CSS Part 1
CSS Part 1
COMPETENCY-BASED
LEARNING MATERIALS
SECTOR:
ELECTRONICS SECTOR
QUALIFICATION:
COMPUTER SYSTEM SERVICES NC II
UNIT OF COMPETENCY:
Install and Configure Computer Systems
MODULE TITLE:
Installing and Configure Computer Systems
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente
Computer System
Servicing Part 1
COMPETENCY-BASED LEARNING MATERIAL
The unit of competency “Install and configure computer systems” contains the
knowledge, skills and attitudes required for Computer System Servicing.
You are required to go through a series of learning activities in order to complete each learning
outcomes of the module. In each learning outcome, there are reference materials or instructional
sheets for further reading to help you better understand the required activities. Follow the activities
at your own pace and answer the self-check at the end of each learning outcome. If you have
questions, please feel free to ask for the assistance of your trainer/facilitator.
You may have some or most of the knowledge and skills included in this learner’s guide because
you have:
If you feel that you have some skills, talk to your trainer about having them formally recognized.
If you have a qualification or certificate of competence from previous trainings, show them to your
trainer. If the skills you acquired are still current and relevant to the unit of competency, they may
become part of the evidence you can present for RPL. If you are not sure about the currency of
your skills, discuss this with your trainer.
A Trainee Record Book (TRB) is given to you to record important dates, jobs undertaken and other
workplace events that will assist you in providing further details to your trainer/assessor. A Record
of Achievement/Progress Chart is also provided to your trainer to complete/accomplish once you
have completed the module. This will show your own progress.
This module was prepared to help you achieve the required competency: Install and
configure computer systems. This will be the source of information for you to acquire the
knowledge and skills in this particular module with minimum supervision or help from your
trainer. With the aid of this material, you will acquire the competency independently and at your
own pace.
Talk to your trainer and agree on how you will both organize the training of this unit. Read through
the module carefully. It is divided into sections which covers all the skills and knowledge you
need to successfully complete in this module.
Work through all the information and complete the activities in each section. Do what is asked in
the INSTRUCTIONAL SHEET (INFORMATION SHEET, OPERATION SHEET) and complete
the SELF-CHECK. Suggested references are included to supplement the materials provided in
this module.
Most probably, your trainer will also be your supervisor or manager. He is there to support you
and show you the correct way to do things. Ask for help.
Your trainer will tell you about the important things you need to consider when you are completing
activities and it is important that you listen and take notes.
You will be given plenty of opportunities to ask questions and practice on the job. Make sure you
practice your new skills during regular work shifts. This way, you will improve both your speed
and memory and also your confidence.
Talk to more experienced workmates and ask for their guidance.
Use the self-check questions at the end of each section to test your own progress.
When you are ready, ask your trainer to watch you perform the activities outlined in the module.
As you work through the activities, ask for written feedback on your progress. Your trainer gives
feedback/pre-assessment reports for this reason.
When you have successfully completed each element or learning outcome, ask your trainer to
mark on the reports that you are ready for assessment.
When you have completed this module (several modules) and feel confident that you have had
sufficient practice, your trainer will arrange an appointment to qualified trainer to assess/evaluate
you. The result of your assessment/evaluation will be recorded in your COMPETENCY
ACHIEVEMENT RECORD.
COMPUTER SYSTEM
SERVICING NC II
LIST OF CORE
COMPETENCIES
No Unit of Competency Module Title Code
Contents
HOW TO USE THIS .................................................................................................................... 3
COMPETENCY-BASED LEARNING MATERIAL (CBLM) ................................................ 3
COMPUTER SYSTEM SERVICING NC II ............................................................................. 5
LIST OF CORE COMPETENCIES ........................................................................................... 5
MODULE CONTENT ................................................................................................................ 16
LEARNING OUTCOMES ......................................................................................................... 18
LEARNING EXPERIENCES: INSTALL AND CONFIGURE COMPUTER SYSTEMS. 19
1st Quarter (1st SEMESTER) Computer System Servicing Part 1 ......................................... 20
Lesson 1 ........................................................................................................................................ 21
“Planning and preparing Unit Assembly to ensure OH&S policies and procedures” ......... 21
1st Quarter QUIZ #1 ............................................................................................................... 26
Lesson 2 ........................................................................................................................................ 27
Identifying and Obtaining materials necessary to complete the work................................... 27
“Characteristics of Materials used in Specific Projects” ........................................................... 27
1. Selection of material .......................................................................................................... 27
2. Testing of material ............................................................................................................. 27
3. Cost of material ................................................................................................................. 27
Workplace Procedure ................................................................................................................ 28
TYPES AND WORK-RELATED ERRORS ............................................................................ 30
Quantity of work (untimely completion, limited production) ............................................... 30
Quality of work (failure to meet quality standards) .............................................................. 30
A. Inappropriate behavior (often referred to as "poor attitude") ........................................... 30
B. Resistance to change ......................................................................................................... 30
C. Inappropriate interpersonal relations ................................................................................ 30
D. Inappropriate physical behavior ....................................................................................... 30
Quality Standards ...................................................................................................................... 31
1. Hardware ............................................................................................................................... 31
2. Production Process ................................................................................................................ 31
FAILURE TESTING ............................................................................................................. 31
STATISTICAL CONTROL .................................................................................................. 31
COMPANY QUALITY ........................................................................................................ 32
D. TOTAL QUALITY CONTROL....................................................................................... 32
3. Final Product ......................................................................................................................... 33
MODULE CONTENT
UNIT OF COMPETENCY : INSTALL AND CONFIGURE COMPUTER SYSTEMS
MODULE TITLE : INSTALLING AND CONFIGURE COMPUTER SYSTEMS
MODULE DESCRIPTOR : This module covers the outcomes required in installing and
configuring desktop and workstation computers systems. It consists of competencies to assemble
computer hardware, install operating system and drivers for peripherals/devices, and install
application software as well as to conduct testing and documentation.
ASSESSMENT CRITERIA:
• Unit assembly is planned and prepared to ensure OH&S policies and procedures are
followed in accordance with systems requirements.
• Materials necessary to complete the work are identified and obtained in accordance with
established procedures and checked against systems requirements.
• Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct operation and
safety.
• Computer hardware is assembled in accordance with established procedures and systems
requirements.
• Basic-input-output-system (BIOS) configuration is performed in accordance with
hardware requirements.
• Portable bootable devices are created in accordance with software manufacturer
instruction
• Customized installers are prepared in accordance with software utilization guide and end
user agreement.
• Installation of portable applications are carried out in accordance with software user
guide and software license.
• Operating system (OS) is installed in accordance with established installation procedures
and to comply with end-user requirements
• Peripherals/devices drivers are installed and configured in accordance with
manufacturer’s instructions and/or OS installation procedures.
• OS and driver’s updates/patches are accessed and installed in accordance with
manufacturer’s recommendations and requirements.
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
16
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
• On-going checks of the quality of the work are undertaken in accordance with established
procedures.
• Application software are installed based on software installation guides, end-user
requirements and software license agreement.
• Variation to application software installation is carried out in accordance to
customer/client requirements.
• Software updates are accessed and installed in accordance with manufacturer’s
recommendations and requirements.
• Devices / systems and/or installation is tested to determine whether it conforms to
requirements.
• Stress test is conducted to ensure reliability of equipment in accordance with
manufacturer’s instructions and system requirements.
• 5S and 3Rs are followed according to environmental policies.
• Documentation in relation to the test is forwarded to appropriate personnel and/or
authority in accordance with requirements.
LEARNING OUTCOMES
Upon completion of this module, the trained student must be able to:
❑ Occupational Health and Safety (OHS), 5S and 3Rs are followed according to
environmental policies.
❑ Describe the types of personal computers including workstation, desktop computers, all-
in-one, laptops, desktop replacement, netbooks, and tablets. Describe the differences
between the types.
❑ Discuss each part of the typical personal computer and what it does, including the case,
power supply, processor, motherboard, main memory, hard disk, monitor display, video
card, keyboard and mouse.
❑ Define software
❑ Distinguish between system software and application software
❑ Identify contemporary personal computer operating systems
❑ Recognize input and output devices as peripherals
❑ Identify input devices including mice, keyboards, imaging devices and microphones
❑ Identify pointing devices, imaging devices and display devices
❑ Differentiate between input and output, and between input and output devices
❑ Identify output devices including speakers, printers, monitors, and projectors
❑ Understand the meaning of volatile and non-volatile, and identify examples of each
❑ Distinguish primary memory (for example, RAM) from secondary memory.
❑ Assemble a Personal Computer.
❑ Entering BIOS Setup
❑ Identify three categories of software
❑ Identify families of operating systems.
❑ Describe what an operating system does
❑ Describe what a utility is
❑ Define booting
❑ Installing Operating System
Read Information Sheet 1.1.1 In this Learning Outcome, you’ll be able to know what
Occupational Health and Safety are the OH&S, 5S and 3R
(OHS), 5S and 3Rs are followed
according to environmental policies
Answer Self-Check 1.1.1 and Self- Go through the Self-Check and answer to ensure
Check 1.1.2 acquisition of knowledge on: OHS, 5S and 3R
Read Information Sheet 1.2.1 In this Learning Outcome, you’ll be able to know what
Personal Computer are the Types of Computer
Answer Self-Check 1.2.1 Go through the Self-Check and answer to ensure
acquisition of knowledge on Types Computer
Read Information Sheet 1.3.1 In this Learning Outcome, you’ll be able to know what
Computer Hardware and Software are the Computer Hardware and Software
Answer Self-Check 1.3.1 Go through the Self-Check and answer to ensure
acquisition of knowledge on: Computer Hardware and
Software
Read Information Sheet 1.4.1 In this Learning Outcome, you’ll be able to know what
Computer Devices are the Computer Devices, Input, Output and
Input/Output Devices
Answer Self-Check 1.4.1 Go through the Self-Check and answer to ensure
acquisition of knowledge on: Computer Devices, Input,
Output and Input/Output Devices
Read Information Sheet 1.5.1 How In this Learning Outcome, you’ll be able to know what
to Assemble a Personal Computer are the How to Assemble a Personal Computer
Do the Performance Task Sheet Go through the Operation Sheet and answer to ensure
1.5.1 acquisition of skills on: Disassemble and Assemble a
Personal Computer
Read Information Sheet 1.6.1 BIOS In this Learning Outcome, you’ll be able to know what
configuration procedures, Prepare are the BIOS configuration procedures, Prepare and
and Install Operating System with Install Operating System with Software Driver
Software Driver
Do the Performance Task Sheet Go through the Operation Sheet and answer to ensure
1.6.1 acquisition of skills on: Reformatting a Computer
st
1 Quarter
st
(1 SEMESTER)
Computer System
Servicing Part 1
Lesson 1
“Planning and preparing Unit
Assembly to ensure OH&S policies
and procedures”
✓ Do not work alone so that there's someone who can take care of you in case of
emergency.
✓ Always power off the computer and unplug the computer before working on it.
✓ Take away any liquid near your working area to avoid getting electrocuted or
accidentally damaging computer parts.
✓ Be careful with tools that may cause short circuit.
✓ Always ground or discharge yourself before touching any part of the computer.
✓ Do not use excessive force if things don't quite slip into place.
✓ Clean the area before and after using it to maintain sanitation and prevent accidents.
✓ Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.
✓ Always wear personal protective equipment (PPE) in accordance with the organization's
OHS procedures and practices.
✓ Make sure that the pins are properly aligned when connecting a cable connector.
✓ Contingency measures during workplace accidents, fire and other emergencies are
recognized.
✓ Use brush, compressed air or blower in cleaning the computer system.
Occupational safety and health (OSH) is a planned system of working to prevent illness
and injury where you work by recognizing and identifying hazards and risks. Health and safety
procedure is the responsibility of all persons in the computer and technology industries. You
must identify the hazards where you are working and decide how dangerous they are. Eliminate
the hazard or modify the risk that it presents.
If not…
1. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to
obtain assistance
2. Following clearing of the hazard fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards.
All hazards must be reported using Accidental Report form. This enables us to track the kinds of
hazards we have in our workplace, and take action where necessary to make it safer for all
student and clients.
ACCIDENT REPORTS
Forms are used to give specific details with regards to the accidents happened in the laboratory
during experiments.
Accident reports contain the
following details:
• Name of the person
injured
• Date and time of the
accident
• Type of injury
• First aid given
• Action taken to prevent
further accidents
HAZARDOUS SUBSTANCES
If the workplace hazard appears to be dangerous to staff and clients and professional assistance is
required:
FIRE EXITS
All fire exits should be kept clear of
from obstacles. All students have a
responsibility to make sure that
chairs, empty boxes or any other type
of obstacle are not placed in or near
fire exit doorways.
All corridors also need to have
equipment stored on one side only to
ensure that in the event of an
emergency there is a clear exit.
If the designated fire officer is not present, someone quickly needs to take
responsibility and:
• Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked or
seriously injured in an electrical accident.
• Do not work on components that are plugged into their power source.
• Do not remove expansion cards from a computer when it is turned on.
• Remove jewelries when working inside any computer related equipment.
• Be sure not to mix electronic components and water
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Lesson 2
Identifying and Obtaining materials
necessary to complete the work
“Characteristics of Materials used in Specific Projects”
The student must relate material properties to product and process quality. These are the
factors that must be taken into consideration when choosing the right material for their
components and assemblies:
1. Selection of material
Material selection is one of the most common tasks for design engineering. The ability
to assess the material’s impact on the performance of a product is crucial for reliable
performance. Sometimes, buyers are also considering the label or name of the company which
are producing great quality of materials and are known in the market. Examples are the name HP
for printer and Intel for some computer hardware.
2. Testing of material
The testing of material properties is widely understood to be the key to obtaining data for
a project, performing failure analysis, or understanding material interactions. Material testing
also provides information on the quality of incoming and outgoing products. Inspection test
equipment and techniques are demonstrated for a wide range of materials and assemblies during
the class. This provides the participants with both knowledge of the common failure modes.
3. Cost of material
The cost of material is also considered when buying or selecting materials for a
specific project. The amount may vary but never taken for granted the quality and the reliability
of the material. Will you buy material which is less expensive but worst quality? Will you buy
material which you cannot afford? People look for places which can meet their standards and
right cost for materials to buy.
Characteristic of common materials for increased security is also a great factor in the design and
planning process. Evaluation of longevity criteria and assessment of site environmental factors are vital
to project planning.
Specific knowledge about the project and general common sense must dictate design and material
selection. Although many materials can offer enhanced protection, often the most cost-efficient and readily
available material that provides reasonable life expectancy for the project must be considered.
Before planning and designing takes place, you should evaluate the material options and
system requirements. Add several useful reference manuals to their
libraries such as installation of hardware, networking,
troubleshooting as well as basic PC Operation and Internet for
additional information that the students may used in their projects.
The characteristic of the materials to be used for specific project
must be:
✓ of good quality
- This is the most important factor when choosing materials to buy. Products
with good quality are long-lasting and safe to use because you know that it
follows certain standards before being commercialized.
✓ reliable
- It means that you can be sure that it will perform its function well, will
operate safely and will give the best it could give.
✓ low cost
- It doesn’t mean that you will choose for the less expensive one and exclude
the quality. Low cost means you can afford to buy the materials without
hurting your pocket and assure of better quality.
Workplace Procedure
Workplace Procedure is a set of written instructions that identifies the health and safety
issues that may arise from the jobs and tasks that make up a system of work.
A safe working procedure should be written when:
• reviewing a procedure when problems have been identified, example from an accident or
incident investigation
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
28
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
• the teacher for the task or job and the students who will undertake
the task
• the control measures that have been formulated for these tasks
and assess risk, as well as follow instructions and procedure in the workplace with minimal
supervision. The students will also be capable of participating and contributing to OHS
management issues.
Follow procedures and strategies for 2.1 Report hazards in the work area to designated
Quality Standards
Standards are sets of rules that outline specification of dimensions, design of operation,
materials and performance, or describe quality of materials, products or systems. These
standards should cover the performance expectations of the product for particular applications.
The intent of standards is to provide at least minimum quality, safety or performance
specifications so as to ensure relatively uniform products and performance, and to remove
ambiguity as to the suitability of certain commercial products for particular applications.
Following standards may reduce the risk of error in working.
1. Hardware
The durability of the work depends on the quality of its
component parts and the assembly skills of those who install it. If the
best-quality products or hardware are used but are installed
incorrectly, the system will be a failure.
The application of suitable hardware and products must be supported by adequate levels
of training of person who use them so that they can identify and use only appropriate products.
In judging a product or hardware, the person must consider factors such as the following: Is
the product or hardware under consideration suitable for the application or purpose?
• Will it be harmful to the health of the community in its normal use?
• Is there a risk of this hardware being released into the environment (e.g. the water) in
the first instance or after the working life of the product or hardware has expired?
2. Production Process
FAILURE TESTING
A valuable process to perform on a whole consumer product is failure testing, the
operation of a product until it fails, often under stresses such as increasing vibration, temperature
and humidity. This exposes many unanticipated weaknesses in a product, and the data is used to
drive engineering and manufacturing process improvements.
STATISTICAL CONTROL
Many organizations use statistical process control to bring the organization to Six Sigma
levels of quality, in other words, so that the likelihood of an unexpected failure is confined to six
standard deviations on the normal distribution. Traditional statistical process controls in
manufacturing operations usually proceed by randomly sampling and testing a fraction of the
output. Variances of critical tolerances are continuously tracked, and manufacturing processes are
corrected before bad parts can be produced.
1. Marketing had to carry out their work properly and define the customer’s specifications.
2. Specifications had to be defined to conform to these requirements.
3. Conformance to specifications i.e. drawings, standards and other relevant documents, were
introduced during manufacturing, planning and control.
4. Management had to confirm all operators are equal to the work imposed on them and
holidays, celebrations and disputes did not affect any of the
quality levels.
5. Inspections and tests were carried out, and all
components and materials, bought in or otherwise,
conformed to the specifications, and the measuring
equipment was accurate, this is the responsibility of the
QA/QC department.
6. Any complaints received from the customers were satisfactorily dealt with in a timely
manner.
7. Feedback from the user/customer is used to review designs.
8. Consistent data recording and assessment and documentation
integrity.
To conclude, the above forms are the basis from which the
philosophy of Quality Assurance has evolved, and the achievement of
quality or the “fitness-for-purpose” is “Quality Awareness” throughout the company.
3. Final Product
Quality System Contents
Requirements
1. Management 1. Define and document commitment, policy and objec- tives,
responsibility responsibility and authority, verification resources and
personnel. Appoint a management representative and
conduct regular reviews of the system
2. Establish and maintain a documented quality system
2. Quality system
ensuring that products conform to specified requirements
3. Ensure that customer's contractual requirements are
3. Contract Review evaluated and met
4. Plan, control and verify product development to ensure that
4. Product specified requirements are met
development 5. System for control and identification of all documents
regarding quality, e.g. procedures, instructions, and
5. Document control specifications
6. Ensure that purchased products conform to specified
6. Purchasing requirements
7. System to identify and control traceability of product at all
7. Product stages from raw materials through production to the final
8. identification and product as delivered to the customer
traceability 8. Ensure and plan the control of production which directly
effects quality by documented work instructions, monitoring
9. Process control
and control of processes
9. Inspect and test incoming products, intermediate and final
product; establish product conformance to specified
requirements and identify non-conforming pro- ducts;
maintain inspection and test records
10. Inspection and testing 10. Selection and control of equipment to ensure
reliability and accuracy in measuring data
11. Inspection, measuring and test equipment 11. For the whole process the products shall be
12. Inspection and test status identified and clearly marked concerning test
status, including indication of conformance or
13. Control of nonconforming products non-conformance
Corrective actions
14. Handling, storage packaging and
15. Quality records
15. Records, including those which demonstrate
16. Internal Quality Audits
that the specified requirements have been met,
17. Training
shall be control- led and maintained
18. Cleaning and Disinfection
16. Regular, planned internal audits shall be
19. Personal hygiene carried out,
documented and recorded to verify the
effectiveness of the quality system
17. Training requirements at all levels shall be
identified and the training planned, conducted and
recorded
18. Although not required by the ISO 9000
standards, these two points should be given
special attention in all food companies
4. Customer Service
According to Turban et al, 2002, “Customer service is a series of activities designed to
enhance the level of customer’s satisfaction – that is, the feeling that a product or service has met
the customer’s expectation”. Its importance varies by product, industry and customer.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
III. Write QN if the statement affects the quantity of work and QL if the statement
affects the quality of work. Write your answer on the space provided before each number.
IV. Write TRUE if the statement is correct and FALSE if the otherwise is wrong.
________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Quality Standards
Lesson 3
Obtaining tools, equipment and testing
devices needed to carry out the
installation
Computer Lab Procedures and Tool Use
Lesson Description
This lesson discusses safe lab procedures and basic safety practices for the workplace, correct
tool usage, and the proper disposal of computer components and supplies. The guidelines
presented help keep IT workers safe while protecting the environment and workplace from
contamination caused by improperly discarded materials.
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
Hardware Tools
For every job there is the right tool. Make sure that you are familiar with the correct use of each
tool and that the correct tool is used for the current task. Skilled use of tools and software makes
the job less difficult and ensures that tasks are performed properly and safely.
A toolkit should contain all the tools necessary to complete hardware repairs. As you gain
experience, you learn which tools to have available for different types of jobs. Hardware tools
are grouped into four categories:
• ESD tools
• Hand tools
• Cleaning tools
• Diagnostic tools
ESD Tools
There are two ESD tools: the antistatic wrist strap and the antistatic mat. The antistatic wrist
strap protects computer equipment when grounded to a computer chassis. The antistatic mat
protects computer equipment by preventing static electricity from accumulating on the hardware
or on the technician.
Hand Tools
Most tools used in the computer assembly process are small hand tools. They are available
individually or as part of a computer repair toolkit. Toolkits range widely in size, quality, and
price. Some common hand tools and their uses are:
Cleaning Tools
Having the appropriate cleaning tools is essential when maintaining and repairing computers.
Using the appropriate cleaning tools helps ensure that computer components are not damaged
during cleaning. Cleaning tools include the following:
• Soft cloth: Used to clean different computer components without scratching or leaving
debris
• Compressed air: Used to blow away dust and debris from different computer parts
without touching the components
• Cable ties: Used to bundle cables neatly inside and outside of a computer
• Parts organizer: Used to hold screws, jumpers, fasteners, and other small parts and
prevents them from getting mixed together
Diagnostic Tools
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the following:
• A digital multimeter, as shown in Figure 2-3, is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of electricity in computer
components. A digital multimeter displays the information on an LCD or LED.
Figure 2-3.Multimeter
• A loopback adapter, also called a loopback plug, tests the basic functionality of computer
ports. The adapter is specific to the port that you want to test.
• The toner probe, as shown in Figure 2-4, is a two-part tool. The toner part is connected to
a cable at one end using specific adapters, such as an RJ-45, coaxial, or metal clips. The
toner generates a tone that travels the length of the cable. The probe part traces the cable.
When the probe is in near proximity to the cable to which the toner is attached, the tone
can be heard through a speaker in the probe.
Although an external hard drive enclosure is not a diagnostic tool, it is often used when
diagnosing and repairing computers. The customer hard drive is placed into the external
enclosure for inspection, diagnosis, and repair using a known-working computer. Backups can
also be recorded to a drive in an external enclosure to prevent data corruption during a computer
repair.
Software Tools
Like hardware tools, there are a variety of software tools that can be used to help technicians
pinpoint and troubleshoot problems. Many of these tools are free and several come with the
Windows operating system.
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
40
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
Software tools help diagnose computer and network problems and determine which computer
device is not functioning correctly. A technician must be able to use a range of software tools to
diagnose problems, maintain hardware, and protect the data stored on a computer.
You must be able to identify which software to use in different situations. Disk management
tools help detect and correct disk errors, prepare a disk for data storage, and remove unwanted
files.
• FDISK: A command-line tool that creates and deletes partitions on a hard drive. The
FDISK tool is not available in Windows XP, Vista, or 7. It has been replaced with the
Disk Management tool.
• Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
• Format: Prepares a hard drive to store information.
• ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by
scanning the file system. These tools might also check the disk surface for physical
errors.
• Defrag: Optimizes space on a hard drive to allow faster access to programs and data.
• Disk Cleanup: Clears space on a hard drive by searching for files that can be safely
deleted.
• System File Checker (SFC): A command-line tool that scans the operating system
critical files and replaces files that are corrupted.
Use the Windows 7 boot disk for troubleshooting and repairing corrupted files. The Windows 7
boot disk repairs Windows system files, restores damaged or lost files, and reinstalls the
operating system.
Each year, viruses, spyware, and other types of malicious attacks infect millions of computers.
These attacks can damage operating systems, applications, and data. Computers that have been
infected may even have problems with hardware performance or component failure.
To protect data and the integrity of the operating system and hardware, use software designed to
guard against attacks and to remove malicious programs.
• Windows 7 Action Center: Checks the status of essential security settings. The Action
Center continuously checks to make sure that the software firewall and antivirus
programs are running. It also ensures that automatic updates download and install
automatically.
• Antivirus program: Protects against virus attacks.
• Antispyware program: Protects against software that sends information about web
surfing habits to an attacker. Spyware can be installed without the knowledge or consent
of the user.
• Window 7 Firewall: Runs continuously to protect against unauthorized communications
to and from your computer.
Organizational Tools
Keeping accurate records and journals during a busy workday can be challenging. Many
organizational tools, such as work-order systems, can help the technician document their work.
Reference Tools
A technician must document all repairs and computer problems. The documentation can then be
used as a reference for future problems or for other technicians who may not have encountered
the problem before. The documents can be paper based, but electronic forms are preferred
because they can be easily searched for specific problems.
It is important that a technician document all services and repairs. These documents need to be
stored centrally and made available to all other technicians. The documentation can then be used
as reference material for similar problems that are encountered in the future. Good customer
service includes providing the customer with a detailed description of the problem and the
solution.
Personal reference tools include troubleshooting guides, manufacturer manuals, quick reference
guides, and repair journals. In addition to an invoice, a technician keeps a journal of upgrades
and repairs. The documentation in the journal includes descriptions of the problem, possible
solutions that have been attempted, and the steps taken to repair the problem. Note any
configuration changes made to the equipment and any replacement parts used in the repair. This
documentation is valuable when you encounter similar situations in the future.
• Notes: Make notes as you go through the troubleshooting and repair process. Refer to
these notes to avoid repeating previous steps and to determine what steps to take next.
• Journal: Document the upgrades and repairs that you perform. Include descriptions of
the problem, possible solutions that have been tried to correct the problem, and the steps
taken to repair the problem. Note any configuration changes made to the equipment and
any replacement parts used in the repair. Your journal, along with your notes, can be
valuable when you encounter similar situations in the future.
• History of repairs: Make a detailed list of problems and repairs, including the date,
replacement parts, and customer information. The history allows a technician to
determine what work has been performed on a specific computer in the past.
The Internet is an excellent source of information about specific hardware problems and possible
solutions:
Miscellaneous Tools
With experience, you will discover many additional items to add to the toolkit. Figure 2-5 shows
how a roll of masking tape can be used to label parts that have been removed from a computer
when a parts organizer is not available.
A working computer is also a valuable resource to take with you on computer repairs in the field.
A working computer can be used to research information, download tools or drivers, and
communicate with other technicians.
Figure 2-6 shows the types of computer replacement parts to include in a toolkit. Make sure that
the parts are in good working order before you use them. Using known good components to
replace possible bad ones in computers helps you quickly determine which component is not
working properly.
Safety in
the workplace is everyone’s responsibility. You are much less likely to injure yourself
or damage components when using the proper tool for the job.
Before cleaning or repairing equipment, make sure that your tools are in good condition. Clean,
repair, or replace items that are not functioning adequately.
An example of ESD is the small shock that you receive when you walk across a carpeted room
and touch a doorknob. Although the small shock is harmless to you, the same electrical charge
passing from you to a computer can damage its components. Self-grounding or wearing an
antistatic wrist strap can prevent ESD damage to computer components.
The purpose of self-grounding or wearing an antistatic wrist strap is to equalize the electrical
charge between you and the equipment. Self-grounding is done by touching a bare metal part of
a computer case. The antistatic wrist strap is a conductor that connects your body to the
equipment that you are working on. When static electricity builds up in your body, the
connection made by the wrist strap to the equipment, or ground, channels the electricity through
the wire that connects the strap.
As shown in Figure 2-7, the wrist strap has two parts and is easy to wear. Following is the proper
procedure for using an antistatic wrist strap:
• Step 1. Wrap the strap around your wrist and secure it using the snap or Velcro. The
metal on the back of the wrist strap must remain in contact with your skin at all times.
• Step 2. Snap the connector on the end of the wire to the wrist strap, and connect the other
end either to the equipment or to the same grounding point that the antistatic mat is
connected to. The metal skeleton of the case is a good place to connect the wire. When
connecting the wire to equipment that you are working on, choose an unpainted metal
surface. A painted surface does not conduct electricity as well as unpainted metal.
NOTE
Attach the wire on the same side of the equipment as the arm wearing the antistatic wrist strap. This helps
keep the wire out of the way while you are working.
Although wearing a wrist strap helps prevent ESD, you can further reduce the risks by not wearing
clothing made of silk, polyester, or wool. These fabrics are more likely to generate a static charge.
NOTE
Technicians should roll up their sleeves, remove scarves or ties, and tuck in shirts to prevent
interference from clothing. Ensure that earrings, necklaces, and other loose jewelry are properly
secured.
CAUTION
Never wear an antistatic wrist strap if you are repairing a CRT monitor or a power supply unit.
Antistatic Mat
You might not always have the option to work on a computer in a properly equipped workspace.
If you can control the environment, try to set up your workspace away from carpeted areas.
Carpets can cause the buildup of electrostatic charges. If you cannot avoid the carpeting, ground
yourself to the unpainted portion of the case of the computer on which you are working before
touching any components.
An antistatic mat is slightly conductive. It works by drawing static electricity away from a
component and transferring it safely from equipment to a grounding point, as shown in Figure 2-
8. Following is the proper procedure for using an antistatic mat:
• Step 1. Lay the mat on the workspace next to or under the computer case.
• Step 2. Clip the mat to the case to provide a grounded surface on which you can place parts as you remove
them from the system.
When you are working at a workbench, ground the workbench and the antistatic floor mat. By
standing on the mat and wearing the wrist strap, your body has the same charge as the equipment
and reduces the probability of ESD. Either connect the table-top mat and the floor mat to each
other, or connect both to the electrical earth ground.
Reducing the potential for ESD reduces the likelihood of damage to delicate circuits or
components.
NOTE
Hand Tools
A technician needs to be able to properly use each tool in the toolkit. This topic covers many of
the various hand tools used when repairing computers.
Screws
Match each screw with the proper screwdriver. Place the tip of the screwdriver on the head of the
screw. Turn the screwdriver clockwise to tighten the screw and counterclockwise to loosen the
screw.
Screws can become stripped if you over-tighten them with a screwdriver. A stripped screw, as
shown in Figure 2-9, may get stuck in the screw hole, or it may not tighten firmly. Discard
stripped screws.
Flat-Head Screwdriver
Use a flat-head screwdriver when you are working with a slotted screw. Do not use a flat-head
screwdriver to remove a Phillips-head screw. Never use a screwdriver as a pry bar. If you cannot
remove a component, check to see if there is a clip or latch that is securing the component in
place.
CAUTION
If excessive force is needed to remove or add a component, something is probably wrong. Take a
second look to make sure that you have not missed a screw or a locking clip that is holding the
component in place. Refer to the device manual or diagram for additional information.
Phillips-Head Screwdriver
Use a Phillips-head screwdriver with crosshead screws. Do not use this type of screwdriver to
puncture anything. This will damage the head of the screwdriver.
Hex Driver
Use a hex driver, shown in Figure 2-10, to loosen and tighten bolts that have a hexagonal (six-
sided) head. Hex bolts should not be over-tightened because the threads of the bolts can be
stripped. Do not use a hex driver that is too large for the bolt that you are using.
CAUTION
Some tools are magnetized. When working around electronic devices, be sure that the tools you
are using have not been magnetized. Magnetic fields can be harmful to data stored on magnetic
media. Test your tool by touching the tool with a screw. If the screw is attracted to the tool, do
not use the tool.
CAUTION
Pencils should not be used inside the computer to change the setting of switches or to pry off
jumpers. The pencil lead can act as a conductor and may damage the computer components.
A computer technician needs proper tools to work safely and prevent damage to the computer
equipment. A technician uses many tools to diagnose and repair computer problems:
Various specialty tools, such as Torx bits, antistatic bags and gloves, and integrated circuit
pullers, can be used to repair and maintain computers. Always avoid magnetized tools, such as
screwdrivers with magnetic heads, or tools that use extension magnets to retrieve small metal
objects that are out of reach. Using magnetic tools can cause loss of data on hard drives and
floppy disks. Magnetic tools can also induce current, which can damage internal computer
components.
Additionally, there are specialized testing devices used to diagnose computer and cable
problems:
• Multimeter: A device that measures AC/DC voltage, electric current, and other cable
and electrical characteristics.
• Power supply tester: A device that checks whether the computer power supply is
working properly. A simple power supply tester might just have indicator lights, while
more advanced versions show the amount of voltage and amperage.
• Cable tester: A device that checks for wiring shorts or faults, such as wires connected to
the wrong pin.
• Loopback plug: A device that connects to a computer, hub, switch, or router port to
perform a diagnostic procedure called a loopback test. In a loopback test, a signal is
transmitted through a circuit and then returned to the sending device to test the integrity
of the data transmission.
Cleaning Materials
Keeping computers clean inside and out is a vital part of a maintenance program. Dirt can cause
problems with the physical operation of fans, buttons, and other mechanical components. On
electrical components, an excessive buildup of dust acts like an insulator and traps the heat. This
insulation impairs the ability of heat sinks and cooling fans to keep components cool, causing
chips and circuits to overheat and fail.
NOTE
When using compressed air to clean inside the computer, blow the air around the components
with a minimum distance of 4 in. (10 cm) from the nozzle. Clean the power supply and the fan
from the back of the case.
CAUTION
Before cleaning any device, turn it off and unplug the device from the power source.
Clean computer cases and the outside of monitors with a mild cleaning solution on a damp, lint-
free cloth. Mix one drop of dishwashing liquid with 4 oz (118 ml) of water to create the cleaning
solution. If water drips inside the case, allow enough time for the liquid to dry before powering
on the computer.
LCD Screens
Do not use ammoniated glass cleaners or any other solution on an LCD screen, unless the cleaner
is specifically designed for the purpose. Harsh chemicals damage the coating on the screen.
There is no glass protecting these screens, so be gentle when cleaning them and do not press
firmly on the screen.
CRT Screens
To clean the screens of CRT monitors, dampen a soft, clean, lint-free cloth with distilled water
and wipe the screen from top to bottom. Then use a soft, dry cloth to wipe the screen and remove
streaking.
Components
Clean dusty components with a can of compressed air. Compressed air does not cause
electrostatic buildup on components. Make sure that you are in a well-ventilated area before
blowing the dust out of the computer. A best practice is to wear a dust mask to make sure that
you do not breathe in the dust particles.
Blow out the dust using short bursts from the can. Never tip the can or use the can upside down.
Do not allow the fan blades to spin from the force of the compressed air. Hold the fan in place.
Fan motors can be ruined from spinning when the motor is not turned on.
Component Contacts
Clean the contacts on components with isopropyl alcohol. Do not use rubbing alcohol. Rubbing
alcohol contains impurities that can damage contacts. Make sure that the contacts do not collect
lint from the cloth or cotton swab. Before reinstallation, use compressed air to blow lint off the
contacts.
Keyboards
Clean a desktop keyboard with compressed air and then use a handheld vacuum cleaner with a
brush attachment to remove the loose dust.
CAUTION
Never use a standard vacuum cleaner inside a computer case. The plastic parts of the vacuum
cleaner can build up static electricity and discharge to the components. Use only vacuums that
are approved for electronic components.
Mice
Use glass cleaner and a soft cloth to clean the outside of the mouse. Do not spray glass cleaner
directly on the mouse. If cleaning a ball mouse, you can remove the ball and clean it with glass
cleaner and a soft cloth. Wipe the rollers clean inside the mouse with the same cloth. Do not
spray any liquids inside the mouse.
Table 2-1 shows the computer items that you should clean and the cleaning materials to use.
Computer case and outside of Mild cleaning solution and lint-free cloth
monitor
LCD screen LCD cleaning solution or distilled water and lint-free
cloth
CRT screen Distilled water and lint-free cloth
Heat sink Compressed air
RAM Isopropyl alcohol and lint-free swab
Keyboard Handheld vacuum cleaner with a brush attachment
Mouse Glass cleaner and a soft cloth.
1. How should a technician discharge static buildup while working on a computer system?
A. Maintain contact with the painted part of the computer case.
B. Maintain contact with an unpainted part of the computer case.
C. Touch an antistatic wrist strap before touching any computer equipment.
D. Touch an antistatic mat before touching any computer equipment.
2. Which of the following is a fact sheet that summarizes information about material
identification, including hazardous ingredients that can affect personal health, fire
hazards, and first aid requirements?
A. ESD
B. MSDS
C. OSHA
D. UPS
3. Which two statements are true of static electricity? (Choose two.)
A. It can distort wireless signals.
B. More than 10,000 volts can build up on a person.
C. As few as 30 volts can damage computer components.
D. It will not harm computer components as long as the computer is plugged in.
E. Keeping the air cool and dry can decrease the buildup of static electricity.
F. It is generated by devices such as motors, power lines, and radio transmitters.
4. Which recommendation should be followed first when a fire in the workplace is out of
control?
A. Try to use the elevators to get to the lowest floor faster.
B. Get out of the room or building and contact emergency services for help.
C. Use the company water system to stop the fire from extending to other areas.
D. Try to control the fire with proper extinguishers.
5. Which device is designed specifically to protect computers and electrical devices from
excess electrical voltage?
A. Power strip
B. Standby power supply
C. Surge protector
D. Uninterruptible power supply
6. Which piece of software is designed to protect against unauthorized communications to
and from a computer?
A. Security center
B. Port scanner
C. Antimalware
D. Antivirus
E. Firewall
7. What is an accepted method for cleaning computer components?
A. Using ammonia to clean the LCD screen
B. Using rubbing alcohol to clean component contacts
C. Using a lint-free cloth to remove dust inside the computer case
D. Using glass cleaner on a soft cloth to clean the outside of the mouse
8. Which tool would be used to scan Windows critical system files and replace any
corrupted files?
A. SFC
B. CHKDSK
C. Fdisk
D. Defrag
9. Which condition refers to a sudden and dramatic increase in voltage, which is usually
caused by lighting?
A. Brownout
B. Sag
C. Spike
D. Surge
10. Which tool can be used to take resistance and voltage measurements?
A. Multimeter
B. power supply tester
C. cable tester
D. loopback plug
In this worksheet, use the Internet to gather information about a hard drive diagnostic program. Be prepared to
discuss the diagnostic software you researched. Write the information you gather in a sheet of paper.
Lesson 4
“Personal Computers”
Personal Computer is a general-purpose
computer whose size, capabilities and original
sale price make it useful for individuals, and is
intended to be operated directly by an end-user
with no intervening computer operator. This
contrasts with the batch processing or time-
sharing models that allowed larger, more
expensive minicomputer and mainframe systems
to be used by many people, usually at the same
https://images.app.goo.gl/dupXLkWNxZcfy6JW time. A related term is “PC” that was initially an
6
acronym for “personal computer,” but later became used primarily to refer to the ubiquitous
Wintel platform.
Software applications for most personal computers include, but are not limited to, word
processing, spreadsheets, databases, web browsers and e-mail clients, digital media playback,
games and myriad personal productivity and special-purpose software applications. Modern
personal computers often have connections to the Internet, allowing access to the World Wide
Web and a wide range of other resources. Personal computers may be connected to a local area
network (LAN), either by a cable or a wireless connection. A personal computer may be a
desktop computer or a laptop, netbook, tablet or a handheld PC.
History
The Programma 101 was the first commercial
“desktop personal computer”, produced by the
Italian company Olivetti and invented by the
Italian engineer Pier Giorgio Perotto, inventor of
the magnetic card system. The project started in
1962.
In what was later to be called the Mother of All Demos, SRI researcher Douglas Engelbart in
1968 gave a preview of what would become the staples of daily working life in the 21st century:
e-mail, hypertext, word processing, video conferencing and the mouse. The demonstration
required technical support staff and a mainframe time-sharing computer that were far too costly
for individual business use at the time.
The first successfully mass marketed personal computer was the Commodore PET introduced in
January 1977, but back-ordered and not available until later in the year. At the same time, the
Apple II (usually referred to as the “Apple”) was introduced (June 1977), and the TRS-80 from
Tandy Corporation/Tandy Radio Shack in summer 1977, delivered in September in a small
number. Mass-market ready-assembled computers allowed a wider range of people to use
computers, focusing more on software applications and less on development of the processor
hardware.
Somewhat larger and more expensive systems (for example, running CP/M), or sometimes a
home computer with additional interfaces and devices, although still low-cost compared with
minicomputers and mainframes, were aimed at office and small business use, typically using
“high resolution” monitors capable of at least 80 column text display, and often no graphical or
color drawing capability.
Workstations were characterized by high-performance processors and graphics displays, with
large-capacity local disk storage, networking capability, and running under a multitasking
operating system.
Eventually, due to the influence of the IBM PC on the
personal computer market, personal computers and
home computers lost any technical distinction.
Business computers acquired color graphics
capability and sound, and home computers and game
systems users used the same processors and operating
systems as office workers. Mass-market computers
had graphics capabilities and memory comparable to
dedicated workstations of a few years before. Even
IBM 5150, released in 1981 local area networking, originally a way to allow
business computers to share expensive mass storage
and peripherals, became a standard feature of personal computers used at home.
In 1982 “The Computer” was named Machine of the Year by Time Magazine.
In the 2010s, several companies such as Hewlett-Packard and Sony sold off their PC and laptop
divisions. As a result, the personal computer was declared dead several times during this time.
Terminology
“PC” is an initialism for “personal computer.” However, it is used in a different sense: It means a
personal computer with an Intel x86-compatible processor running Microsoft Windows
(sometimes called Wintel). “PC” is used in contrast with “Mac”, an Apple Macintosh computer.
This sense of the word is used in Get a Mac advertisement campaign that run between 2006 to
2009, as well as its rival, I’m a PC campaign, that appeared on 2008.
Types
Workstation
Workstation is a high-end personal
computer designed for technical,
mathematical, or scientific applications.
Intended primarily to be used by one
person at a time, they are commonly
connected to a local area network and run
multi-user operating systems.
Workstations are used for tasks such as
computer-aided design, drafting and
https://images.app.goo.gl/26LG4AN1ZV7S3uqY6 modeling, computation-intensive
scientific and engineering calculations,
image processing, architectural modeling, and computer graphics for animation and motion
picture visual effects.
Desktop Computer
Prior to the widespread usage of
PCs, a computer that could fit on a desk
was remarkably small, leading to the
“desktop” nomenclature. More recently, the
phrase usually indicates a particular style of
computer case. Desktop computers come in
a variety of styles ranging from large
vertical tower cases to small models which
can be tucked behind an LCD monitor. In
https://images.app.goo.gl/dupXLkWNxZcfy6JW6
this sense, the term “desktop” refers
specifically to a horizontally oriented case,
usually intended to have the display screen placed on top to save desk space. Most modern
desktop computers have separate screens and keyboards.
Gaming Computer
Gaming computer is a standard desktop
computer that typically has high-performance
hardware, such as a more powerful video card,
processor and memory, in order to handle the
requirements of demanding video games, which
are often simply called “PC games.” A number
of companies, such as Alienware, manufacture
prebuilt gaming computers, and companies such
as Razer and Logitech market mice, keyboards
and headsets geared toward gamers.
https://images.app.goo.gl/X6VXX3HgR2a5CJPM7
Single Unit
Single-unit PCs (also known as all-in-one PCs)
are a subtype of desktop computers that combine
the monitor and case of the computer within a
single unit. The monitor often utilizes a
touchscreen as an optional method of user input,
but separate keyboards and mice are normally
still included. The inner components of the PC
are often located directly behind the monitor and
https://images.app.goo.gl/gatoD1aiA3g6f6Uv9 many of such PCs are built similarly to laptops.
Nettop
Subtype of desktops, called nettops, was
introduced by Intel in February 2008,
characterized by low cost and lean
functionality. A similar subtype of laptops (or
notebooks) is the netbook, described below.
The product line features the new Intel Atom
processor, which specifically enables nettops to
consume less power and fit into small
enclosures.
https://images.app.goo.gl/LDQNjFqGdt3eWPfa9
Home Theater PC
Home theater PC (HTPC) is a convergence
device that combines the functions of a personal
computer and a digital video recorder. It is
connected to a TV set or an appropriately sized
computer display, and is often used as a digital
photo viewer, music and video player, TV
receiver, and digital video recorder. HTPCs are
also referred to as media center systems or media
servers. The general goal in a HTPC is usually to
An Antec Fusion V2 home theater PC, with a
combine many or all components of a home
keyboard placed on top of it.
theater setup into one box. More recently, HTPCs
gained the ability to connect to services providing on-demand movies and TV shows.
HTPCs can be purchased pre-configured with the required hardware and software needed to add
television programming to the PC, or can be cobbled together out of discrete components, what
is commonly done with software support from MythTV, Windows Media Center, GB-PVR,
SageTV, Famulent or LinuxMCE.
Laptop
Laptop computer or simply laptop, also
called a notebook computer, is a small personal
computer designed for portability. Usually, all of
the hardware and interfaces needed to operate a
laptop, such as the graphics card, audio devices or
USB ports (previously parallel and serial ports),
are built into a single unit. Laptops contain high-
capacity batteries that can power the device for
extensive periods of time, enhancing portability.
Once the battery charge is depleted, it will have to
Laptop Computer be recharged through a power outlet. In the
interests of saving power, weight and space,
laptop graphics cards are in many cases integrated into the CPU or chipset and use system RAM,
resulting in reduced graphics performance when compared to an equivalent desktop machine.
For this reason, desktop or gaming computers are usually preferred to laptop PCs for gaming
purposes.
One of the drawbacks of laptops is that, due to the size and configuration of components, usually
relatively little can be done to upgrade the overall computer from its original design. Internal
upgrades are either not manufacturer-recommended, can damage the laptop if done with poor
care or knowledge, or in some cases impossible, making the desktop PC more modular. Some
internal upgrades, such as memory and hard disk drive upgrades are often easily performed,
while a display or keyboard upgrade is usually impossible. Just as desktops, laptops also have the
same possibilities for connecting to a wide variety of devices, including external displays, mice,
cameras, storage devices and keyboards, which may be attached externally through USB ports
and other less common ports such as external video.
Netbook
Netbooks, also called mini notebooks or
subnotebooks, are a subgroup of laptops acting as
a category of small, lightweight and inexpensive
laptop computers suited for general computing
tasks and accessing web-based applications. They
are often marketed as “companion devices”, with
an intention to augment other ways in which a user
can access computer resources. Walt Mossberg
An HP netbook called them a “relatively new category of small,
light, minimalist and cheap laptops.” By August
2009, CNET called netbooks “nothing more than
smaller, cheaper notebooks.” In the short period since their appearance, netbooks have grown in
size and features, converging with new smaller and lighter notebooks. By mid-2009, CNET
noted that “the specs are so similar that the average shopper would likely be confused as to why
one is better than the other,” noting “the only conclusion is that there really is no distinction
between the devices.”
Tablet
Tablet is a type of portable PC that de-emphasizes
the use of traditional input devices (such as a mouse
or keyboard) by using a touchscreen display, which
can be controlled using either a stylus pen or finger.
Some tablets may use a “hybrid” or “convertible”
design, offering a keyboard that can either be
removed as an attachment, or a screen that can be
HP Compaq tablet PC with rotated and folded directly over top the keyboard.
rotating/removable keyboard
Some tablets may run a traditional PC operating
system such as Windows or Linux; Microsoft
attempted to enter the tablet market in 2002 with its Microsoft Tablet PC specifications, for
tablets and convertible laptops running Windows XP. However, Microsoft’s early attempts were
overshadowed by the release of Apple’s iPad; following in its footsteps, most modern tablets use
slate designs and run mobile operating systems such as Android and iOS, giving them
functionality similar to smartphones. In response, Microsoft built its Windows 8 operating
system to better accommodate these new touch-oriented devices.
Ultra-Mobile PC
Ultra-mobile PC (UMPC) is a specification for
small-configuration tablet PCs. It was developed as
a joint development exercise by Microsoft, Intel
and Samsung, among others. Current UMPCs
typically feature the Windows XP, Windows Vista,
Windows 7, or Linux operating system, and low-
voltage Intel Atom or VIA C7-M processors.
A Samsung Q1 ultra-mobile PC
Pocket PC
Identification: Fill-out the blank with correct answer. Choose the possible answer inside the box.
1st QUARTER
Lesson 5
“Computer Hardware and Software”
Hardware
Computer hardware is a comprehensive term for all physical parts of a computer, as
distinguished from the data it contains or operates on, and the software that provides instructions
for the hardware to accomplish tasks. The boundary between hardware and software might be
slightly blurry, with the existence of firmware that is software “built into” the hardware.
Capabilities of the personal computers hardware can sometimes be extended by the addition of
expansion cards connected via an expansion bus. Standard peripheral buses often used for adding
expansion cards in personal computers include PCI, PCI Express (PCIe), and AGP (a high-speed
PCI bus dedicated to graphics adapters, found in older computers). Most modern personal
computers have multiple physical PCI Express expansion slots, with some of the having PCI
slots as well.
An exploded view of a modern personal computer and peripherals: (1) Scanner; (2) CPU
(Microprocessor); (3) Memory (RAM); (4) Expansion cards (graphics cards, etc.); (5) Power
supply; (6) Optical disc drive; (7) Storage (Hard disk or SSD); (8) Motherboard; (9) Speakers;
(10) Monitor; (11) System software; (12) Application software; (13) Keyboard; (14) Mouse; (15)
External hard disk; (16) Printer
Computer Case
Computer case is an enclosure that contains
the main components of a computer. They are
usually constructed from steel or aluminum
combined with plastic, although other materials
such as wood have been used. Cases are
available in different sizes and shapes; the size
and shape of a computer case is usually
determined by the configuration of the
motherboard that it is designed to accommodate,
A stripped ATX case lying on its side. since this is the largest and most central
component of most computers.
The most popular style for desktop computers is ATX, although microATX and similar layouts
became very popular for a variety of uses. Companies like Shuttle Inc. and AOpen have
popularized small cases, for which FlexATX is the most common motherboard size.
Processor
The central processing unit, or CPU, is a part of a
computer that executes instructions of a software
program. In newer PCs, the CPU contains over a
million transistors in one integrated circuit chip called
the microprocessor. In most cases, the microprocessor
plugs directly into the motherboard. The chip
generates so much heat that the PC builder is required
AMD Athlon 64 X2 CPU. to attach a special cooling device to its surface; thus,
modern CPUs are equipped with a fanattached via heat sink. IBM PC compatible computers use
an x86-compatible microprocessor, manufactured by Intel, AMD, VIA Technologies or
Transmeta. Apple Macintosh computers were initially built with the Motorola 680×0 family of
processors, then switched to the PowerPC series; in 2006, they switched to x86-compatible
processors made by Intel.
Motherboard
DRAM, SDRAM or SRAM as their primary storage. Which exact kind is used depends on
cost/performance issues at any particular time.
Main memory is much faster than mass storage devices like hard disk drives or optical discs, but
is usually volatile, meaning that it does not retain its contents (instructions or data) in the absence
of power, and is much more expensive for a given capacity than is most mass storage. As a
result, main memory is generally not suitable for long-term or archival data storage.
Video Card
Video card—otherwise called a graphics card,
graphics adapter or video adapter—processes the
graphics output from the motherboard and transmits
it to the display. It is an essential part of modern
multimedia-enriched computing. On older models,
and today on budget models, graphics circuitry may
be integrated with the motherboard, but for modern
and flexible machines, they are connected by the
An ATI Radeon video card PCI, AGP, or PCI Express interface. When the IBM
PC was introduced, most existing business-oriented
personal computers used text-only display adapters and had no graphics capability. Home
computers at that time had graphics compatible with television signals, but with low resolution
by modern standards owing to the limited memory available to the eight-bit processors available
at the time.
Keyboard
Keyboard is an arrangement of buttons that each
correspond to a function, letter, or number. They
are the primary devices used for inputting text. In
most cases, they contain an array of keys
specifically organized with the corresponding
letters, numbers, and functions printed or engraved
on the button. They are generally designed around
an operators language, and many different versions
A “Model M” IBM computer keyboard from the
early 1980s. Commonly called the “Clicky
for different languages exist.
Keyboard” due to its buckling spring key spring In English, the most common layout is the
design, which gives the keyboard its iconic QWERTY layout, which was originally used in
‘Click’ sound with each keystroke.
typewriters. They have evolved over time, and have
been modified for use in computers with the
addition of function keys, number keys, arrow keys, and keys specific to an operating system.
Often, specific functions can be achieved by pressing multiple keys at once or in succession,
such as inputting characters with accents or opening a task manager. Programs use keyboard
shortcuts very differently and all use different keyboard shortcuts for different program specific
operations, such as refreshing a web page in a web browser or selecting all text in a word
processor.
Mouse
Computer mouse is a small handheld device that
users hold and slide across a flat surface, pointing
at various elements of a graphical user interface
with an on-screen cursor, and selecting and moving
objects using the mouse buttons. Almost all modern
personal computers include a mouse; it may be
plugged into a computer’s rear mouse socket, or as
a USB device, or, more recently, may be connected
wirelessly via an USB dongle or Bluetooth link.
In the past, mice had a single button that users
A selection of computer mice built between could press down on the device to “click” on
1986 and 2007 whatever the pointer on the screen was hovering
over. Modern mice have two, three or more buttons,
providing a “right click” function button on the mouse, which performs a secondary action on a
selected object, and a scroll wheel, which users can rotate using their fingers to “scroll” up or
down. The scroll wheel can also be pressed down, and therefore be used as a third button. Some
mouse wheels may be tilted from side to side to allow sideways scrolling.
Software
Computer software is any kind of computer
program, procedure, or documentation that
performs some task on a computer system. The
term includes application software such as word
processors that perform productive tasks for users,
system software such as operating systems that
interface with computer hardware to provide the
necessary services for application software, and
middleware that controls and co-ordinates
A screenshot of the OpenOffice.org Writer distributed systems.
software Software applications are common for word
processing, Internet browsing, Internet faxing, e-
mail and other digital messaging, multimedia playback, playing of computer game, and computer
programming. The user of a modern personal computer may have significant knowledge of the
operating environment and application programs, but is not necessarily interested in
programming nor even able to write programs for the computer. Therefore, most software
written primarily for personal computers tends to be designed with simplicity of use, or “user-
friendliness” in mind. However, the software industry continuously provides a wide range of
new products for use in personal computers, targeted at both the expert and the non-expert user.
Operating System
An operating system (OS) manages computer
resources and provides programmers with an
interface used to access those resources. An
operating system processes system data and user
input, and responds by allocating and managing
tasks and internal system resources as a service to
users and programs of the system. An operating
system performs basic tasks such as controlling
and allocating memory, prioritizing system
requests, controlling input and output devices,
https://images.app.goo.gl/dCcRy3jN2CPxuE1J6
facilitating computer networking, and managing
files.
Common contemporary desktop operating systems are Microsoft Windows, OS X, Linux, Solaris
and FreeBSD. Windows, OS X, and Linux all have server and personal variants. With the
exception of Microsoft Windows, the designs of each of the them were inspired by or directly
inherited from the Unix operating system, which was developed at Bell Labs beginning in the
late 1960s and spawned the development of numerous free and proprietary operating systems.
Microsoft Windows
Microsoft Windows is the collective brand name of several
operating systems made by Microsoft. Microsoft first
introduced an operating environment named Windows in
November 1985, as an add-on to MS-DOS and in response to
the growing interest in graphical user interfaces (GUIs)
generated by Apple’s 1984 introduction of the Macintosh. The
most recent client and server version of Windows are
Windows 8.1 and Windows Server 2012 R2, respectively.
https://images.app.goo.gl/ND2GKQY5
ui7oEM3p8
OS X
OS X (formerly Mac OS X) is a line of operating systems
developed, marketed, and sold by Apple Inc. OS X is the
successor to the original Mac OS, which had been Apple’s
primary operating system since 1984. OS X is a Unix-based
graphical operating system, and Snow Leopard, Leopard,
Lion, Mountain Lion, and the new Mavericks are version
titles. The most recent version of OS X is entitled OS X
Yosemite.
https://images.app.goo.gl/ytRXCr1xpW On iPhone, iPad and iPod, versions of iOS (which is an OS X
HHAJqa6 derivative) are available from iOS 1.0 to the recent iOS 8.
Linux
Linux is a family of Unix-like computer operating systems.
Linux is one of the most prominent examples of free software
and open source development: typically all underlying source
code can be freely modified, used, and redistributed by
anyone. The name “Linux” refers to the Linux kernel, started
in 1991 by Linus Torvalds. The system’s utilities and libraries
usually come from the GNU operating system, announced in
1983 by Richard Stallman. The GNU contribution is the basis
for the alternative name GNU/Linux. Known for its use in
A Linux distribution running KDE
Plasma Desktop servers, with the LAMP application stack as one of prominent
examples, Linux is supported by corporations such as Dell,
Hewlett-Packard, IBM, Novell, Oracle Corporation, Red Hat, Canonical Ltd. and Sun
Microsystems.
Applications
Gaming
https://images.app.goo.gl/UKNvC6PyZ4C6QtVm8
Toxicity
Toxic chemicals found in computer hardware include lead,
mercury, cadmium, chromium, plastic (PVC), and barium. In
a raw materials breakdown, computer is about 17% lead,
copper, zinc, mercury, and cadmium; 23% is plastic, 14% is
aluminum, and 20% is iron.
Lead is found in a cathode ray tube (CRT) display, and on all
of the printed circuit boards and most expansion cards.
Mercury is located in the screen’s fluorescent lamp, in the
laser light generators in the optical disk drive, and in the
https://images.app.goo.gl/p1cZ5kqHzNg4
QjeM7
round, silver-looking batteries on the motherboard. Plastic is
found mostly in the housing of the computation and display
circuitry. While daily end-users are not exposed to these toxic elements, the danger arises during
the computer recycling process, which involves manually breaking down hardware and leads to
the exposure of a measurable amount of lead or mercury. A measurable amount of lead or
mercury can easily cause serious brain damage or ruin drinking water supplies. Computer
recycling is best handled by the electronic waste (e-waste) industry, and kept segregated from the
general community dump.
Instruction: Write the Correct Name of Computer Parts inside the box
1st QUARTER
https://images.app.goo.gl/DEhQS2SdRQFMfQW86
Lesson 6
“Computer Devices”
Peripheral
A peripheral is a “device that is used to put information into or get information out of the
computer.”
There are three different types of peripherals:
• Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)
• Output, which provides output to the user from the computer (monitors, printers, etc.)
• Storage, which stores data processed by the computer (hard drives, flash drives, etc.)
Overview
Peripheral device is generally defined as any auxiliary device such as a computer mouse or
keyboard, that connects to and works with the computer in some way. Other examples of
peripherals are expansion cards, graphics cards, image scanners, tape drives, microphones,
loudspeakers, webcams, and digital cameras. RAM—random access memory—straddles the line
between peripheral and primary component; it is technically a storage peripheral, but is required
for every major function of a modern computer and removing the RAM will effectively disable
any modern machine. Many new devices such as digital watches, smartphones and tablet
computers have interfaces which allow them to be used as a peripheral by a full computer,
though they are not host-dependent as other peripheral devices are. According to the most
technical definition, the only pieces of a computer not considered to be peripherals are the central
processing unit, power supply, motherboard, and computer case.
Usually, the word peripheral is used to refer to a device external to the computer case, like a
scanner, but the devices located inside the computer case are also technically peripherals.
Devices that exist outside the computer case are called external peripherals, or auxiliary
components, Examples are: “Many of the external peripherals I own, such as my scanner and
printer, connect to the peripheral ports on the back of my computer.” Devices that are inside the
case such as internal hard drives or CD-ROM drives are also peripherals in technical terms and
are called internal peripherals, but may not be recognized as peripherals by laypeople.
In a system on a chip, peripherals are incorporated into the same integrated circuit as the central
processing unit. They are still referred to as “peripherals” despite being permanently attached to
(and in some sense part of) their host processor.
Common Peripherals
Input Light pen Flash drive
Keyboard Scanner Disk drive
Computer mouse Digital camera Smartphone or Tablet
Graphic tablet Output computer storage interface
Touchscreen Computer display CD/DVD drive
Barcode reader Printer Input/Output
Image scanner Projector Modem
Microphone Speaker Network interface
Webcam Storage devices controller (NIC)
Game controller Floppy disk drive
Input Devices
In computing, an input device is a peripheral (piece of computer hardware equipment) used to
provide data and control signals to an information processing system such as a computer or other
information appliance. Examples of input devices include keyboards, mice, scanners, digital
cameras and joysticks.
Many input devices can be classified according to:
• modality of input (e.g. mechanical motion, audio, visual, etc.)
• the input is discrete (e.g. key presses) or continuous (e.g. a mouse’s position, though
digitized into a discrete quantity, is fast enough to be considered continuous)
Pointing devices, which are input devices used to specify a position in space, can further be
classified according to:
• Whether the input is direct or indirect. With direct input, the input space coincides with
the display space, i.e. pointing is done in the space where visual feedback or the pointer appears.
Touchscreens and light pens involve direct input. Examples involving indirect input include the
mouse and trackball.
• Whether the positional information is absolute (e.g. on a touch screen) or relative (e.g.
with a mouse that can be lifted and repositioned)
Direct input is almost necessarily absolute, but indirect input may be either absolute or relative.
For example, digitizing graphics tablets that do not have an embedded screen involve indirect
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
74
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
input and sense absolute positions and are often run in an absolute input mode, but they may also
be set up to simulate a relative input mode like that of a touchpad, where the stylus or puck can
be lifted and repositioned.
Input and output devices make up the hardware interface between a computer and a scanner or
6DOF controller.
Keyboards
Keyboard is a human interface device which is
represented as a layout of buttons. Each button,
or key, can be used to either input a linguistic
character to a computer, or to call upon a
particular function of the computer. They act as
the main text entry interface for most users.
Traditional keyboards use spring-based buttons,
Standard Keyboard though newer variations employ virtual keys, or even projected keyboards.
It is typewriter like device composed of a matrix of switches.
Touchscreen
Touchscreen, or touch screen, is a both input and
output device and normally layered on the top of
an electronic visual display of an information
processing system. The display is often an LCD
or OLED display while the system is usually a
laptop computer, tablet, or smartphone. A user
Smartphone with touchscreen can give input or control the information
processing system through simple or multi-touch
gestures by touching the screen with a special
stylus or one or more fingers. Some touchscreens
use ordinary or specially coated gloves to work
while others may only work using a special stylus or pen. The user can use the touchscreen to
react to what is displayed and, if the software allows, to control how it is displayed; for example,
zooming to increase the text size.
Barcode reader
Barcode reader (or barcode scanner) is an optical scanner that can
read printed barcodes, decode the data contained in the barcode and
send the data to a computer. Like a flatbed scanner, it consists of a
light source, a lens and a light sensor translating for optical
impulses into electrical signals. Additionally, nearly all barcode
A handheld barcode scanner readers contain decoder circuitry that can analyze the barcode's
image data provided by the sensor and sending the barcode's
content to the scanner's output port.
Image scanner
Microphone
Microphone, colloquially named mic or mike, is a device –
a transducer – that converts sound into an electrical signal.
Microphones are used in many applications such as
telephones, hearing aids, public address systems for concert
halls and public events, motion picture production, live and
recorded audio engineering, sound recording, two-way
radios, megaphones, radio and television broadcasting, and
in computers for recording voice, speech recognition, VoIP,
Typical low-cost webcam used with many and for non-acoustic purposes such as ultrasonic sensors or
personal computers knock sensors.
Webcam
Webcam is a video camera that feeds or streams an image
or video in real time to or through a computer to a computer
network, such as the Internet. Webcams are typically small
cameras that sit on a desk, attach to a user's monitor, or are
built into the hardware. Webcams can be used during a
video chat session involving two or more people, with
conversations that include live audio and video. For
example, Apple's iSight camera, which is built into Apple
laptops, iMacs and a number of iPhones, can be used for
video chat sessions, using the iChat instant messaging
program (now called Messages). Webcam software enables users to record a video or stream the
video on the Internet. As video streaming over the Internet requires much bandwidth, such
streams usually use compressed formats. The maximum resolution of a webcam is also lower
than most handheld video cameras, as higher resolutions would be reduced during transmission.
The lower resolution enables webcams to be relatively inexpensive compared to most video
cameras, but the effect is adequate for video chat sessions.
Game controller
A Nintendo Switch Pro Controller
Game controller, gaming controller, or simply controller, is an
input device used with video games or entertainment systems
to provide input to a video game, typically to control an object
or character in the game. Before the seventh generation of
video game consoles, plugging in a controller into one of a
console's controller ports were the primary means of using a
game controller, although since then they have been replaced
by wireless controllers, which do not require controller ports
Shure Brothers microphone, model 55s, on the console but are battery-powered. USB game
Multi-Impedance "Small Unidyne" Dynamic
from 1951 controllers could also be connected to a computer with a
USB port. Input devices that have been classified as game
controllers include keyboards, mouses, gamepads, joysticks, etc. Special purpose devices, such
as steering wheels for driving games and light guns for shooting games, are also game
controllers.
Light pen
Digital camera
A digital camera or digicam is a camera that captures
photographs in digital memory. Most cameras produced
today are digital, and while there are still dedicated digital
cameras, many more cameras are now incorporated into
mobile devices like smartphones, which can, among many
other purposes, use their cameras to initiate live video-
telephony and directly edit and upload imagery to others.
However, high-end, high-definition dedicated cameras are
still commonly used by professionals and those who desire
to take higher-quality photographs.
Digital and digital movie cameras share an optical system,
typically using a lens with a variable diaphragm to focus
light onto an image pickup device. The diaphragm and
shutter admit the correct amount of light to the image, just as
Front and back of Canon PowerShot A95 with film but the image pickup device is electronic rather
(c.2004), a once typical pocket-sized than chemical. However, unlike film cameras, digital
compact camera
cameras can display images on a screen immediately after
being recorded, and store and delete images from memory.
Many digital cameras can also record moving videos with
sound. Some digital cameras can crop and stitch pictures and perform other elementary image
editing.
Composite Devices
Input devices, such as buttons and joysticks, can be combined
on a single physical device that could be thought of as a
composite device. Many gaming devices have controllers like
this. Technically mice are composite devices, as they both
track movement and provide buttons for clicking, but
composite devices are generally considered to have more than
two different forms of input.
Game controller
Gamepad (or joypad)
Paddle (game controller)
Jog dial/shuttle (or knob)
Wii Remote
Output Devices
An output device is any piece of computer hardware equipment used to communicate the results
of data processing carried out by an information processing system (such as a computer) which
converts the electronically generated information into human-readable form.
https://images.app.goo.gl/rAyP7Wt7UREUp5Tw7
Printer (computing)
In computing, a printer is a peripheral device which makes a
Acer projector, 2012
persistent representation of graphics or text, usually on
paper. While most output is human-readable, bar code
printers are an example of an expanded use for printers. The
different types of printers include 3D printer, inkjet printer,
laser printer, thermal printer, etc.
Projector
A projector or image projector is an optical device that
https://images.app.goo.gl/rrdVaMmg6projects an image (or moving images) onto a surface,
MKC4rY19 commonly a projection screen. Most projectors create an
image by shining a light through a small transparent lens, but
some newer types of projectors can project the image directly,
by using lasers. A virtual retinal display, or retinal projector,
is a projector that projects an image directly on the retina
instead of using an external projection screen.
Computer speakers
Computer speakers, or multimedia speakers, are speakers
sold for use with computers, although usually capable of
other audio uses, e.g. for an MP3 player. Most such speakers
have an internal amplifier and consequently require a power
source, which may be by a mains power supply often via an
AC adapter, batteries, or a USB port. The signal input
connector is often a 3.5 mm jack plug (usually color-coded
lime green per the PC 99 standard); RCA connectors are
sometimes used, and a USB port may supply both signal and power (requiring additional
circuitry, and only suitable for use with a computer). Battery-powered wireless Bluetooth
speakers require no connections at all. Most computers have speakers of low power and quality
built in; when external speakers are connected they disable the built-in speakers. Altec Lansing
claims to have created the computer speaker market in 1990.
Volatile Memory
Volatile memory is computer memory that requires
power to maintain the stored information. Most
modernsemiconductor volatile memory is either Static
RAM (see SRAM) or dynamic RAM (see DRAM).
SRAM retains its contents as long as the power is
connected and is easy to interface to but uses six
transistors per bit. Dynamic RAM is more complicated
to interface to and control and needs regular refresh
cycles to prevent its contents being lost. However,
DRAM uses only one transistor and a capacitor per bit,
allowing it to reach much higher densities and, with more bits on a memory chip, be much
cheaper per bit. SRAM is not worthwhile for desktop system memory, where DRAM dominates,
but is used for their cache memories. SRAM is commonplace in small embedded systems, which
might only need tens of kilobytes or less. Forthcoming volatile memory technologies that hope to
replace or compete with SRAM and DRAM include Z-RAM, TTRAM, A-RAM and ETA RAM.
Non-Volatile Memory
Non-volatile memory is computer memory that can retain
the stored information even when not powered. Examples
of non-volatile memory include read-only memory (see
ROM), flash memory, most types of magnetic computer
storage devices (e.g. hard disks, floppy discs and magnetic
tape), optical discs, and early computer storage methods
such as paper tape and punched cards. Forthcoming non-
volatile memory technologies include FeRAM,
CBRAM,PRAM, SONOS, RRAM, Racetrack memory,
Solid-state drives are one of the latest forms
of non-volatile memory.
NRAM and Millipede.
Compact disc (CD) and Digital Versatile Disc or Digital Video Disc (DVD)
Compact disc (CD) is a digital optical disc data storage format that
was co-developed by Philips and Sony and released in 1982. The
format was originally developed to store and play only sound
recordings (CD-DA) but was later adapted for storage of data (CD-
ROM). Capacity Typically up to 700 MiB (up to 80 minutes' audio)
Recordable Compact Discs, CD-Rs, CD-R recordings are designed
to be permanent. Over time, the dye's physical characteristics may
change causing read errors and data loss until the reading device
cannot recover with error correction methods. Errors can be
predicted using surface error scanning.
ReWritable CD (CD-RW) does not have as great a difference in reflectivity as a pressed CD or a
CD-R, and so many earlier CD audio players cannot read CD-RW discs, although most later CD
audio players and stand-alone DVD players can.
DVDs offer higher storage capacity than compact discs while having the same dimensions.
Capacity 4.7 GB (single-sided, single-layer – common) 8.5 GB (single-sided, double-layer)
9.4 GB (double-sided, single-layer) 17.08 GB (double-sided, double-layer)
Flash drive
USB flash drive is a data storage device that includes
flash memory with an integrated USB interface. It is
typically removable, rewritable and much smaller than
an optical disc.
As of March 2016, flash drives with anywhere from 8
to 256 gigabytes (GB)were frequently sold, while 512
GB and 1 terabyte (TB) units were less frequent. As of
2018, 2 TB flash drives were the largest available in
terms of storage capacity.
Floppy disk
Floppy disk, also known as a floppy, diskette, or simply
disk, is a type of disk storage composed of a disk of thin
and flexible magnetic storage medium, sealed in a
rectangular plastic enclosure lined with fabric that
removes dust particles. Floppy disks are read and written
by a floppy disk drive (FDD).
Input/Output
There are many input and output devices such as
multifunction printers and computer-based navigation
systems that are used for specialized or unique
applications. In computing, input/output refers to the
communication between an information processing
system (such as a computer), and the outside world.
Inputs are the signals or data received by the
system, and outputs are the signals or data Inputs are the signals or data received by the system,
sent from it. and outputs are the signals or data sent from it.
Identification: Fill-out the blank with correct answer. Choose the possible answer inside the box.
1. __________________ allows the user to point to displayed objects or draw on the screen in a
similar way to a touchscreen but with greater positional accuracy.
2. __________________ a computer input device that enables a user to hand-draw images,
animations and graphics, with a special pen-like stylus.
3. __________________ peripheral device which makes a persistent representation of graphics
or text.
4. __________________ computer memory that can retain the stored information even when not
powered.
5. __________________ it consists of a light source, a lens and a light sensor translating for
optical impulses into electrical signals.
6. __________________ optical device that projects an image (or moving images) onto a
surface, commonly a projection screen.
7. _________________ captures photograph in digital memory.
8. _________________ any piece of computer hardware equipment used to communicate the
results of data processing carried out by an information processing system.
9. _________________ a peripheral (piece of computer hardware equipment) used to provide
data and control signals to an information processing system.
10. ________________ In computing refers to the communication between an information
processing system and the outside world.
Lesson 7
“How to Assemble a Personal
Computer?”
This set of instructions will help you assemble a basic computer capable of running most modern
software packages encountered by a casual user.
Screwdriver/s: It's true; to build a PC from scratch, all you need for most builds is a Phillips-head
screwdriver. Specifically, you need one with a size #2 head, but if you're installing an M.2 SSD
you'll also need a size #1 (M.2 screws are smaller). As for the length of the screwdriver, it
doesn't really matter as you can use either a short, medium, or longer screwdriver.
Suitable Surface: A large, flat, hard, non-conductive surface to assemble your PC on such as a
desk or table (wood or glass is fine).
A Way to Discharge Yourself: To protect your components being damaged from static electricity
when building a PC, you need to physically ground your body before handling the internal parts.
You can do so by wearing an ESD/anti-static wrist strap/bracelet, or by periodically touching the
bare (non painted) metal frame of your PC case or another metal object every now and then for a
couple seconds (and specifically before going to touch a part).
Enough Time: To learn how to build your first PC from start to finish, you want to give yourself
plenty of time as you'll be (or should be) taking it nice and slow.
Motherboard Manual: The only manual you will likely need to build a PC which comes in handy
for certain things that are specific to your particular board including where to connect your case's
front panel connections and which RAM sockets to install your memory.
1 2
Unscrew the side panel/s and Undo the 4 thumbscrews with your
slide them off hands if your case has them
* Safety Reminder *
Why You Should Install Parts Outside the Case First
Before touching your motherboard,
It can be more difficult to reach in and install parts onto or any other component for that
your motherboard when it's mounted inside your case. matter, remember that you need to
Working on your motherboard outside the case gives you ground your physical body first to
much more room to move, makes it easier to see where to remove any static electricity build-up.
install things like the CPU, and makes it easier to firmly
If you're not wearing an anti-static
insert your RAM and CPU cooler (which can require a strap, you can do this by touching a
firm little push). metal surface/object such as the
metal frame of your case for a
couple seconds (refer back to step 1
for more on this).
Your case has a range of features on the front such as USB ports, power on button, reset button,
headphone jack, mic jack, etc. These need to be plugged in to the correct connections on the
motherboard (technically called motherboard headers), but exactly where they plug in on the
motherboard will vary from board to board so you'll want to consult your motherboard manual
and then dive into the steps.
15. Mount Power Supply in Case
All of the gadgets we see on the computer are either directly or indirectly connected to the
motherboard. As a result, the motherboard is sometimes referred to as the computer's "backbone"
or "spine."
The motherboard is found in every electronic device, including tablets, smartphones, and PCs, and
its size varies according to the device.
What is a Motherboard?
The motherboard is a thin printed circuit board (PCB) which links all different
components inside your computer. So, we can say the motherboard acts as a hub in
a network. People call motherboard by a different names like mainboard, logic
board, baseboard, system board, mobo, etc.
Location of Motherboard:
In Desktop
open
green/blue/brown/red.
the case
PC:to
A desktop
seeThis
what's
plate
PC isinside,
ischaracterized
the PC's
you'll
motherboard.
notice
by a large
a large
rectangular
squarecomputer
printed circuit
case. When
plateyou
in
In laptop: When you open the bottom cover of your laptop, you'll see the large PCB board that
serves as the motherboard.
In smartphone: When you open the back cover of your smartphone and screw up some pins,
you'll find your motherboard.
XT Motherboard
This was the first motherboard form factor and
was short for eXtended Technology. You won’t
run into these anymore unless you are dealing with
vintage computers. IBM created it in 1983, and
because IBM published the specs and made them
open, many manufacturers used it as a standard.
This motherboard weighed 32 pounds and was
designed for business users.
AT Motherboard
The AT form factor was also designed by IBM.
AT stands for Advanced Technology. It was a
much smaller design and looked more like the
motherboards we are used to seeing. It was the
common form factor for computers in the 1980s.
This motherboard is also known as the Full-AT.
AT boards had both serial and parallel ports that attached to the case through an expansion slot
and used cables to connect to the board. Parallel ports are no longer used in modern
motherboards. They also had a single keyboard connector that was soldered to the back of the
board. The processor sat at the front of the board and sometimes could get in the way of the
expansion slots. The SIMM slots for memory could be located in various places on this type of
board, but are most often found on the top of the board.
This motherboard served users well from the Pentium p5 to the time when the Pentium 2 was
introduced. It was designed for the Intel 80386 architecture, which became obsolete with the
introduction of the Pentium 2. It was retired by IBM in 1995.
Baby AT Motherboard
This motherboard was another flavor of the AT
motherboard. It was called “baby” because it was
smaller than the full-sized AT motherboard and
measured 8.5-by-13 inches, but the size could vary
slightly between manufacturers. The smaller size of
this motherboard made it easier for technicians to
work on it because there was more room inside the
case. Other than that, it had similar features to the
standard AT motherboard.
ATX Motherboard
Intel released the ATX motherboards in the mid-1990s as an improvement on the AT
motherboards that were used previously. Motherboards of this type differ from their AT
counterparts in that they allow the interchangeability of the connected components. Additionally,
because the dimensions of this motherboard are smaller than those of AT motherboards, there is
sufficient room for the drive bays. The connector system of the board was also improved. On the
back plates of AT motherboards, additional slots were provided for various add-ons.
This motherboard is still in use today, is the most popular motherboard ever, and many other
form factors were based on it. Some of the features that come on the ATX motherboard include:
• Integrated I/O Connectors: Ports were built into the board on the ATX, while the older
AT board used headers that attached to ports on the back of the case. This made
installation and maintenance easier.
• Reduced Overlap Between Board and Drives: This design reduced heat in the case and
meant that technicians could reach the entire board without having to remove a drive.
• Reduced Processor Interference with Cards: The processor was moved to the back of
the board near the power supply. Technicians could now install full-size expansion cards
without them hitting the CPU or power sink.
• User-Friendly Power Connector: The power supply for an ATX board connects
through one 21-pin connector. This connector is keyed so that it can only be inserted in
the right direction. This differed from the AT board, which had two connectors that
looked the same but were not interchangeable.
• Better Cooling Conditions: A power supply designed for an ATX blows into the case
instead of out. This means that it forces air out of the case, instead of sucking air into it
along with dust. This was a problem with the older AT form factor.
• 3.3 Volt Power: ATX power supplies 3.3 volt power so it can be used directly by the
CPU. The older AT power supplies only had 5 volt power which required a voltage
regulator on the motherboard to reduce the voltage for the CPU.
• Automated Controls: The power supply for an ATX board can be controlled through
software. This gave the computer the ability to turn itself on to perform tasks. It also
meant you could wake the computer or shut it down through LAN. The shut down
procedure is also automated, so you could now turn a computer off by choosing “Shut
down” from the operating system.
Micro-ATX Motherboard
The Micro-ATX board is similar to the ATX board. The only real difference is its size. It is 9.6-
by-9.6 inches instead of 12-by-9.6 inches. This board was made for small computer cases.
Because it is smaller, it has less expansion and memory slots than the ATX board. Just because
they are smaller doesn’t mean they are less capable of providing computing power. These boards
are used in even some gaming computers.
E-ATX Motherboard
The E-ATX or extended ATX motherboard is much larger than the standard ATX motherboard.
This motherboard is primarily used for gaming where a lot of power is needed. Most of the extra
space on the board is used for extra expansion slots and memory slots. The boards also have
built-in Wi-Fi, sound cards, and onboard troubleshooting features. Up to 128 GB of RAM can be
installed on this board.
LPX Motherboard
Low profile extension motherboards, or LPX
motherboards, were created after the AT boards in
the 1990s.
NLX Motherboard
The NLX board is an upgraded version of the LPX
motherboard. It was created in the 1990s to provide
support for larger cases, cards, and devices. NLX
stands for New Low Profile Extended. It supported
the Pentium II processor, AGP, DIMM memory,
and USB.
BTX Motherboard
A major goal of the BTX was to remove or avoid some issues that arose when using the latest
technologies. Newer technologies tend to draw more power and release more heat than those
running on motherboards that conform to the ATX specification of 1996. Intel proposed both
ATX and BTX standards. Intel canceled the development of BTX retail products in September
2006 due to its decision to focus on low-power CPUs after having issues with scaling and
temperature with the Pentium 4.
Gateway Inc. was the first company to implement BTX, followed by Dell and MPC. Apple’s
MacPro uses some BTX elements, but it is not BTX compliant. Compared to previous
technologies, this type of motherboard has some improvements:
• Low-profile: With the greater demand for ever-smaller systems, a redesigned backplane
that shaves inches off the height requirements is a benefit to system integrators and
enterprises which use rack mounts or blade servers.
• Thermal design: The BTX design provides a straighter path of airflow with lesser
difficulties, which results in better overall cooling capabilities. Instead of a dedicated
cooling fan, a large 12 cm case-fan is mounted, meaning it draws its air directly from
outside the computer and then cools the CPU through an air duct. Another feature of
BTX is the vertical mounting of the motherboard on the left-hand side. This kind of
feature results in the graphics card heat sink or fan facing upwards, rather than in the
direction of the adjacent expansion card.
• Structural design: The BTX standard specifies distinct locations for hardware mounting
points and hence reduces latency between key components. It also reduces the physical
strain imposed on the motherboard by heat sinks, capacitors, and other components which
are dealing with electrical and thermal regulation.
Initially, the ATX and BTX motherboards were so similar that moving a BTX motherboard to an
ATX case was possible. In later stages, the BTX form factor was transformed into a mirror
image of the ATX standard. When compared to ATX, BTX motherboards are ‘left side up’ and
not upside down. This means they are mounted on the opposite side of the case. Various
computer cases, for example, the Cooler Master Series (Stackers), were released so that users can
develop motherboards without buying a new case. However, all connectors and slot standards are
identical, including PCI(e) cards, processors, RAM, hard drives, etc.
BTX power supply units can be exchanged with ATX 12V units, but not with older ATX power
supplies without the extra 4-pin 12V connector.
One expansion slot is provided for the Mini-ITX form factor, which corresponds to a standard 33
MHz 5V 32-bit PCI slot. Some cases use riser cards, and some even have two-slot riser cards,
even when the two-slot riser cards cannot be used with all the boards. Several boards based on
non-x86 processors have a 3.3V PCI slot, and the Mini-ITX 2.0 (2008) boards have a PCI-
express ×16 slot. PCI riser cards supplied with cases cannot be used with these boards.
Parts of Motherboard
• Parallel Port
• Serial Port
• SATA and PATA Connector
• USB Port
• DVI Port
• RJ-45 Port
• HDMI Port
• FDD Connector
• Optical Drive Audio Connector
• 1394 Headers
• F Audio Connectors
• Heat Sink
• Switches and Jumper
• Microphone port, headphone port, subwoofer port, guitar port, DVD player port, stereo
receiver port
• Capacitor
• Transistor
• VRMs
• Mounting Screw Hole
• Power, Reset, SW, LED Pins
RAM is named after the fact that any memory address in RAM can be accessed directly from any
location. Data in any memory location can be accessed if the row and column numbers are known.
DRAM, SDRAM, DDR, SRAM, CMOS RAM, VRAM, and other types of RAM are available on
the market. RAM in the PC market typically ranges from 2 GB to 16 GB.
ALU: ALU is a CPU digital circuit (gates) that conducts all arithmetic and logical operations.
ALU is capable of performing basic arithmetic operations such as addition, subtraction,
multiplication, and division. ALU is capable of performing logical operations such as number and
letter comparisons. A single CPU can have many ALUs.
CU: The Control Unit (CU) is a digital circuit within the CPU that governs all processes. It
enables and instructs various logical units, I/O devices, and the computer's memory on how to
respond to program instructions from various components, as well as the user.
Registers: Registers are a form of temporary memory and ALU and CU rely on them. They are
sometimes referred to as "Immediate Memory".CPU can instantly access, store and transport
data and instruction from registered memory and process it.
Prior to the introduction of PCI in 1992, ISA fig. USB PIC Card (To connect numerous USB devices)
and EISA were used for the same purpose.
Later in 2004, the PCIe slot was invented, and it has now replaced PCI, AGP, and ISA slots.
Showing PCI slots, AGP slots, and ISA slots in the same picture:
General FAQs
Ans: PCI stands for Peripheral Component Interconnected. PCIe stands for Peripheral
Component Interconnected Express.
Ans: Generally PCI slots are available on desktop PC but not in most laptops do not
have reusable PCI slots because of their compact size and space. On some laptops, we can use it
if you have Express Card Slots and can get adaptors to use PCI or PCIe.
Ans: There are manual ways by going into the device manager. Better try using CPU-Z
software for getting a detailed view of all versions of installed hardware.
4) ROM Chip
ROM is nonvolatile storage whose content
will not get erased even after power is cut off.
Content stored in ROM is impossible or very
difficult to modify.
6) North Bridge
North Bridge is also known as Memory Controller Hub or Host Bridge. It is the motherboard's
primary controller, directing traffic to and from the CPU. As a result, the northbridge chip has an
impact on the computer's performance. Because it performs a lot of processing, it usually comes
with a heatsink.
In some processors of Intel, all the functioning of northbridge is performed by the CPU.
7) South Bridge
The southbridge is an IC chip that manages and controls IO functionality on the motherboard. It
does not have direct communication with the CPU, unlike Northbridge. It typically handles
low-speed devices due to its slower communication speed. The CPU sends an instruction to
the northbridge, which then sends it to the southbridge. It is linked to the PCI bus, ISA buses,
IDE buses, audio, serial devices such as a mouse, keyboard, USB ports, and so on, as well as a
SATA hard disk connector.
In size, itattached
heatsink is smaller
to than
it. the northbridge. And in some southbridge, we can find a
8) CMOS Backup Battery
CMOS stands for "Complementary Metal Oxide
Semiconductor" and is found in both laptop and
desktop PCs in the form of a small circular coin.
CMOS stores a variety of system data such as
the current system clock, date, time, pulses,
commonly used hardware settings, BIOS
configuration settings, BOOT sequences, BIOS
master/admin password, GPU, and
virtualization settings, power management, and
so on.
It is also called the RTC(Real Time Clock) of the computer system because even
computer is shut down it is able to store all the required information that the
system required to boot the system next time.
CMOS FAQs
fig. Power Supply Box provides power to the motherboard and devices like HDD, CDROM,
Floppy etc
8Pin connector can be split into two and each split part can be used as a 4 pin connector.
iv) Molex
Molex pin is 4 power pin which is required to supply power to older CDROM and hard drives.
Molex is nowadays used for Case Fan. (some have some do not have)
Every PATA cable has two or three connectors, one of which is connected to the adapter
interfacing and the others to secondary storage devices. In modern computers, it is not used. It is
outdated technology and is replaced by SATA Technology
• Reduce Cable Size: The size of the SATA cable is shorter than the PATA cable. The
maximum cable length of SATA cable is 18 inch and PATA's maximum cable length is ~
39 inches.
• Higher Bandwidth: The bandwidth ranges of various PATA cable is between 16 MB/s -
133 MB/s. But bandwidth ranges of various SATA cable is between 150 MB/s - 600
MB/s.
• SATA has hot-swappable features: SATA cable from the devices can be plugged in and
out even system is ON(But don't try with running hard disk or CDROM). Hot-swappable
does not work with PATA. Try it(Remove SATA cable from CDROM, Restart your PC
then insert SATA in CDROM, it will work.)
it will
Trynot
it (Remove
work. Precaution:
PATA cable
Don't
from
do this
CDROM,
hot-swap
Restart
withyour
PATAPCcable).
then insert PATA in CDROM,
• Type A
• Type B
• Type C
• Type A Mini
• Type B Mini
• Type A Micro
• Type B Micro
• Type B Micro USB3
port is used to connect to the Local Area Network via a twisted pair ethernet cable. The Ethernet
cable has a connector that is connected to the RJ45 port.
21) Heatsink
Heatsinks use a thermal conductor to reduce heat generated and prevent overheating from
hardware components like CPU, GPU, northbridge, southbridge, RAM modules, etc. In general,
that component that generates heat required a heatsink.
🔥 Caution: Before adjusting jumper configuration make sure that the system is turned off
otherwise system may get damaged.
23) Capacitor
A capacitor is an electronic device used
for filtering, decoupling, and timing the
circuit in the motherboard. There are
more capacitors in the motherboard
which mostly does decoupling
functionality, so those capacitors are
called decoupling capacitors. A
decoupling capacitor is used for
stabilizing power in each IC used in the
system.
Suppose a circuit needs 5 V input than before that circuit there will be capacitors in parallel which
allow up to 5 V to pass to that circuit.
MOSFET(Metal Oxide Semiconductor Field Effect Transistor) is the most widely used transistor
in motherboards.
25) Diode
The motherboard in your laptop and the
mobile phone both have SMD Diodes that
are mounted on the motherboard.
26) VRMs
VRMs stands for Voltage Regulator
module. VRMs are electronic circuits
located near the CPU and their main
work is to provide steady and consistent
voltage to the processor. As the Power
supply unit converts external voltage eg.
240 volts to 12V or 5 V, this voltage is
again taken by VRMs first and then again
step down and regulates these voltages
and provides the continuous required
power to the processor.
1. MOTHERBOARD
2. 4 pin CPU Fan pin-out 4-pin
3. 12v 4 pin CPU Power Connector
4. 24 pin ATX Power Connector
5. FRONT PANEL CONNECTORS.
6. BIOS Short for Basic Input/Output System
7. CMOS BATTERY
8. NORTH BRIDGE CHIPSET
9. SOUTH BRIDGE CHIPSET
10. USB HEADER
11. IDE SLOT
12. MEMORY SLOT
13. PCI SLOT
14. Ethernet Card / Sound Card / Modem Card
15. AGP SLOT.
16. CPU SOCKET
17. CPU FAN
18. HEAT SINK
19. PARALLEL PORT
20. PS/2 connector
21. SERIAL PORT
22. LAN PORT
23. USB PORT
24. AUDIO PORT
25. VGA PORT
Lesson 8
“Performing basic input
output system (BIOS)
configuration”
How to Configure the BIOS Using the BIOS Setup Utility?
Adjust Settings
1. Familiarize yourself with the BIOS controls.
If you want to change what device to boot from, enter the Boot menu. From here, you can
designate which device the computer will attempt to boot from first. This is useful for booting
from a disc or flash drive to install or repair an operating system.
You'll typically use the arrow keys to go over to the Boot tab to start this process.
You can create a password Your BIOS’s clock will dictate your
that will lock the computer from Windows clock. If you replace your
booting unless the correct computer's battery, your BIOS clock
password is entered. will most likely be reset
6.
Change fan speeds and system voltages. 7. Save and Exit
So you might have heard the acronyms BIOS and UEFI thrown around, especially when trying to
switch Operating Systems or messing around with overclocking.
And you might know what these acronyms stand for (Unified Extensible Firmware Interface and
Basic Input/Output System, respectively). But have you ever wondered how they're used in a
computer system?
Boot Procedure
First things first – I know we're deviating from the topic, but I promise this will help you with
some concepts later on.
2. The CPU starts up, but needs some instructions to work on (remember, the CPU always
needs to do something). Since the main memory is empty at this stage, CPU defers to
load instructions from the firmware chip on the motherboard and begins executing
instructions.
3. The firmware code does a Power On Self Test (POST), initializes the remaining
hardware, detects the connected peripherals (mouse, keyboard, pendrive etc.) and checks
if all connected devices are healthy. You might remember it as a 'beep' that desktops used
to make after POST is successful.
4. Finally, the firmware code cycles through all storage devices and looks for a boot-loader
(usually located in first sector of a disk). If the boot-loader is found, then the firmware
hands over control of the computer to it.
We don't need to know more about this topic for the purposes of this article. But if you're
interested, then read on (otherwise, you can skip to next section).
5. So now that the boot-loader is loaded, its job is to load the rest of the operating system.
GRUB is one such boot-loader that is capable of loading unix-like operating systems and
is also able to chain-load Windows OS. Boot-loader is only available in the first sector of
a disk, which is 512 bytes. Given the complexity of modern operating systems, some of
these boot-loaders tend to do multi-stage loading, where the main boot-loader loads the
second-stage-boot-loader in an environment which is not restricted to 512 bytes.
6. The boot-loader then loads the kernel into memory. Unix-like operating systems then run
the init process (the master process, from which other processes are forked/executed) and
finally initialize the run-levels.
7. In Windows, wininit.exe is loaded along with some other processes like services.exe for
service control, lsass.exe for local security and authority (similar to run-levels)
and lsm.exe for local session management.
8. After all this, and after some other drivers are initialized, the Graphical User Interface
(GUI) is loaded and you are presented with the login screen.
This was a very high-level overview of the boot process. If you're interested in Operating
Systems, I would recommend that you read more on osdev.net.
Now let's get back to our original topic.
BIOS:
BIOS stands for Basic Input/Output System, the firmware we talked about in the above boot
procedure.
It provides many helper functions that allow reading boot sectors of attached storage and printing
things on screen. You can access BIOS during the initial phases of the boot procedure by
pressing del, F2 or F10.
UEFI:
ASUS UEFI
UEFI stands for Unified Extensible Firmware Interface. It does the same job as a BIOS, but with
one basic difference: it stores all data about initialization and startup in an .efi file, instead of
storing it on the firmware.
This .efi file is stored on a special partition called EFI System Partition (ESP) on the hard disk.
This ESP partition also contains the bootloader.
UEFI was designed to overcome many limitations of the old BIOS, including:
1. UEFI supports drive sizes upto 9 zettabytes, whereas BIOS only supports 2.2 terabytes.
3. UEFI has discrete driver support, while BIOS has drive support stored in its ROM, so
updating BIOS firmware is a bit difficult.
4. UEFI offers security like "Secure Boot", which prevents the computer from booting from
unauthorized/unsigned applications. This helps in preventing rootkits, but also hampers
dual-booting, as it treats other OS as unsigned applications. Currently, only Windows and
Ubuntu are signed OS (let me know if I am wrong).
5. UEFI runs in 32bit or 64bit mode, whereas BIOS runs in 16bit mode. So UEFI is able to
provide a GUI (navigation with mouse) as opposed to BIOS which allows navigation
only using the keyboard.
5. Click Troubleshoot.
____________________________________ ____________________________________
____________________________________ ____________________________________
____________________________________ ____________________________________
____________________________________ ____________________________________
____________________________________ ____________________________________
____________________________________ ____________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
__________________________________________________________
Lesson 9
Creating a Portable Bootable Device
ISO file is an exact copy of the compact disc. It can be used to make a backup of compact disc or
distribute software on Internet. PowerISO can not only create ISO file from compact disc, but
also create ISO file from local files and folders.
To create ISO file from local files and folders, please follow the steps,
• Run PowerISO.
• An empty compilation will be created automatically. By default, the compilation will
include iso9660 and joliet file system. If you want to create a DVD ISO file, you can
click on the "New" button on toolbar or choose the "File > New > Data CD / DVD
Image" menu, then select "UDF DVD". You can also change the media type by clicking
the media type area in the right bottom of the window.
• Add all files needed to the compilation and make necessary modification to the
compilation.
Click on the "Add" button on toolbar to add files and folders. You can also directly drag files and
folders from Windows Explorer to the PowerISO window.
Click the menu "Action > New Folder" to create a new folder.
Click the menu "Action > Change Label" to change the default label.
Click the menu "Action > Boot > Add boot information.." to add boot information file to the
compilation, thus can create bootable iso file.
Click the menu "File > Properties" to update the iso file properties.
• After you have made all necessary modification to the compilation, You can save the
compilation to an ISO file. Click on the "Save" button on toolbar, or choose the "File >
Save" menu.
• The "Save file" dialog will popup. Enter the iso file path name, and select the output
format to "Standard ISO Images (*.iso)" format, then click "Save".
• PowerISO will start creating iso file. It will show the progress information during writing
iso file. After the operation completes successfully, PowerISO will automatically open
the new created iso file.
4. In the new diskpart window, type “list disk” and hit Enter. It will display all the active disks
present on your computer. Here, you will see several disks.
5.Select the appropriate one based on the size of the disk. In our case, it is Disk 1.
Type “select disk 1” in the same window and hit Enter. You will now get a prompt “Disk 1 is
now the selected disk” That means any commands now will operate on Disk 1 directly.
6. Now, type “clean” and hit Enter to remove all of the data present in your USB drive. This
command will completely format your USB drive. Now, you will get a prompt “Diskpart
succeeded in cleaning the disk”.
To convert the disk to MBR, type “convert mbr”, otherwise for GPT, type “convert gpt”. Use
the recommendations provided below:
Note: The latest devices support UEFI non-CSM, however, if you are running it on an older
device then your best bet will be to use MBR.
Instead of a single partition to make an MBR bootable USB drive, here, you will need to create
two partitions because natively without supplying the NTFS drivers UEFI will not be able to use
the NTFS partition. It can only recognize FAT32 natively.
8. Type “select partition 1” and hit Enter. It will choose partition 1 for setting up it as an active
partition.
9. Now, type “active” and hit Enter. It will activate the current partition for you to work on.
10. Now you have to type “format fs=ntfs quick” and hit Enter. This command will finally
format your current partition as an NTFS file system.
To exit, simply type “exit” and hit Enter. The command will close the DiskPart utility but not the
CMD window.
An ISO image is an archive file that contains all the information found on an optical disc, such as
a CD or DVD. This could, for example, be a Windows installation CD.
Normally, whenever you start up your computer, it boots from the operating system stored on
your internal hard drive. By running the bootable USB however, you can boot up your computer
using the USB’s ISO image instead.
This can be useful if you ever need to recover, repair or install an operating system on your
computer.
Step 1: Open up Rufus and plug your clean USB stick into your computer.
Step 2: Rufus will automatically detect your USB. Click on Device and choose the USB you
want to use from the drop-down menu.
Step 3: Make sure the Boot Selection option is set to Disk or ISO image then click Select.
Rufus will open a file explorer browser window; locate the ISO image you want to burn onto the
USB and select it.
Note: In the latest version of Rufus (3.5), there’s now an option to download the ISO image
for Windows 8.1 or 10 directly through Rufus, if you don’t already have a copy saved. Just click
on the drop-down arrow next to the Select button and choose Download instead. This will open
a dialogue box where you can choose which Windows version you want to download.
Step 4: You’ll generally want to create a Standard Windows installation, and Rufus will
automatically detect the correct Partition Scheme based on your device, so keep the default
settings as they are. However, you can also change these if you want.
Step 5: Give the Volume label a name of your choice, or leave it as it is, and once again leave
the default settings for File system and Cluster size. Now click Start
Note: if the USB you’re using isn’t large enough, you’ll get an error message you letting you
know. In this case, you’ll need to start again with a different larger USB.
Step 6: You’ll get a warning saying that any data on the USB will be destroyed (this is normal).
Click OK and Rufus will start creating the ISO image on the USB.
Step 7: Once Rufus has finished creating the ISO image on the USB, you can close it and your
bootable USB is ready to go!
Write the complete process of Formatting the USB Drive (using diskpart).
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Instruction: Create a recorded video that you’re doing the Given Task Creating a bootable flash
drive. Send your output to your teacher email address.
If you don’t have a material to conduct the Task, you need to write the complete process of the
given task.
Performance Task Sheet
Title: Creating a bootable flash drive
Performance Objective:
Given the necessary instructions and equipment, you are required to Create a bootable flash drive.
Supplies : Cellphone with camera (for video recording)
Equipment : Computer, USB Flash Drive (8GB), Rufus
Steps/Procedure:
Download an ISO File of Windows 10 or Windows 7 (ultimate).
Download a Portable Rufus
Insert your USB Flash Drive to your System Unit.
Run the portable rufus.
Follow the steps in the lesson.
Wait for the process to be complete.
Lesson 10
Installation of portable
applications
Downloading and Installing - Step By Step
If you're not as familiar with downloading software and then installing it where you need it to be,
this is the guide for you. It explains in a step by step fashion, how to download an app (or the
suite) and install it to the portable device of your choice.
Downloading
1. Decide What You Want - The first step is to decide what you want to get. Do you want
a copy of Firefox Portable to run by itself? Or do you want to download the full
PortableApps Suite so you have a whole platform for portable apps? For most folks,
getting the whole suite is recommended.
2. Browse to the App Page - Now that you've decided what you'd like to get, browse to the
app's page with its logo and the big download button. If you scroll down to the download
details section of that page, it'll tell you how much space it will take up on your device.
3. Click the Download Button - Click the big red download button
4. Select a Mirror - The next page lets you select a mirror. This is just a technical way of
saying, select a download server that's close to you geographically so your download will
be faster. You'll see servers all over the world. Pick one nearby and then click the
Download link in the right-hand column of the table for the server you've chosen.
5. Save it Locally - Your browser will usually ask you where you'd like to save the file at
this point. We recommend saving it right to your computer's desktop so it's easy to find.
6. Wait for it to finish - The download will begin. After it finishes, you can move on to
installing
Installing
Now, installing is a bit different depending on whether you are installing the suite, installing an
app within the suite or just installing a standalone app.
as drive E in Windows Explorer, you'd select the path E:\ You can easily just click the
browse button next to the Install To line and then select your drive and click OK to fill
this in.
3. Click Ok - Once you're sure you've picked the right place to install to, just click ok.
4. Waiting - Installation will take a while. It will take anywhere from 1 to 20 minutes
depending on the speed of your drive. There will be times where the progress bar isn't
moving during this time. Be patient. It's installing. If your portable device has a little light
on it that lights up when it's being used, you'll see it flickering.
5. You're done - Once the install window goes away, it's installed. You can use the suite by
browsing to your portable device and double-clicking on the StartPortableApps.exe file.
Portable apps are designed to be installed to a USB flash drive, that you can move from machine
to machine. The installation program simply copies the program, and its associated files, to a
folder on the drive without making any changes to the windows registry. If you want to uninstall
the program, you simply delete the folder on the drive.
But you don't have to install portable apps to a USB flash drive. You can install them to your
hard drive and use them like any other program. But the one caveat is that because they don't
write to the windows registry, they don't integrate with windows. If ,for example, you were to
install the regular version of VLC player, it will write to the windows registry and associate
itself with video files so that you can play a video file in VLC by simply double clicking on
the video file. If you install the portable version of VLC, you don't get that feature
(although you can still manually set the file associations to do this).
So here is how to install portable apps to the hard drive. First, download the
Portable Apps Platform. This gives you a nice little portable apps start menu and an easy way
to manage updates. When you install the platform, choose New Install.
If your home directory is in the standard location (under C:\Users\), then go with the default.
If you have moved your home directory (to the D: drive or somewhere else),
Select "Run PortableApps.com Platform" and "Create shortcut" and click on the Finish button.
If it doesn't automatically start the platform, then start it from the start menu.
It will now pop up two windows. You can close the "What's new in the
PortableApps.com Platform" window. Scroll down in the other window and select one
You can click on Apps to bring up this window again. You can also click on Apps to check for
updates, and to install a portable app that you have manually downloaded from the
Click on Options to bring up this window. Click off the "Close Apps On Platform Exit"
check box. Change any other options that you want to change, and then click on the OK button.
If you get this popup when you exit the portable apps platform, choose No.
4. Will you recommend the Portable file to your friends, why or why not?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
5. Base on your experience in downloading a portable file, did it make your task
easy and faster?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
nd
2 Quarter
st
(1 SEMESTER)
Computer System
Servicing Part 1
Lesson 1
Installation of Operating
System (OS)
System Requirements
System requirements are the required specifications a device must have in order to use
certain hardware or software. For example, a computer may require a specific I/O port to work
with a peripheral device. A smartphone may need a specific operating system to run a
particular app.
Before purchasing a software program or hardware device, you can check the system requirements
to make sure the product is compatible with your system. Typical system requirements for a
software program include:
1. Operating system
2. Minimum CPU or processor speed
3. Minimum GPU or video memory
4. Minimum system memory (RAM)
5. Minimum free storage space
6. Audio hardware (sound card, speakers, etc)
1. Operating system
2. Available ports (USB, Ethernet, etc)
3. Wireless connectivity
4. Minimum GPU (for displays and graphics hardware)
Some system requirements are not flexible, such as the operating system(s) and disk space required
for software installation. Others, such as CPU, GPU, and RAM requirements may vary
significantly between the minimum and recommended requirements. When buying or upgrading
a software program, it is often wise to make sure your system has close to the recommended
requirements to ensure a good user experience.
Power-on Self-test
What is POST? POST, referred to as Power-On Self-Test, is the initial setup of its power-on
purpose to determine if there are hardware-related issues with the computer for proper diagnostic
testing. The computer is not the only device running POST. Some devices, medical devices, and
other devices can also perform very similar self-tests after they are powered on.
Tip: To learn more fixes for hardware-related issues, you can go to MiniTool to find the
answers.
If all hardware passes the power-on self-test, the computer will continue the bootup process and
may generate a single beep sound as well. If the power-on self-test is unsuccessful, it generates a
beep code to indicate the error encountered and the computer will not boot up. All computer
POST errors are related to hardware issues with one of the components in the computer.
The power-on self-test is the first step in the boot sequence. It doesn't matter if you just restart
your computer or turn it on for the first time within a few days. Regardless, POST will run.
It does not depend on any particular operating system. In fact, you don't even need to have an
operating system installed on your hard drive to run POST. This is because testing is handled by
the system's BIOS and not any installed software.
It checks for the existence and functioning of basic system devices, such as keyboards and other
peripherals, and other hardware elements (such as processors, storage devices, and memory).
After the POST, the computer will continue to boot, but only if it completes successfully. The
problem definitely comes after POST, such as Windows hangs during startup, but in most cases,
these problems may be due to operating system or software issues, not hardware.
In computers compatible with IBM PC, the main responsibility of POST is handled by the BIOS.
The BIOS will transfer some of these responsibilities to other programs designed to initialize
very specific peripherals, especially for video and SCSI initialization. The principal duties of the
main BIOS during POST are as follows:
• find, size, and verify the system main memory
• initialize BIOS
• identify, organize, and select which devices are available for booting
• verify CPU registers
• verify the integrity of the BIOS code itself
• verify some basic components like DMA, timer, interrupt controller
• pass control to other specialized extensions BIOS (if installed)
Almost everything that might prevent the computer from continuing to boot will signal some
kind of error. Errors can come in the form of flashing LEDs, audible beeps, or error messages on
the display, all of which are technically called POST codes, beep codes, and on-screen power-on
self-test error messages. The following chart is about beeps and their corresponding meanings:
Beeps Meaning
Continuous beep Power supply, system board, or maybe RAM problem, keyboard problem
Repeating short
Power supply or system board problem or keyboard
beeps
If some part of the power-on self-test fails, you will know soon after turning on the computer.
For example, if the problem lies with the video card, and therefore you can't see anything on the
monitor.
On macOS computers, power-on self-test errors often appear as an icon or another graphic
instead of an actual error message. For example, a broken folder icon after starting up your Mac
may mean that the computer can't find a suitable hard drive to boot from.
Certain types of failures during the POST might not produce an error at all, or the error may hide
behind a computer manufacturer's logo.
3. Confirm that Your PC Meets Requirements to Install Windows 10 on a New Hard Drive
If you attempt to install Windows 10 on a PC that do not meet the minimum installation
requirement, the installation is likely to fail.
To ensure your PC meets the requirement review the following information.
Below are the Windows 10 minimum installation requirements:
Processor: 1 gigahertz (GHz) or faster processor or SoC
RAM: 1 gigabyte (GB) for 32-bit Windows 10 or 2 GB for 64-bits
4. Determine Windows 10 Edition You Need to Install Windows 10 on a New Hard Drive
The table below list the core features offered by Home and Pro editions of Windows 10.
Based on the features in each edition, determine the edition that meets your needs.
You need this information to determine the Windows 10 licence you will purchase in the next
section.
4 GB on IA-32, 4 GB on IA-32
Maximum RAM
128 GB on x86-64 2 TB (2048 GB) on x86-64
Microsoft Edge ✔ ✔
BitLocker X ✔
AppLocker X X
You can buy Widows 10 license keys directly from Microsoft. The links below will take you to
the Microsoft pages where you can buy Windows 10 Pro and Home respectively.
When your PC boots it locates Operating System boot files in available boot media on the
computer. The boot sequence on the computer BIOS determines the first place the PC looks for
boot files.
To install Windows 10 to a new hard drive, modify your computers boot sequence to boot from
CD.
Lesson 2
Installation of peripheral/de
vices drivers and Accessing
and installing OS and drivers
updates/patches
How to install and update a computer driver
Many computer hardware components, like a video card, sound card, or motherboard, require
drivers to be installed to function properly. How a driver is saved and packaged determines how
it is installed. Below is information about each of the methods developers use to distribute their
drivers and install them in Microsoft Windows. Additionally, there are some general insights to
help prevent frustrations during the process.
Tip
In most situations, the drivers are installed after the hardware has been installed or connected to
the computer. If you need help installing hardware, see: How to install computer hardware.
Almost all computer and hardware manufacturers include a group of drivers for different
hardware devices and often for each of the supported versions of Windows. For example, the
driver CD you receive with your printer likely contains the drivers for many different printers
and may not have the printer you purchased. When installing the drivers, make sure you are
install the drivers for your printer and not another printer model. Also, make sure you are
installing it for the version of Windows you are running on your computer.
CD Example:
-PrinterA100
--Win9x
--Win2k
--WinXP
-PrinterA200
--Win9x
--Win2k
--WinXP
-PrinterB100
--Win9x
--Win2k
--WinXP
For example, if you had a PrinterA200 and were using Windows XP, you would find your
drivers in the PrinterA200\WinXP folder. Once the location of the drivers is found, you must
determine how the drivers are packaged. If the folder contains executable files or a setup file,
you can install the driver using an executable. If the directory contains .inf files, you can install
the driver using an inf or use the "have disk" option during the install.
Tip
If you have a CD with drivers, but the computer has no functioning disc drive, you can
also download the drivers. Or, if you have access to another computer, you can copy the drivers
from the CD to a USB flash drive. For help with copying files, see: How to copy files.
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
168
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
Once the drivers are found on the drive, you must determine how the drivers are packaged. If the
directory contains executable files or a setup file, you can install the driver using an executable.
If the directory contains .inf files, you can install the driver using an inf or use the "have disk"
option during the install. If the drivers are compressed into a .zip file, you need to uncompress
the file.
If you have not yet downloaded the drivers, you can find
drivers for your computer through the computer or device
manufacturer. For links to the websites of prominent computer
hardware manufacturers, see our hardware drivers index.
Tip
If you're downloading drivers to install on another device, you can copy or extract the files to a
USB flash drive and connect it to the other computer.
After the drivers are downloaded, you must determine how the drivers are packaged. If the
directory contains executable files or a setup file, you can install the driver using an executable.
If the directory contains .inf files, you can install the driver using an inf or use the "have disk"
option during the install. If the drivers are compressed into a .zip file, you need to uncompress
the file.
Tip
When extracting the drivers, remember where the folder containing the drivers is located since it
needs to be known during the driver installation process. We recommend extracting files to
a folder on the Windows desktop, as it's an easy place to remember.
Note
Finally, if you're successful with installing your drivers and the computer asks to reboot the
computer, make sure to reboot the computer after the driver is installed.
If Windows does not detect any new hardware, open the Control Panel and double-click the Add
hardware icon to run the hardware detection wizard. During the steps, you have the option to
install custom Windows drivers from a location on disk. Choose to load drivers, then select the
folder containing the drivers for your device.
Note
The "Add hardware" icon is only available in Windows XP and prior versions of Windows.
6. In the Hardware Update Wizard, point Windows to the location of the updated
driver files on your hard drive.
4. Choose the Windows Update tab in the left sidebar (circular arrows)
5. Click the Check for updates button. If there is an available update, it will begin
downloading automatically.
If you don't see an update, don't worry; this page will tell you if your hardware is currently
incompatible.
To finish the update, you'll need to restart Windows, but you do this later if there's no urgency.
Doing so is pretty straightforward — just follow these simple instructions. (Note, your system
will not be equipped with the latest updates until it's been restarted.)
2. You will then be taken to a scheduling page. From there, move the Schedule a Time slider to
the right (the "on" position).
3. The grayed-out "Pick a time" and "Pick a day" options will then be available to select. Use the
time ticker and the date drop-down to choose when to restart your laptop.
1. Type ‘device manager’ on Start menu search bar and click on the Device
Manager.
2. Select the specific category of driver that you’d like to update.
3. Right-click on the driver, and select Update driver.
Next, select Search automatically for drivers to go ahead with the update.
As you can see in my case, the best device drivers have already been installed and so,
the Windows can't install anything new.
If your Windows finds new drivers, they will be updated in a few seconds. If,
however, you are unable to find any new updates this way and, you're sure about the
new drivers, then you can go to the manufacturer’s website and look for an update
from there, as we've done in the last method.
Your new driver updates will be installed in a few seconds with the help of Windows
Update.
For instance, I am rolling with an HP laptop at present, and if I needed to update the
drivers, I’ll have to head to the drivers' section on HP’s website. From there, the
updates can be easily downloaded and installed.
Depending on the driver(s) that you want to update, all you have to do is go to the
update’s section of your manufacturer’s website, and proceed with the download.
Instruction: Read the question carefully. Write your answer in a sheet of paper.
Lesson 3
Undertaking an on-going check of the
quality of the work
Who carries out workplace inspections
Inspections in the workplace are usually carried out by:
When you carry out a workplace inspection, you are critically examining the workplace to
identify and report potential hazards that can be removed or avoided.
Workplace inspection should be supported by other measures to prevent risk. This includes
consulting with workers, especially when changes are being proposed to a process, procedure or
plant.
The checklist should be developed in consultation with work group representatives. This
includes health and safety representatives (HSRs), managers, workers and other interested
people.
Depending on the level of risk, work may need to stop until the risk is eliminated or adequate
controls are implemented.
Lesson 4
Installation of Application software
based on software installation guides,
end-user requirements and software
license agreement
Downloading and installing VMware Workstation (2057907)
Before starting
• Ensure that your physical machine meets the system requirements for VMware
Workstation. For more information, see System Requirements:
• Ensure that you are using a supported guest operating system. For more information,
see the VMware Compatibility Guide.
4. If prompted, log in to your Customer Connect profile. If you do not have a profile,
create one. For more information, see How to create a Customer Connect profile
(2007005).
5. Ensure that your profile is complete and enter all mandatory fields. For more
information, see How to update your Customer Connect profile (2086266).
6. Review the End User License Agreement and click Yes.
7. Click Download Now.
• Delete the cache in your web browser. For more information, see:
• You must have only one VMware Workstation installed at a time. You must uninstall
the previous version of VMware Workstation before installing a new version.
• If the installer reports an error when you run it, you must verify the download. For
more information, see Verifying the integrity of downloaded installer files (1537).
1. Log in to the Windows host system as the Administrator user or as a user who is a
member of the local Administrators group.
2. Open the folder where the VMware Workstation installer was downloaded. The
default location is the Downloads folder for the user account on the Windows host.
Note: VMware Workstation for Linux is available as a .bundle download in the VMware
Download Center. The Linux bundle installer starts a GUI wizard on most Linux distributions. In
some Linux distributions, the bundle installer starts a command-line wizard instead of a GUI
wizard.
1. Log in to the Linux host with the user account that you plan to use with VMware
Workstation.
2. Open a terminal interface. For more information, see Opening a command or shell
prompt (1003892).
3. Change to root. For example:
su root
Note: The command that you use depends on your Linux distribution and
configuration.
4. Change directories to the directory that contains the VMware Workstation bundle
installer file. The default location is the Download directory.
5. Run the appropriate Workstation installer file for the host system.
For example:
sh VMware-workstation-Full-xxxx-xxxx.architecture.bundle [--option]
Where:
• xxxx-xxxx is the version and build numbers
• architecture is i386 or x86_64
Option Description
--gtk Opens the GUI-based VMware installer, which is the default option.
Use this option to customize the locations of the installation directories and set the hard
--custom
limit for the number of open file descriptors.
Shows installation questions that have not answered before or are required. This is the
--regular
default option.
--ignore-
errors
Allows the installation to continue even if there is an error in one of the installer scripts.
or Because the section that has an error does not complete, the component might not be
properly configured.
-I
--required Shows the license agreement only and then proceeds to install Workstation
Note: If you are using the --console option or installing VMware Workstation on a
Linux host that does not support the GUI wizard, press Enter to scroll through and
read the license agreement or type q to skip to the yes/no prompt.
After installation
On Windows host systems:
• VMware Workstation can be started from the command line on all Linux distributions.
• On some Linux distributions, VMware Workstation can be started in the GUI from
the System Tools menu under Applications.
• To start VMware Workstation on a Linux host system from the command line, run
the vmware & command in a terminal window. For more information, see Opening a
command or shell prompt (1003892).
For example:
/usr/bin/vmware &
When you start the Workstation for the first time, Workstation prompts you to accept the End
User License Agreement. After you start Workstation, the Workstation window opens.
PARTS
1Installing VMware Workstation
2Installing an Operating System
3Navigating VMware
VMware Workstation is a program that allows you to run a virtual computer within your
physical computer. The virtual computer runs as if it was its own machine. A virtual machine is
great for trying out new operating systems such as Linux, visiting websites you don't trust,
creating a computing environment specifically for children, testing the effects of computer
viruses, and much more. You can even print and plug in USB drives. Read this guide to get the
most out of VMware Workstation.
Part 1
Installing VMware Workstationhttps://www.wikihow.com/Use-VMware-
Workstation
1
Make sure your computer meets the system requirements. Because you will be
running an operating system from within your own operating system, VMware
Workstation has fairly high system requirements. If you don’t meet these, you may not be
able to run VMware effectively.
• You must have a 64-bit processor.
• VMware supports Windows and Linux operating systems.
• You must have enough memory to run your operating system, the virtual
operating system, and any programs inside that operating system. 1 GB is
the minimum, but 3 or more is recommended.
• You must have a 16-bit or 32-bit display adapter. 3D effects will most
likely not work well inside the virtual operating system, so gaming is not
always efficient.
• You need at least 1.5 GB of free space to install VMware Workstation,
along with at least 1 GB per operating system that you install.
Download the VMware software. You can download the VMware installer from the
Download Center on the VMware website. Select the newest version and click the link
for the installer. You will need to login with your VMware username.
• You will be asked to read and review the license agreement before you
can download the file.
• You can only have one version of VMware Workstation installed at a
time.
3
Install VMware Workstation. Once you have downloaded the file, right-click on the
file and select "Run as administrator".[1]
• You will be asked to review the license again.
• Most users can use the Typical installation option.
• At the end of the installation, you will be prompted for your license key.
•
Once the installation is finished, restart the computer.
Part2
Installing an Operating System
1
Open VMware. Installing a virtual operating system is much like installing it on a
regular PC. You will need to have the installation disc or ISO image as well as any
necessary licenses for the operating system that you want to install.
• You can install most distributions of Linux as well as any version of
Windows.
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
186
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
2
Click File. Select New Virtual Machine and then choose Typical. VMware will prompt
you for the installation media. If it recognizes the operating system, it will enable Easy
Installation:
• Physical disc – Insert the installation disc for the operating system you
want to install and then select the drive in VMware.
• ISO image – Browse to the location of the ISO file on your computer.
• Install operating system later. This will create a blank virtual disk. You
will need to manually install the operating system later.
3
Enter in the details for the operating system. For Windows and other licensed
operating systems, you will need to enter your product key. You will also need to enter
your preferred username and a password if you want one.
• If you are not using Easy Install, you will need to browse the list for the
operating system you are installing.
4
Name your virtual machine. The name will help you identify it on your physical
computer. It will also help distinguish between multiple virtual computers running
different operating systems.
Set the disk size. You can allocate any amount of free space on your computer to the
virtual machine to act as the installed operating system’s hard drive. Make sure to set
enough to install any programs that you want to run in the virtual machine.
6
Customize your virtual machine’s virtual hardware. You can set the virtual machine
to emulate specific hardware by clicking the "Customize Hardware" button. This can be
useful if you are trying to run an older program that only supports certain hardware.
Setting this is optional.
7
Set the virtual machine to start. Check the box labeled "Power on this virtual machine
after creation" if you want the virtual machine to start up as soon as you finish making it.
If you don’t check this box, you can select your virtual machine from the list in VMware
and click the Power On button.
8
Wait for your installation to complete. Once you’ve powered on the virtual machine
for the first time, the operating system will begin to install automatically. If you provided
all of the correct information during the setup of the virtual machine, then you should not
have to do anything.
• If you didn’t enter your product key or create a username during the
virtual machine setup, you will most likely be prompted during the
installation of the operating system.
9
Check that VMware Tools is installed. Once the operating system is installed, the
program VMware Tools should be automatically installed. Check that it appears on the
desktop or in the program files for the newly installed operating system.
• VMware tools are configuration options for your virtual machine, and
keeps your virtual machine up to date with any software changes.
Part3
Navigating VMware
1
Start a virtual machine. To start a virtual machine, click the VM menu and select the
virtual machine that you want to turn on. You can choose to start the virtual machine
normally, or boot directly to the virtual BIOS.
2
Stop a virtual machine. To stop a virtual machine, select it and then click the VM menu.
Select the Power option.
• Power Off – The virtual machine turns off as if the power was cut out.
• Shut Down Guest – This sends a shutdown signal to the virtual machine
which causes the virtual machine to shut down as if you had selected the
shutdown option.
• You can also turn off the virtual machine by using the shutdown option
in the virtual operating system.
3
Move files between the virtual machine and your physical computer. Moving files
between your computer and the virtual machine is as simple as dragging and dropping.
Files can be moved in both directions between the computer and the virtual machine, and
can also be dragged from one virtual machine to another.
• When you drag and drop, the original will stay in the original location
and a copy will be created in the new location.
• You can also move files by copying and pasting.
• Virtual machines can connect to shared folders as well.
4
Add a printer to your virtual machine. You can add any printer to your virtual machine
without having to install any extra drivers, as long as it is already installed on your host
computer.
• Select the virtual machine that you want to add the printer to.
• Click the VM menu and select Settings.
• Click the Hardware tab, and then click Add. This will start the Add
Hardware wizard.
• Select Printer and then click Finish. Your virtual printer will be enabled
the next time you turn the virtual machine on.
5
Connect a USB drive to the virtual machine. Virtual machines can interact with a USB
drive the same way that your normal operating system does. The USB drive cannot be
accessed on both the host computer and the virtual machine at the same time.
• If the virtual machine is the active window, the USB drive will be
automatically connected to the virtual machine when it is plugged in.
• If the virtual machine is not the active window or is not running, select
the virtual machine and click the VM menu. Select Removable Devices
and then click Connect. The USB drive will automatically connect to
your virtual machine.
6
Take a snapshot of a virtual machine. A snapshot is a saved state and will allow you to
load the virtual machine to that precise moment as many times as you need.
• Select your virtual machine, click the VM menu, hover over Snapshot
and select Take Snapshot.
• Give your Snapshot a name. You can also give it a description, though
this is optional.
• Click OK to save the Snapshot.
• Load a saved Snapshot by clicking the VM menu and then selecting
Snapshot. Choose the Snapshot you wish to load from the list and click
Go To.[2]
7
Become familiar with keyboard shortcuts. A combination of the "Ctrl" and other keys
are used to navigate virtual machines. For example, "Ctrl," "Alt" and "Enter" puts the
current virtual machine in full screen mode or moves through multiple machines. "Ctrl,"
"Alt" and "Tab" will move between virtual machines when the mouse is being used by 1
machine.
Instruction: Write down the complete process of the following on a sheet of paper.
Lesson 5
Variation to application
software installation
How to Install or Uninstall Programs in Windows 10?
Installing new programs to facilitate the accomplishment of various tasks in Windows 10 is not
something that users do frequently. Also, if some applications are not working correctly or you
no longer need them, it is always healthy to uninstall them from your computer. Windows 10
provides various methods through which users can add or remove programs to or from their
computer system. Below are the ways through which you can install or uninstall programs in
Windows 10.
• To install a program, you need to have the installation file in a disk, flash drive or
downloaded and saved in your computer hard disk.
• For instance, to install Microsoft Office, access the executable file and double-click on
the file to start the installation.
Start Installation
• If asked whether to allow the program to make changes to the computer, click “Yes” to
continue.
• Allow Windows to extract the installation files and launch the installation wizard.
Extracting Files
• Read the “License Terms” and tick the “I accept the terms of this agreement” box, then
click “Continue”.
Accept T&Cs
Installing Program
• You will get a notification when the program has been successfully installed. Click
“Finish” to complete the installation.
Complete Installation
Note:
1. Before you start installing a program, it is important to check whether your system
features meets the system requirements for the particular version of the program.
2. Installation process differs from one program to the other but in most cases, the
procedure is plug and play.
3. The installation process may take seconds to a few minutes depending on the size of the
program, but installation can run in the background as you continue working on your PC.
Uninstall Program
• Click “Yes” to confirm the action – allow the program to make changes to the computer.
• The uninstallation wizard will open. Follow the plug and play instructions to continue
with the process.
• Click “Finish” to complete the uninstalling the program.
Complete Uninstallation
Uninstall
• The removal process will start and you can see the progress.
• Follow the instruction keenly to completely and safely remove the program.
Windows Vs Mac
On Mac, the installation file will not be an executable .exe file. Mac installer file is a disk image
file with .dmg extension. You can simply extract the file like a zip archive and use the
application. However, some developers offer installer package which needs to be installed
similar to Windows 10 programs.
The uninstallation process is also simple on Mac. You can simply drag and drop the app to trash
to delete it from your computer. Learn more on installing and uninstalling apps on Mac.
Materials:
✓ Computer or Laptop
✓ Internet Connection
Instruction:
❑ Using the Internet connection download a VM Ware Installer, Windows 10 / Windows 7
ISO File and Any Software Application you wanted.
❑ On your computer or laptop, follow the Complete Process of Installing WM Ware
Workstation
❑ After installing WM Ware Workstation, you need install Windows 10 / Windows 7
follow the process on Install Operating System
❑ After finishing the installation of an Operating System, Install the application you’ve
download.
Note: If you don’t have the material to do the Task, Write the complete process on a sheet of
paper.
Lesson 6
Accessing and Installing
Software updates
How to update your software
Keeping your software up to date is a crucial practice in Internet safety. Most software updates
automatically by default, but you should know how to check the updates and begin the process
yourself. Knowing how to keep your software updated can improve your computer's stability and
security and let you know about new features, helping you be an informed and empowered user.
Keeping your operating system updated is one of the most important steps in protecting yourself
from viruses, malware, and other Internet security threats.
Windows
To update Windows, first open the Control Panel. If you don't know where the Control Panel is,
check out this lesson in Windows Basics. In the search bar in the Control Panel, type update.
Under Windows Update, click Check for updates.
It may take a moment for Windows to search for updates. Once it does, if there are any updates
available it will prompt you to install them.
It may take a while to install all the updates. It's safe to leave the computer and do something
else while it finishes. Once it's done, Windows will probably prompt you to restart the computer.
If you need to do anything else after this, Windows will prompt you; otherwise, you're up to
date!
macOS
To update macOS, open the App Store, then click Updates at the top. macOS updates will be at the top of
the list of available updates. On the right side of the screen, there are buttons to update individual apps or
to apply all available updates.
Apple has an excellent support page on how to check for updates for macOS and apps.
For many apps, regular updates provide new features and stability rather than security patches, so
it isn't necessary to update them as frequently. However, for more essential software like web
browsers and antivirus software, security updates are just as critical as operating system updates.
Many apps in both macOS and Windows will automatically check for updates when you open
them. If you installed them through the App Store or another distribution platform, the program
will alert you about updates. For standalone programs, take time to explore the program's menus
and learn how to run the update process.
For example, in Avast! Free Antivirus, there is an Update page on the Settings screen.
However, in Firefox, the About Firefox screen in the Help menu also checks for updates.
• Online programs - Any program that connects to the Internet should automatically check
for updates when first run.
• Help menu - Pressing F1 or accessing the help menu from the file menu should have the
option to check for updates.
• Operating system - Today, all operating systems are updated using software included
with the operating system.
• OEM program - An OEM computer (e.g., Dell or HP) often includes assistant programs
to help with checking and downloading any updates for the pre-installed programs
included with the computer. For example, HP includes the HP support assistant program
for managing updates.
• Developer/publisher website - Many software developers and publishers provide updates
to software through their websites. Check their website for any available updates, which
may include bug fixes and added features.
• Fix errors - Most updates fix errors, and if you don't update, you'll get those errors.
• Security vulnerabilities - Updates also patch security holes. If you don't update, your
information may be compromised.
• Fix conflicts - It is not uncommon to discover conflicts with other programs and
hardware. If you don't update, conflicts may happen and cause problems with other
programs.
Updates sometimes run automatically in the background. Other times, software updates
(commonly referred to as ‘patches’) come in the form of a free download. They’re usually
necessary for your product to continue running successfully.
That’s because software updates address any new-found security issues, fix recently discovered
bugs, and add support for drivers and new hardware. They tweak and improve the way the
program operates, but they don’t fundamentally alter it.
Simply put, software updates modify, fix and alter your current software program on a regular
basis. They’re the software equivalent of keeping your bicycle oiled. It’s still the same bike, it
just runs smoother.
Software upgrade
A software upgrade is a bit different. Instead of building on your existing program, a software
upgrade is a new version of the software product entirely. It’s a bit like buying a new bike the
same make as your old one, but with flashy new enhancements already added. And it comes with
a host of new functionality that makes it a superior bike to your old one.
A software upgrade, then, supersedes the old product. Upgrades are used for significant changes
and major improvements to your current version of the program. It might have an overhauled
user interface, or an exciting set of new features, or key structural changes.
While updates are often small and free, and rarely demand much attention, a software upgrade is
a much bigger process. Unlike updates, software upgrades aren’t always compulsory or
necessary for a program to keep running. Completing a product upgrade may involve a new
purchase or pricing system. Because of this, companies will often offer existing customers
incentives to upgrade their software. For example, they might reduce the upgrade cost or stop
supporting their legacy program.
Because of the scope involved, a software upgrade is less common than an update. It’s not
something that will quietly slip under the radar like a quick bug fix. It’s a software show-stopper
that involves the work of marketing teams, customer service teams, and sales teams – not just the
developers busy perfecting the product in the background.
connection, but if 14,000 people download a two-gig update for a game simultaneously, it takes
longer.
• The program or files used by the program are still running and cannot be updated while
being used. Reboot the computer to make sure this is not the case.
• The update being used is for a different type of computer, processor, or program. If there
are multiple updates available, make sure you're downloading the version for your
computer, processor, operating system, and version of the program.
• The software being updated is pirated. For some pirated software to run, it must be
modified, which can prevent updates from working. Purchase the program.
• The files being updated are corrupted or infected. If you have an anti-malware program,
run it on the computer. As far as verifying nothing is corrupt, the only solution would be
to uninstall the program and then install the program. Once reinstalled, rerun the update.
• The update itself has problems and needs to be recreated.
• The update is not compatible with your computer or the hardware in your computer. To
get a custom update or find special instructions, you'd need to work with the developer of
the update.
New content is added to the site regularly so that you can obtain recent updates and fixes to help
protect your computer and to keep it running smoothly. To use the Microsoft Update site to
install all critical updates for your computer, follow these steps:
Instruction: Read the given question carefully, write your answer on a sheet of paper.
Lesson 7
Testing of devices /systems
and/or installation
Technicians need to adhere to health and safety regulations as they will help to protect everyone
and to avoid any unnecessary legal action for reckless and unsafe working practices. Any health
and safety problems, the line manager or the health and safety representative must be informed
immediately.
The most basic test is to switch the system on to check it starts without errors. ICT professionals
are also likely to use tools and utilities to check that all is well with the system after installation.
• Digital multimeter is a device that can take many types of measurements. It tests the
integrity of circuits and the quality of electricity in computer components. A digital
multimeter displays the information on an LCD or LED.
• A loopback adapter, also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
• A toner probe is a two-part tool. The toner part is connected to a cable at one end
using specific adapters, such as an RJ-45, coaxial, or metal clips. The toner generates
a tone that travels the length of the cable. The probe part traces the cable. When the
probe is in near proximity to the cable to which the toner is attached, the tone can be
heard through a speaker in the probe.
Software Tools
Like hardware tools, there are a variety of software tools that can be used to help technicians
pinpoint and troubleshoot problems. Many of these tools are free and several come with the
Windows operating system.
• FDISK: A command-line tool that creates and deletes partitions on a hard drive. The
FDISK tool is not available in Windows XP, Vista, or 7. It has been replaced with the
Disk Management tool.
• Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
• Format: Prepares a hard drive to store information.
• ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by
scanning the file system. These tools might also check the disk surface for physical
errors.
Tip
If you get an error or something doesn't work when following these procedures, take a peek at
the Troubleshooting Disk Management topic. If that doesn't help - don't panic! There's a ton of
info on the Microsoft community site - try searching the Files, folders, and storage section,
and if you still need help, post a question there and Microsoft or other members of the
community will try to help. If you have feedback on how to improve these topics, we'd love to
hear from you! Just answer the Is this page helpful? prompt, and leave any comments there or in
the public comments thread at the bottom of this topic.
Here are some common tasks you might want to do but that use other tools in Windows:
• EFI system partition - This is used by modern PCs to start (boot) your PC and
your operating system.
• Windows operating system drive (C:) - This is where Windows is installed, and
usually where you put the rest of your apps and files.
• Recovery partition - This is where special tools are stored to help you recover
Windows in case it has trouble starting or runs into other serious issues.
Although Disk Management might show the EFI system partition and the recovery partition as
100% free, it's lying. These partitions are generally pretty full with really important files your PC
needs to operate properly. It's best to just leave them alone to do their jobs starting your PC and
helping you recover from problems.
TEST PROCEDURES
A test procedure is a set of steps to guide you through what needs to be done to thoroughly test the
installation. It is designed to help you work more effectively and to make sure you test everything
that needs testing.
1. Gathering test information. The first step is to run the tests required by the procedure
and find out what happens. You should record all the results of your tests in a log so
that you know which pass and which fail, thereby requiring further action.
2. Validating the test information. The next step is to check the data you gathered from
the tests to make sure it is correct. This is usually done by running the tests again.
3. Responding to test information. This step is important because you need to be able
to recognize when a test shows problems or is successful. For example, if ping is used
to test a network connection then ‘Request timed out’ shows the test was not successful.
4. Checking specification. The final step is an important end to testing. You need to
check the specification for the installation to make sure that it has been met. For
example, if a user requested an upgrade to make their display run at 1920 x 1200, then
the ICT professional should check that the graphics card and screen can do this.
NOTICE: Before you proceed with the internal visual inspection, ensure that all
open files are saved and exited all open application programs if possible.
1. Turn off the system, including any attached peripherals, and disconnect all the 779
AC power cables from electrical outlets.
CAUTION: Before beginning to work inside the computer, disconnect the power
supply from the power source and the power supply cables from the power
supply.
2. Remove the computer’s right-side cover.
CAUTION: The heat sink assembly can get extremely hot during system
operations. Be sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp
edges on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of
each chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are firmly attached
to their appropriate connectors.
7. Reinstall the computer cover.
8. Reconnect the computer and any attached peripherals to their power sources, and turn
them on.
Identification.
_______________1. command-line tool that creates and deletes partitions on a hard drive.
_______________2. a device that can take many types of measurements. It tests the integrity of
circuits and the quality of electricity in computer components.
_______________3. This is where Windows is installed, and usually where you put the rest of
your apps and files.
_______________4. is a series of beeps that indicates an error condition.
_______________5. This step is important because you need to be able to recognize when a test
shows problems or is successful.
Stress Testing
Stress Testing is a type of software testing that verifies stability & reliability of
software application. The goal of Stress testing is measuring software on its
robustness and error handling capabilities under extremely heavy load conditions and
ensuring that software doesn’t crash under crunch situations. It even tests beyond
normal operating points and evaluates how software works under extreme conditions.
The application under testing will be stressed when 5GB data is copied from the
website and pasted in notepad. Notepad is under stress and gives ‘Not Responded’
error message.
• During festival time, an online shopping site may witness a spike in traffic, or when it
announces a sale.
• When a blog is mentioned in a leading newspaper, it experiences a sudden surge in
traffic.
It is imperative to perform Stress Testing to accommodate such abnormal traffic spikes. Failure
to accommodate this sudden traffic may result in loss of revenue and repute.
To conduct Stress Testing, sometimes, massive data sets may be used which may get lost during
Stress Testing. Testers should not lose this security-related data while doing stress testing.
The main purpose of stress testing is to make sure that the system recovers after failure which is
called as recoverability.
Load Testing is to test the system behavior under Stress testing is to test the system behavior
normal workload conditions, and it is just testing or under extreme conditions and is carried out
simulating with the actual workload till the system failure.
In distributed client-server systems, testing is done across all clients from the server. The role of
stress server is to distribute a set of stress tests to all stress clients and track on the status of the
client. After the client contacts the server, the server adds the name of the client and starts
sending data for testing.
Meanwhile, client machines send signal or heartbeat that it is connected with the server. If the
server does not receive any signals from the client machine, it needs to be investigated further for
debugging. From the figure, a server can connect with the 2 clients (Client1 and Client2), but it
cannot send or receive a signal from Client 3 & 4.
Night run is the best option to run these stress testing scenarios. Large server farms need a more
efficient method for determining which computers have had stress failures that need to be
investigated.
1. Planning the Stress Test. Here you gather the system data, analyze the system, define the
stress test goals
2. Create Automation Scripts: In this phase, you create the Stress testing automation scripts,
generate the test data for the stress scenarios.
3. Script Execution: In this stage, you run the Stress testing automation scripts and store the
stress results.
4. Results Analysis: In this stage, you analyze the Stress Test results and identify
bottlenecks.
5. Tweaking and Optimization: In this stage, you fine-tune the system, change
configurations, optimize the code with goal meet the desired benchmark.
Lastly, you again run the entire cycle to determine that the tweaks have produced the desired
results. For example, it’s not unusual to have to 3 to 4 cycles of the Stress Testing process to
achieve the performance goals
Jmeter
Stress
This tool provides extensive analysis of the web application performance, provides results in
graphical format, and it is extremely easy to use. No high-level scripting is required and gives a
good return on investment.
Neo load
This is a popular tool available in the market to test the web and Mobile applications. This tool
can simulate thousands of users in order to evaluate the application performance under load and
analyze the response times. It also supports Cloud-integrated – performance, load and stress
testing. It is easy to use, cost-effective and provides good scalability.
• Pages per Second: Measures how many pages have been requested / Second
• Throughput: Basic Metric – Response data size/Second
• Rounds: Number of times test scenarios have been planned Versus Number of times a
client has executed
Application Response
Failures
• Failed Connections: Number of failed connections refused by the client (Weak Signal)
• Failed Rounds: Number of rounds it gets failed
• Failed Hits: Number of failed attempts done by the system (Broken links or unseen
images)
Conclusion
Stress testing’s objective is to check the system under extreme conditions. It monitors system
resources such as Memory, processor, network etc., and checks the ability of the system to
recover back to normal status. It checks whether the system displays appropriate error messages
while under stress.
The main purpose of stress testing is to check the recoverability of the system, program, device,
or network.
There are five different types of stress testing i.e. Distributed Stress Testing, Application
Stress Testing, Transactional Stress Testing, Systemic Stress Testing, and Exploratory Stress
Testing.
This article will help you in selecting the right stress testing tool. Tool selection depends on the
type of testing that you want to perform like Stress testing for your PC, Stress testing for CPU,
Stress testing for RAM, or Stress testing for GPU.
The image given below will show you the different factors of stress testing.
While performing hardware stress testing, we need to monitor different factors like temperature,
etc and it varies according to the model design and infrastructure. Coverage of stress testing, as
well as the risk, should be considered before it is performed.
If you are performing stress testing on the computer then the focus of stress testing will be on
two components, i.e. the CPU and memory.
CPU stress testing is performed to check the CPU’s performance after running it at a full speed
completely up to maximum temperature. When CPU stress testing is performed, all the cores of
the multi-core system will get used. CPU will get tested with a compatible and justified
workload.
GPU stress testing is performed to check its limits by utilizing its full processing power. Stress
testing a RAM is the first thing that you should perform if you are facing any of the problems
like bluescreen or system reboot.
Different tools use different techniques for checking the performance of the system. For
Example, some tools use a 3D scene or some use the prime numbers.
Suggested Read => Most Popular Performance Testing Tools
Tip: Hardware stress testing should be performed according to its usage. While performing
hardware stress testing make sure that your CPU is well ventilated, is cooled down properly, etc.
Most importantly, check if the power supply is good.
=> Contact us to suggest a listing here.
Type of
Stress Test Tools Scripting Best For Capability testing tool Price
can perform
Let’s Explore!!
#1) LoadTracer
Price: Free
LoadTracer is a tool for stress testing, load testing, and endurance testing. It is used to check the
performance of web applications. It is a lightweight application. It works with any browser and
technology. It is easy to use and allows you to perform testing without scripting.
Features:
• It has an analyzer for producing graphs and reports.
• LT Monitor will provide various performance counters for monitoring.
•
The Recorder can record all the interactions between the browser and the server.
It generates the script file of that.
• Using the script, Simulator generates virtual users.
Website: LoadTracer
#2) JMeter
Price: Free
JMeter is an open-source application. Initially, it was designed for testing web applications but
now some other test functions are also included. It is used to measure the performance of static
and dynamic resources.
It is also used to load test the functional behavior of applications. It is used to load test the server,
group of servers, network, etc.
Features:
•
It provides the command-line mode to java compatible OS.
•
It offers Test IDE which can record, build, and debug.
•
Facility to replay the test results.
•
It provides an HTML report.
•
Complete portability.
•
Pluggable and Scriptable Samplers.
Website: JMeter
#3) Locust
Price: Free
Like JMeter, Locust is also an open-source tool for load testing. It supports defining user code
with Python code. Instead of clunky UI, it provides you the facility to describe your test in
Python code.
Features:
•
It supports the running of load tests on multiple distributed machines.
•
It is scalable as millions of users can be simulated simultaneously.
•
User behavior can be defined in code.
Website: Locust
#4) BlazeMeter
Price: BlazeMeter offers three pricing plans i.e. Free, Basic ($99 per month), and Pro ($499 per
month).
BlazeMeter can be used for Performance testing, continuous testing, functional testing, and soak
testing of API, Websites, and Apps. It will let you take full advantage of open-source tools like
JMeter, Selenium, and Gatling, etc.
Features:
• Front end performance can be monitored under the load.
• No coding will be required to perform performance testing on URLs.
• Blazemeter will provide real-time reporting and comprehensive analytics.
• It provides multiple options to record the traffic of Native and mobile Web App.
This feature works for any type of device.
• It provides many more features like scalability, network emulation, and
monitoring integrations.
Website: BlazeMeter
Load Multiplier can be used in various domains and technologies. It includes SIP Servers or
Clients, IMS Servers or Clients, HTTP Servers or Clients, and WebRTC Servers or Clients. It
offers different testing tools to test BFSI, Telecom, VoIP, Media, Web, WebRTC, and
Proprietary Products.
Features:
•
High optimal design.
•
It gives you the flexibility to use a single machine, cluster of machines or creation
of single or multiple testbeds for generating the volume of load.
• It also provides a test automation framework.
Website: Load Multiplier
CPU, GPU, RAM, and motherboard stress test tools will help you to monitor the components
and give information about the temperature, load, fan speed, and several other factors. We have
shortlisted the top stress testing tools for your reference. The list includes a tool named PCMark
10 which is a tool for benchmarking.
The benchmarking process is similar to stress testing. Stress testing is performed to check the
stability and benchmarking is for measuring and assessing the maximum performance.
#6) PCMark 10
Price: The Basic Edition of PCMark 10 is free. The Advanced Edition of PC Mark 10 will cost
you $29.99. Both these are for home users. PCMark 10 Professional Edition is for business use.
The price of this plan starts at $1495 per year.
It performs the test for a wide range of activities. It includes activities from daily productivity
tasks to demanding work of digital content.
There are three products of PCMark 10, i.e. PCMark 10 benchmark, PCMark 10 Express, and
PCMark 10 Extended. PCMark 10 benchmark is for PC evaluating organizations. PCMark 10
Express is for basic work tasks. PCMark 10 Extended is for the complete assessment of the
system performance.
Features:
•
The latest version has new and improved versions.
•
It supports Windows OS and Windows 10 is also supported.
•
It provides extended and custom run options.
•
It provides multi-level reporting.
•
No need to select the mode as in PCMark 8.
Website: PCMark 10
#7) HeavyLoad
Price: Free.
JAM Software offers the product HeavyLoad to Stress test your PC. HeavyLoad is a Freeware. It
puts a heavy load on your workstation or server PC. HeavyLoad can stress test the CPU, GPU,
and memory.
Features:
• It will allow you to customize the test methods as per your needs.
• It lets you choose the available cores for testing.
• It checks the system’s behavior with dwindling disk space.
•
It also checks memory allocation with scarce memory.
•
For stress testing of GPU, it uses the 3D rendered graphics.
Website: HeavyLoad
#8) BurnInTest
Price: It offers a free trial for 30 days. BurnInTest Standard Edition will cost you $59 and the
Professional edition will cost $95. Support and updates are included with both the pricing plans.
BurnInTest is a tool for load and stress testing of Windows PC. BurnInTest will allow you to
stress test all your computer sub-systems simultaneously. For storing the test results at a central
place, it can be integrated with PassMark Management Console.
Features:
• It will help you with PC troubleshooting and diagnostics.
• As it can perform simultaneous testing, it reduces the time required for testing.
• It can perform testing for CPU, Hard drives, SSDs, RAM & Optical drives, Sound
Cards, Graphic Cards, Network Ports, and Printers.
Website: BurnInTest
Additional Tool for PC Stress Test:
#1) Intel Extreme Tuning Utility
Intel Extreme Tuning Utility is an application with strong capabilities for Windows systems. It
will allow you to overclock, monitor, or stress the systems.
Before performing this type of testing, different parameters like temperature, overclocking,
underclocking, and overvolting should be changed according to the heavy CPU loads.
While performing the CPU stress test, the CPU should be properly ventilated and cooled. While
running the CPU stress testing, the temperature should be monitored frequently. CoreTemp is
optional software that can be used for temperature monitoring. This step can avoid the damages
caused by overheating.
The below image will show you the temperature difference of the CPU with different tools.
[image source]
Also, while running the test, make sure that the CPU usage is 100%. If we take the example of
the Prime95 program, then it should at least run for 3 to 6 hours to overclock the CPU correctly.
Some of the top tools for the stress testing of the CPU are listed below.
Core Temp is a powerful tool for monitoring the temperature of each core of every processor of
the system. It will display the temperature in real-time with changing workloads. It works for
Intel, AMD, and VIA*86 processors.
Features:
•
Motherboard agnostic.
•
Supports customization.
•
Supports expandability.
•
A platform for plugin-in that will be helpful to developers is also included.
Website: Core Temp
#10) HWiNFO64
Price: Free
[image source]
HWiNFO64 is the diagnostic software for Windows and DOS systems. It can perform hardware
analysis, monitoring, and reporting. It has features of customization, extensive reporting, and in-
depth hardware information. You can download it for free.
Features:
•
It will provide in-depth hardware information.
•
It performs system monitoring in real-time.
•
It will provide extensive reports. It provides multiple types of reports.
•
It supports Intel, AMD, and NVIDIA hardware components.
Website: HWiNFO64
#11) Prime95
Price: Free
Prime95 is the tool for stress testing of CPU and RAM. It provides the option to perform stress
testing on both memory and processor. Its new version has included a sub-project of finding
prime Mersenne cofactors. Prime95 can be used in two ways i.e. automatic and manual. You can
download it for free.
Features:
•
It has a newly added P-1 factoring.
•
It has also included Step 1 GCD for ECM.
•
For LL tests, it can perform enhanced error checking.
•
It supports Windows, Mac OS, Linux, and FreeBSD.
Website: Prime95
#12) Cinebench
Price: Free
Cinebench is available for Windows as well as Mac OS. It is used for measuring the performance
of CPU and GPU. For measuring the performance of the CPU, it includes a photo-realistic 3D
scene in a test scenario. This scene uses various algorithms and gives stress on all available
processor cores.
Features:
• The system’s performance is checked using a 3D scene.
• All the available cores are stressed using the various algorithms.
• It displays the result in points. The higher the number, the faster will be the
processor.
Website: Cinebench
Additional Tools for CPU Stress Test:
#1) AIDA64
AIDA64 can detect fake video cards of NVIDIA and monitor sensor values. Intel CPU platforms
and the latest AMD are supported by AIDA64. It provides Apps for iOS and Windows phones.
These apps are available for download free of cost.
Website: AIDA64
#2) IntelBurn Test
IntelBurn Test is a freeware program for simplifying the usage of Linpack. Linpack is provided
by Intel(R) for performing the stress testing of the CPU. IntelBurn Test supports Windows 7,
Windows Vista, and Windows XP.
Bad graphics cards, bad drivers, overheating, or bad memory can be the reasons for bluescreen
and system rebooting. Hence, if you are facing any of the issues like a blue screen or system
rebooting, we will recommend testing the memory first. One of the reasons for such a
recommendation is that it is easier to do.
With memory testing, we particularly check the computer’s memory allocation techniques with
scarce memory. We have shortlisted some of the RAM Stress testing tools for your reference.
MemTest86 is the program for memory testing. For testing the RAM, it makes use of
comprehensive algorithms and test patterns. It can use 13 different algorithms and supports the
latest technologies.
Features:
• It has features like report file generation and customizable reports.
• It supports multiple languages.
•
It is bootable from the USB.
•
It supports multiprocessor, UEFI BIOS, DDR2/DDR3, and DDR4.
Also read =>> How to enter BIOS Menu in Windows 10 and Mac OS
Website: MemTest86
#14) Stress-ng
Price: Free
Stress-ng is the program to test your computer sub-systems. It will also help you with exercising
the OS kernel interfaces. It can perform over 200 stress tests. It has 70 CPU specific stress test
and 20 virtual memory stress tests. It supports Linux OS.
Features:
•It has around 200 stress test.
•It is designed in such a manner in which different subsystems and OS kernel
interfaces will get exercised.
• It has 70 stress tests specific for CPU which includes floating-point, integer, bit
manipulation, and control flow.
• It can perform 20 stress tests for virtual memory.
Website: Stress-ng
Additional Tools for RAM Stress Test:
#1) HWiNFO64
As seen before HWiNFO64 is also used for stress testing of RAM.
#2) Prime95
As seen before it can perform stress testing on CPU as well as RAM. Prime95 provides the
feature of Torture Test for the stress testing of CPU and RAM.
The aim of GPU stress testing is to crash or overheat or to ensure that the graphics card will not
crash even after intensive use. While performing the testing, the temperature should be
monitored frequently and it should not exceed 100 degrees Celsius.
We have chosen the best tools for GPU stress testing and have listed them below. We would like
to provide some tips for the selection of GPU stress testing tools:
•
The tool should be able to read any sensor output and write it to a file in real-time.
•
It should have a less cluttered display.
Tool’s support for the graphics card provider (like NVIDIA, AMD, or ATI)
•
Top GPU Stress Test Tools:
#15) GPU-Z
Price: Free
GPU-Z will give you information about the video card and graphics processor. It is a lightweight
program. It has many features including the support for NVIDIA, AMD, ATI, and Intel Graphics
devices. It supports Windows OS (32 and 64 bit). It will also help you with the backup of your
graphics card and BIOS.
Features:
•
It will allow you to customize the fan profile.
•
Benchmarking.
•
Video recording.
•
It supports graphics cards of all companies.
Website: MSI Afterburner
It can perform performance and stability testing for the cooling system, power supply, video
card, and PC hardware. It supports Windows, Linux, and Mac OS. For GPU stress testing, it
supports ATI, Intel, and NVIDIA.
Features:
•
It provides command-line automation support.
•
It provides reports in CSV format.
•
Its key features include GPU temperature and clock monitoring.
Website: Heaven & Valley Benchmarks
#18) 3DMark
Price: 3DMark is available for $29.99.
3DMark is the tool for measuring the performance of gaming components on desktops, tablets,
notebooks, and smartphones. It is available for Android and iOS devices.
Features:
•
DLSS feature test.
•
It supports desktops, notebooks, smartphones, and tablets.
•
It is available for Windows, Android, and iOS.
Website: 3DMark
Additional Tools for GPU Stress Test:
#1) FurMark
FurMark is a stress testing tool for GPU. It is a lightweight application and supports Windows
OS. It is available for free.
Website: FurMark
#2) HWiNFO64
As seen before, HWiNFO64 is used for GPU, CPU, and RAM stress testing. HWiNFO64 can
perform the task of Graphics card monitoring. It will provide you the real-time information about
any sensor output.
#3) Cinebench
As seen earlier, Cinebench is used for measuring the performance of the CPU as well as GPU.
For measuring the performance of Graphics card, Cinebench makes use of a complex 3D scene.
It measures the performance in OpenGL mode.
Part 1. Identification.
_________________1. is measuring software on its robustness and error handling capabilities
under extremely heavy load conditions and ensuring that software doesn’t crash under crunch
situations.
_________________2. testing which can be tested across multiple systems running on the same
server.
_________________3. concentrate on finding defects related to data locking and blocking,
network issues and performance bottlenecks in an application.
_________________4. testing which is used to test the system with unusual parameters or
conditions that are unlikely to occur in a real scenario.
_________________5. testing on one or more transactions between two or more applications.
Lesson 9
5S and 3Rs environmental
policies
WHAT ARE THE FIVE S's?
Quality Glossary Definition: Five S’s (5S)
5S is defined as a methodology that results in a workplace that is clean, uncluttered, safe, and
well organized to help reduce waste and optimize productivity. It's designed to help build a
quality work environment, both physically and mentally. The 5S philosophy applies in any work
area suited for visual control and lean production. The 5S condition of a work area is critical to
employees and is the basis of customers' first impressions.
• Seiri: To separate needed tools, parts, and instructions from unneeded materials and to remove
the unneeded ones.
• Seiton: To neatly arrange and identify parts and tools for ease of use.
• Seiso: To conduct a cleanup campaign.
• Seiketsu: To conduct seiri, seiton, and seiso daily to maintain a workplace in perfect condition.
• Shitsuke: To form the habit of always following the first four S’s.
Below, the Japanese terms are translated into the English language version of the 5S’s.
5S PROGRAM BENEFITS
Benefits to be derived from
implementing a lean 5S program
include:
• Improved safety
• Higher equipment availability
• Lower defect rates
• Reduced costs
• Increased production agility and
flexibility
• Improved employee morale
• Better asset utilization
• Enhanced enterprise image to
customers, suppliers, employees, and
management
5S EXAMPLE
During meetings with internal and external stakeholders, Kaiser Permanente Colorado’s
Medicaid Enrollment Project Team used the lean 5S tool to improve the enrollment template, as
well as the template process. They implemented the 5S pillars as follows:
REDUCE: The best way to manage waste is to not produce it. This
can be done by shopping carefully and being aware of a few
guidelines:
• Buy products in bulk. Larger, economy-size products or ones in concentrated
form use less packaging and usually cost less per ounce.
• Avoid over-packaged goods, especially ones packed with several materials
such as foil, paper, and plastic. They are difficult to recycle, plus you pay
more for the package.
DATACOM INSTITUTE OF COMPUTER TECHNOLOGY
2nd Floor VMI Bldg., Emilio Aguinaldo High-way, Palico I, Imus City, Cavite.
245
Tel. No. (046)471-5508 / (+63)922-8363072
Email Address: [email protected]
Trainer / Subject Teacher: Efraem L. Paciente @[email protected]
Computer System Servicing NC – Part 1 / Install and Configure Computer Systems
• Avoid disposable goods, such as paper plates, cups, napkins, razors, and
lighters. Throwaways contribute to the problem, and cost more because they
must be replaced again and again.
• Buy durable goods – ones that are well-built or that carry good warranties.
They will last longer, save money in the long run and save landfill space.
• At work, make two-sided copies whenever possible.
• Maintain central files rather than using several files for individuals.
• Use electronic mail or main bulletin board.
• Remove your name from the mailing lists of materials you no longer want to
receive: write to Mail Preference Service, c/o Direct Marketing Assoc., P.O.
Box 90008, Farmingdale, NY 11735.
• Use cloth napkins instead of paper napkins.
• Use a dish cloth instead of paper towels.
REUSE: It makes economic and environmental sense to reuse
products. Sometimes it takes creativity:
• Reuse products for the same purpose. Save paper and plastic bags, and repair
broken appliances, furniture and toys.
• Reuse products in different ways. Use a coffee can to pack a lunch; use
plastic microwave dinner trays as picnic dishes.
• Sell old clothes, appliances, toys, and furniture in garage sales or ads, or
donate them to charities.
• Use reseal able containers rather than plastic wrap.
• Use a ceramic coffee mug instead of paper cups.
• Reuse grocery bags or bring your own cloth bags to the store. Do not take a
bag from the store unless you need one.
RECYCLE: Recycling is a series of steps that takes a used material
and processes, remanufactures, and sells it as a new product. Begin
recycling at home and at work:
• Buy products made from recycled material. Look for the recycling symbol or
ask store managers or salesmen. The recycling symbol means one of two
things – either the product is made of recycled material, or the item can be
recycled. For instance, many plastic containers have a recycling symbol with
a numbered code the identifies what type of plastic resin it is made from.
However, just because the container has this code does not mean it can be
easily recycled locally.
• Check collection centers and curbside pickup services to see what they
accept, and begin collecting those materials. These can include metal cans,
newspapers, paper products, glass, plastics and oil.
• Consider purchasing recycled materials at work when purchasing material
for office supply, office equipment or manufacturing.
• Speak to store managers and ask for products and packaging that help cut
down on waste, such as recycled products and products that are not over
packaged.
• Buy products made from material that is collected for recycling in your
community.
Part 2. Instruction: On a yellow pad paper or short ban paper write down a Self-explanation about the
following question.
Question:
1. Why 5S is important?
2. What will happen if we don’t do the procedure of 3R?
3. What will be your benefit if you do the 5S?
4. What will be your benefit if you do the 3R?
5. Is there any bad effect if we do the 5S and 3R?
✓ Take a photo of this Activity and submit your Output in Datacom LMS (datacom.education)
Other option:
send to your teacher Facebook Messenger: Efraem Paciente
https://www.facebook.com/efraem.paciente.90/
Lesson 10
Documentation in relation to
the test
System verification, Testing and Maintenance
Three instrumental means of minimizing the risks
of technology are system verification, testing and
maintenance. Every aspect of a computer system
-- hardware, communications and software -
should be verified and thoroughly tested before
the system is used for an electoral event. After
successful testing, systems will need regular
maintenance to ensure they will perform
effectively when they are needed.
System verification
For a highly important system such as an electronic voting system, it is appropriate to employ
an independent testing authority to perform system verification tests. For less important systems,
system verification could be conducted in-house.
System testing
System testing is usually more detailed and
thorough than system verification. System
testing is needed to ensure that every
component of a system is operating as it
should, and that the system is performing
exactly in accordance with the specific local
requirements.
System maintenance
After systems have been verified,
tested and implemented, they must
continue to be maintained to ensure
that they can continue to perform at
the level demonstrated during the
system testing stage. Maintenance
routines will vary depending on the
type and complexity of the
technology. Many items will come
with a maintenance schedule or
program recommended by the manufacturer or supplier. Maintenance could also be provided by
the manufacturer or supplier as part of the purchase agreement.
While this and the two following sections separate hardware, software and communications into
three topics, their operation is often interdependent, and the following verification, testing and
maintenance procedures may need to be carried out with all three elements in combination.
Hardware verification
For a highly important system such as an electronic voting system, it is appropriate to employ
an independent testing authority to perform system verification tests. For less important systems,
system verification could be conducted in-house.
A comprehensive structured testing program is one that ensures that all aspects of a system are
tested. This is especially important for key systems such as electronic voting systems. Testing
measures that could be followed include:
Systems should be maintained to ensure that they continue to perform to the level demonstrated
during the testing stage. Ongoing monitoring or testing plans may need to be put in place to
ensure that maintenance needs are identified and met when necessary. Where systems are in
long-term use, a mechanism could be put in place to monitor feedback from users as another
means to determine the need for maintenance and modification.
The level of importance of the technology will impact on the degree of rigour applied to
verifying, testing and maintaining software systems. For a system to be used for a crucial
electoral function, such as an electronic voting system, the degree of rigour needed will be high.
While this and the two accompanying sections separate hardware, software and communicatio ns
into three topics, their operation is often interdependent, and the following verification, testing
and maintenance procedures may need to be carried out with all three elements in combination.
Software verification
For a highly important system such as an electronic voting system, it is appropriate to employ
an independent testing authority to perform system verification tests. For less important systems,
system verification could be conducted in-house.
▪ testing of software to ensure that appropriate standards are met and that the
software performs its intended functions, including audits of code (see below)
▪ ensuring system documentation is adequate and complete
▪ verifying that systems are capable of performing under expected normal
conditions and possible abnormal conditions
▪ ensuring that security measures are in place and that they conform to appropriate
standards
▪ ensuring that appropriate quality assurance measures are in place
Audits of software code may need to be conducted, particularly where the software is being used
for a crucial system. Software audits are generally most effective when carried out by experts
who are independent of the authors of the code. Measures included in a software audit could
include:
Software testing
After software has been verified, it needs to be thoroughly tested to ensure that every component
of the system is operating as it should, and that the system is performing exactly in accordance
with the specific local requirements.
For an important system such as an electronic voting system, a structured system testing program
can be established to ensure all aspects of a system are tested. Testing measures that could be
followed include:
Software maintenance
After a software system has been verified, tested and implemented, it must continue to be
maintained. Maintenance routines will vary depending on the type and complexity of the
technology. Many software systems will come with a maintenance schedule or program
recommended by the developer. Maintenance could be provided by the developer as part of the
purchase agreement for the technology.
Systems will need to be maintained to ensure that they continue to perform to the level
demonstrated during the system testing stage. If systems deteriorate, there is a risk that the
systems will not perform to the required standard.
Ongoing monitoring or testing systems may be installed to ensure that maintenance needs are
identified and met where necessary. Where systems are in long-term use, a system can be
designed to monitor feedback from users and conduct any modifications or maintenance as
needed.
Where modifications to software are made as a result of system maintenance or upgrades, it may
be necessary to instigate further rounds of system verification and testing to ensure that standards
are still met by the modified system.
https://www.comcare.gov.au/safe-healthy-work/prevent-harm/workplace-inspections
https://www.webnots.com/how-to-install-or-uninstall-programs-in-windows-10/
https://www.wikihow.com/Use-VMware-Workstation
https://www.computerhope.com/jargon/u/update.htm
https://edu.gcfglobal.org/en/basic-computer-skills/how-to-update-your-software/1/
https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/keep-windows-up-to-
date
https://baictchs09.wordpress.com/2019/01/26/conduct-test-on-the-installed-computer-system/
https://docs.microsoft.com/en-us/windows-server/storage/disk-management/overview-of-disk-
management
https://www.guru99.com/stress-testing-tutorial.html
https://www.softwaretestinghelp.com/computer-stress-test-software/
https://aceproject.org/main/english/et/ete05c.htm