financial transactions.
7. Power users often use software that allows them to work with graphics and multimedia.
Computer-aided design (CAD) software assists in creating engineering, architectural,
and scientific designs. Desktop publishing (DTP) software is used to design and produce
sophisticated documents. DTP is developed specifically to support page layout, which is
the process of arranging text and graphics in a document. Paint software is used to draw
graphical images with various on-screen tools. Image editing software provides the
capability to modify existing images. Video editing software and audio editing software
can be used to modify video and audio segments.
10. Photo-editing software is used to edit digital photographs. A clip art/image gallery is
a collection of clip art and photographs that can be used in all types of documents. Home
design/landscaping software assists with planning or remodeling. Educational software
teaches a particular skill and exists for about any subject. Reference software provides
valuable and thorough information for all individuals. Entertainment software includes
interactive games, videos, and other programs designed to support a hobby or provide
amusement.
11. One of the main reasons people use computers is to communicate and share
information. E-mail software is used to create, send, receive, forward, store, print, and
delete e-mail (electronic mail). A Web browser is a software application used to access
and view Web pages. A chat client is software that allows you to connect to a chat room,
which permits users to chat via the computer.
19
12. A newsreader is a software program used to participate in a newsgroup, which is an
online area on the Web where users conduct written discussion about a particular subject.
An instant messenger is a software program installed to use instant messaging (IM), a
real-time communications service that notifies you when one or more people are online
and then allows you to exchange messages or files. Groupware is a software application
that helps groups of people on a network work together and share information. A
videoconference is a meeting between two or more geographically separated people who
use a network or the Internet to transmit audio and video data.
A Web application is a software application that exists on a Web site. To access the
Web application, you visit the Web site that offers the program.
Many software applications and Web sites provide learning aids. Online Help is the
electronic equivalent of a user manual. Usually integrated into an application software
package, online Help often is context-sensitive, meaning that the Help information is
related to the current task being attempted. Most online Help also provide links to Web
sites that have a FAQs page. FAQs (Frequently Asked Questions) supply answers to
common queries. Many books are available to help you learn to use the features of a
personal computer application package. A wizard is an automated assistant that helps
complete a task by asking questions and then performing actions based on the answers.
➢ productivity software,
➢ graphics design/multimedia software,
➢ home/personal/educational software,
➢ and communications software.
An application can belong to more than one category. For example, an e-mail program
can be considered both productivity software and communications software.
Anti-Virus
Overview
Anti-virus is a security program you install on your computer or mobile device to protect
it from getting infected by malware. The term “malware” is a catch-all phrase for any type
of malicious software, such as viruses, worms, Trojans and spyware. In fact, the term
malware comes from combining the words malicious and software. If your computer has
become infected by malware, a cyber attacker can capture all of your keystrokes, steal
20
your documents or use your computer to attack others. Contrary to what some people
believe, any operating system, including Mac OS X and Linux, can be infected.
Browser Hijacker
One type of virus is called a browser hijacker. This works in a way that it takes over parts
of the internet browser you are using and redirects it to certain sites. Its purpose is to
increase advertisement revenue by bringing traffic to certain web pages.
Directory Virus
A second type of virus is known as a Directory Virus and are also called File System Virus
or Cluster Virus. This virus works by changing the path that indicates the files location by
infecting the directory of your computer. These infect the entire directory but are usually
found in a location in the disk. An example is Dir-2 virus. These make it difficult to locate
your files and may seem that files have disappeared.
Trojan
Trojan or Trojan horse is sent to your computer by a program that it is hidden inside . A
trojan disguises itself to make one believe it is an important or useful program. These are
often in highly desirable downloads like games, free software, and even movies or music.
Trojans are different that other viruses, because they don’t multiply or spread. However,
they are very dangerous because they can capture your login information on sites that
you input your information.
Memory Resident Virus are put on your computers memory. When the operating system
runs the virus gets activated and every file that was opened gets infected. Even after
execution of the malicious code the virus stays hidden in the RAM. This virus corrupts
programs and files that are used in any way. Randex, Meve and MrKlunky are some, just
to name a few.
Overwrite Virus
Another type is Overwrite Virus. This virus takes a file and infects it and the information
in it is deleted, once that happens the file is partially useless or totally. The file size is not
changed even though the content has been replaced. The file needs to be deleted, and
you will lose the content originally in it.
Anti-Virus Tips
21
1.Obtain anti-virus software only from known, trusted sources and vendors. It is a
common ploy of cyber attackers to distribute fake anti-virus programs that are really
malware.
2. Make sure you have the latest version of your anti-virus software installed, that your
annual subscription is paid for and active and that your anti-virus is configured to update
automatically. If your computer has been offline or powered off for a while, your anti-virus
software will need to update itself when you turn it back on or reconnect it to the Internet.
Do not postpone these updates.
3. Make sure your anti-virus automatically scans portable media, such as USB sticks, and
ensure real-time protection is on.
4.Pay attention to the on-screen warnings and alerts generated by your anti-virus
software. Most alerts include the option of getting more information or a recommendation
about what to do next. If you get an alert on a work-supplied computer, be sure to contact
the help desk or your supervisor immediately.
5.Do not disable or uninstall your anti-virus software because you feel it is slowing down
your computer, blocking a website or preventing you from installing an app or program.
Disabling your anti-virus will expose you to unnecessary risk and could result in a serious
security incident. If problems persist on a work computer, contact your help desk. If the
problems persist on your personal computer, try contacting the anti-virus vendor, visiting
their website for more information or replacing your anti-virus with another product.
6.Do not install multiple anti-virus programs on your computer at the same time. Doing so
will most likely cause the programs to conflict with each other and may actually reduce
the security of your computer.
7.Learn to recognize the warnings that your anti-virus software produces. Cyber attackers
can set up malicious websites that post very realistic but fake anti-virus warnings and
offer to help you “fix” your computer. Clicking on the links or buttons on these websites
can actually harm your computer.
Visit: https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw
22
Task Sheet 1.3-2
At this point your teacher will again demonstrate how to install an Operating
system, device drivers and third-party application. After which you will be asked to do the
task by yourselves. Below is the rubrics on how you will be assessed.
23
What I Need To Know?
Read Information Sheet No. 1.5-1 and find out how much you can
remember. Do Self-Check 1.5-1 to know how much you have learned.
You were introduced with all the necessary knowledge and skills on installation of
computer devices and operating system. Now, after executing the correct procedures I
am sure that installation is a very easy task for you.
Those skills will be very essential for the next lesson.
In the next phase of your learning it will focus in conducting test on the 588 installed
computer components. After reading all the required topics and performing the essential
skills you must be able to:
✓ Follow OHS policies and procedures in conducting tests;
✓ Check circuits and systems being isolated using specified testing procedures;
✓ Test devices, systems and/or installation to determine its conformity with the
requirements;
✓ Undertake final inspections on the installed devices, systems to ensure conformity
with the requirements;
✓ Accomplish technical reports on the tests conducted; and
✓ Follow procedures in forwarding documentation to appropriate personnel and/or
authority on the test conducted.
You need to adhere to health and safety regulations as they will help to protect you and
others and will avoid any unnecessary legal action for reckless and unsafe working
practices. If you identify any health and safety problems, you should tell yourline manager
or the health and safety representative immediately.
24
The most basic test is to switch the system on to check it starts without errors. ICT
professionals are also likely to use tools and utilities to check that all is well with the
system after an installation.
The Use of Diagnostic Tools in testing installed hardware components and other
peripherals
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the
following:
➢ Digital multimeter is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays
the information on an LCD or LED.
Software Tools
Like hardware tools, there are a variety of software tools that can be used to 643
help technicians pinpoint and troubleshoot problems. Many of these tools are free and
several come with the Windows operating system.
Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able to use
25
a range of software tools to diagnose problems, maintain hardware, and protect the
data stored on a computer.
You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
Use the Windows 10 boot disk for troubleshooting and repairing corrupted files. The
Windows 10 boot disk repairs Windows system files, restores damaged or lost files,
and reinstalls the operating system.
Test procedures
A test procedure is a set of steps to guide you through what needs to be done to
thoroughly test the installation. It is designed to help you work more effectively and to
make sure you test everything that needs testing.
Test procedures are created in-house and could include these steps:
1. Gathering test information. The first step is to run the tests required by the
procedure and find out what happens. You should record all the results of your tests
in a log so that you know which pass and which fail, thereby requiring further action.
2. Validating the test information. The next step is to check the data you gathered
from the tests to make sure it is correct. This is usually done by running the tests
again.
26
3. Responding to test information. This step is important because you need to be
able to recognize when a test shows problems or is successful. For example, if ping
is used to test a network connection then ‘Request timed out’ shows the test was not
successful.
4. Checking specification. The final step is an important end to testing. You need to
check the specification for the installation to make sure that it has been met. For
example, if a user requested an upgrade to make their display run at 1920 x 1200,
then the ICT professional should check that the graphics card and screen can do this.
The external visual inspection consists of a quick inspection of the exterior of the
computer, the monitor, the keyboard, any peripherals, and cables. While performing
the visual inspection, make any necessary corrections. To perform the external visual
inspection, perform the following steps:
6. Verify that the video interface cable is firmly attached to the video connector on the
back panel or to a video expansion card, and also to the connector on the back of the
monitor. For proper connection of the video monitor, see the documentation for the
monitor.
27
7. Inspect all external monitor controls for any obvious damage or improper settings.
For proper settings of the video monitor controls, see the documentation for the
monitor.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys are
sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and indicators, and all
user-accessible data storage devices for any signs of physical damage. Does the
inspection reveal any problems?
After you have performed an external visual inspection as described in the previous
section, you should boot the system and, while the boot routine is running, observe
the system for any indications of problems.
NOTE: Most of the steps in this procedure require observation of system functions
and indications, some of which can occur simultaneously. It may be necessary to
reboot the system several times to complete all of these steps.
To observe problem indications during the boot routine, perform the following steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the
upper-right corner of the keyboard. After all three indicators flash momentarily, and
following a long pause (approximately 30 seconds), the Num Lock indicator should
light up and remain on (unless the Num Lock option is set to Off in the System Setup
program). Do these indicators flash on and off within approximately 10 seconds after
the boot routine starts?
o Yes. Proceed to step 4.
o No. Troubleshoot the system power supply. If the troubleshooting
28
procedure indicates that the system power supply is operational, troubleshoot
the memory.
4. During the boot routine, observe the system for any of the following indications:
o Beep codes — A beep code is a series of beeps that indicates an error condition.
NOTICE: Before you proceed with the internal visual inspection described in this section,
ensure that the user has saved all open files and exited all open application programs if
possible.
A simple visual inspection of a computer’s interior hardware can often lead to the
source of a problem, such as a loose expansion card, cable connector, or mounting
screw. To perform the internal visual inspection, perform the following steps:
1. Turn off the system, including any attached peripherals, and disconnect all the 779 AC
power cables from electrical outlets.
CAUTION: Before beginning to work inside the computer, disconnect the power
supply from the power source and the power supply cables from the power supply.
CAUTION: The heat sink assembly can get extremely hot during system operations.
Be sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp edges
on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
29
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of each
chip.
6. Check all cable connectors inside the computer to verify that they are firmly 788
attached to their appropriate connectors.
8. Reconnect the computer and any attached peripherals to their power sources, 791 and
turn them on.
Is your PC healthy? Don't be too sure. Think back to when you heard a kerklunk sound
coming from the hard drive. Or maybe you remember the last time your Internet
connection was down.
The best way to find out what's wrong is to take a proactive approach: Check under your
PC's hood with the following mostly free diagnostic tools, and see if anything is amiss--
before disaster strikes.
30
3. I/O port and devices
o Connection between the I/O port and the peripheral device
o A faulty cable between the I/O port and the peripheral device
o A faulty peripheral device
o Incorrect settings in the System Setup program
o Incorrect settings in the system's configuration files
o Faulty I/O port logic on the system board
4. Power supply
o Power cord
o Fuse
When a PC is first switched on or reset it performs a special diagnostic test called a POST
(Power-On Self Test), to check all components in the PC, the POST program sends out
a signal to each device initializing each device's built-in self test procedure.
31
The POST test is a two stage process:
1. First, it will check all the basic components including among other things the system
clock, the processor, RAM, the keyboard controller and the Video
2. After the video has been tested the BIOS will then indicate any errors encountered by
displaying either a numeric code or a text message on the screen.
When a device fails the first part of the POST, the BIOS will send a series of beeps from
the PC's speaker (internal) to inform the PC user that there is a problem these beeps are
coded allowing the user to diagnose the troublesome component. When the POST has
been completed successfully, the PC will make a short beep to let the user know
everything is as it should be.
32
Phoenix BIOS ERROR BEEP
CODES
33
Self-Check1.5-1
34
Post-Test
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
a. RAM
b. Operating system
c. CPU
d. HDD
35
6. Identify the malwares.
a. trojan
b. virus
c. spyware
d. all of the choices
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
36
13. What is this?
a. Malware
b. Software
c. Hardware
d. People
Generalization
This module gave you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems that
is in line with the industry standards.
You learned to Assemble computer hardware, Prepare installer, Install operating
system and drivers for peripherals/devices, install application software and conduct
testing and documentation.
This will prepare you to move on to the next lessons to improve and gain important
knowledge and skills in Setting up Computer Networks.
37
Glossary of Terms
Soldering - is a term that describes the process of joining two pieces of metal using a
filler metal.
Memory - Memory is a temporary storage area that holds data and instructions for an
electronic device to function.
Motherboard -A motherboard is a printed circuit board containing the components of an
electronic device.
Processor -This is the hardware within a computer that executes programs.
Microprocessor-A microprocessor is a central processing unit, or CPU, contained on a
single integrated circuit.
Power Supply -The power supply converts main AC current to low-voltage regulated DC
current used to power an electronic device.
Expansion Card -An expansion card is a circuit board that can be added to the
motherboard to give extra memory for processing data.
RAM-Random Access Memory, or RAM, is the term given to computer data storage
used to store frequently accessed data to increase the speed of the system.
38
PS/2 -PS/2 is a six-pin mini-DIN connector used to connect some PC compatible
computers with keyboards and mice.
USB-USB stands for Universal Serial Bus. It is used to connect a computer to devices
and peripherals.
Serial Ports-A serial port is a communication interface that transfers one bit of data in or
out to modems, terminals, and peripherals.
Parallel Ports- A parallel port is a communication interface that transfers several bits of
data simultaneously to peripherals.
Disk Cleanups -Disk cleanups are designed to free up disk space on a computer’s hard
drive.
Antivirus Software -Antivirus software detects and destroys computer viruses. A
computer virus is code that is capable of copying itself to corrupt a system or destroy
data.
Antimalware-Antimalware is software that protects a computer from infections that are
aimed at stealing data from the user or computer.
39
Author
Alexis V. Larosa
Teacher II
Alubijid National Comprehensive High School-Senior High School
Division of Misamis Oriental
40
Key Answers
SELF-CHECK 1.1-1
41
SELF-CHECK 1.1-2
SELF-SCHECK 1.1-5
42
Self-Check 1.1-6
Self-Check 1.2-1
Self-Check1.5-1
43
References
1. http://www.workcover.nsw.gov.au/OHS/default.htm
2. www.cengageasia.com
3. www.wikipedia.com
4. commons.wikimedia.org
Video clips
http://PCitYourself.com
https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw
5S –
http://www.kaizenworld.com/_Media/5s-explanation_med_hr.jpeg
http://www.canstockphoto.com/images-photos/
http://www.netanimations.net/computers.htm
3R –
http://www.ecocentric.co.in/site/wp-content/uploads/2013/07/reduce-reuse-recycle.jpg
http://www.neptunoeng.com/images/3r.png
http://ogs.ny.gov/Global/Images/BU/BA/RPM/Rx3.gif11/2/15
http://www.mymcpl.org/_uploaded_resources/go_green_0.jpg
Effects of contaminants -
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
http://media.salon.com/2015/01/discarded_computers_resize.jpg
44