Sunteți pe pagina 1din 49

COMPETENCY-BASED LEARNING MATERIAL

PLEASE PICTURE/GRAPHICS HERE RELATED TO MODULE TITLE

SECTOR:

INFORMATION and COMMUNICATIONS TECHNOLOGY

QUALIFICATION: COMPUTER HARDWARE SERVICING - NC II UNIT OF COMPETENCY: CONFIGURE COMPUTER SYSTEMS AND NETWORKS MODULE TITLE: CONFIGURING COMPUTER SYSTEMS AND NETWORKS

POWER SKILLS TECHNICAL CENTER

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 1 of 20 Revision # 00

LFMJR

HOW TO USE THIS COMPETENCY- BASED LEARNING MATERIAL

Welcome! The unit of competency, Configure Computer System and Networks, is one of the competencies of Computer Hardware Servicing NC II course. a course which comprises the knowledge, skills and attitudes required for a TVET trainer to possess. The module, Configure Computer System and Networks,, contains training materials and activities related to identifying learners requirements, preparing session plan, preparing basic instructional materials and organizing learning and teaching activities for you to complete. In this module, you are required to go through a series of learning activities in order to complete each learning outcome. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities on your own. If you have questions, do not hesitate to ask for assistance from your facilitator. Remember to: Work through all the information and complete the activities in each section. Read information sheets and complete the self -check. Suggested references are included to supplement the materials provided in this module. Most probably, your trainer will also be your supervisor or manager. He is there to support you and show you the correct way to do things. You will be given plenty of opportunities to ask questions and practice on the job. Make sure you practice your new skills during regular work shifts. This way, you will improve your speed, memory and your confidence. Use the Self-Checks, Operation Sheets or Task or Job Sheets at the end of each section to test your own progress. Use the Performance Criteria Checklist or Procedural Checklist located after the sheet to check your own performance. When you feel confident that you have had sufficient practice, ask your Trainer to evaluate you. The results of your assessment will be recorded in your Progress Chart and Accomplishment Chart. You need to complete this module before you can perform the next module,

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 2 of 20 Revision # 00

LFMJR

QUALIFICATION

COMPUTER HARDWARE SERVICING- NC II CONFIGURECOMPUTER SYSTEMS AND NETWORKS ELC724320 CONFIGURING COMPUTER SYSTEMS AND NETWORKS

UNIT OF COMPETENCY: UNIT CODE MODULE TITLE INTRODUCTION : :

: This module covers the knowledge, skills and attitude needed to Configure computer systems and networks. And to obtain the proper procedures required in Configuring Computer Systems and Networks. And that they will apply the proper OH&S procedures in configuring. : 100 HOURS

NOMINAL DURATION

LEARNING OUTCOMES : At 1. 2. 3. the end of this module, you will be able to: Plan and prepare for configuration Configure computer systems and networks Inspect and test configured computer systems and networks

ASSESSMENT CRITERIA: 1. Configured computer systems and networks identified from the Job/Service Order or instructions. 2. Planned and prepared job requirements. 3. Followed OHS policies and procedures of job requirements. 4. Checked computer systems and networks configuration with specified requirements. 5. Checked necessary tools, equipment materials 6. Interpreted work instructions according to job requirements. 7. Diagnosed faults or problems on the systems and networks 8. Configured the identified systems and networks 9. Checked configured systems and networks to ensure safety 10. Documented the tasks undertaken

PRE-REQUISITE : BASIC AND COMMON COMPETENCIES LEARNING OUTCOME #1: PLAN AND PREPARE FOR CONFIGURATION CONFIGURE COMPUTER SYSTEMS AND NETWORKS Date Developed: Developed by: Document No. Issued by: Page 3 of 20 Revision # 00

POWERSKILLS Q&A SYSTEM

LFMJR

CONTENTS: 1. Basic Computer System Configuration 2. Basic Network Configuration 3. Occupational Health and Safety Policies and Procedures 4. Tools, equipments and Materials needed for Configuring and Their Uses 5. Terms , Commands and Symbols in Configuring ASSESSMENT CRITERIA: 1. Configured computer systems and networks identified from the Job/Service Order or instructions. 2. Planned and prepared job requirements. 3. Followed OHS policies and procedures of job requirements. 4. Checked computer systems and networks configuration with specified requirements. 5. Tools, equipment, and testing devices that conform to OHS standards are used to accomplish the task. RESOURCES: Information Sheet Slides Computer Self-Check Answer Key Performance Criteria Checklist Tool Room Tools Equipment Operation Sheet

ASSESSMENT METHOD: Written examination Practical examination

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 4 of 20 Revision # 00

LFMJR

LEARNING EXPERIENCES LEARNING OUTCOME #1: Learning Activities 1. Read Information Sheet 2.1-1 on basic computer system configuration. 2. Answer Self-Check for 2.1-1. 3. Read Information Sheet 2.1-2 on basic network configuration. 4. Answer Self-Check for 2.1-2 5. Read Information Sheet 2.1-3 on occupational health and safety policies and procedures. 6. Answer Self-Check for 2.1-3. 7. Guided by Information Sheet 2.1-4, proceed to the tool room and familiarize yourself with the different tools, equipments and materials needed for configuring and their uses 8. Answer Self-Check for 2.1-4 9. Perform Operation Sheet on 2.1-4 on identifying tools and equipment for configuration according to job requirement. 10. Read Information Sheet 2.1-5 on different terms and symbols used in configuring. 11. Answer Self-Check 2.1.-5 PLAN AND PREPARE FOR CONFIGURATION Special Instruction

Compare to answer key 2.1-1. Compare to answer key 2.1-2.

Compare to answer key 2.1-3. Observe safety in the workplace.

Compare to answer key 2.1-4 Observe safety in the workplace.

Compare to answer key 2.1-5.

INFORMATION SHEET 2.1-1 CONFIGURE COMPUTER SYSTEMS AND NETWORKS Date Developed: Developed by: Document No. Issued by: Page 5 of 20 Revision # 00

POWERSKILLS Q&A SYSTEM

LFMJR

BASIC COMPUTER SYSTEM CONFIGURATION Learning Objectives: After reading this Information Sheet, the trainee must be able to: 1. Familiarize the basic configurations in a computer system 2. Identify the major system files in a computer system 3. distinguish the functions of each configuration Major System Files (Part 1) You are required to identify the names, locations, purposes and contents of major system files. The following tables show these files for Windows 9x, NT, 200x and XP. Windows 9x Specific Files File IO.SYS Location Root Description A binary executable file that is loaded when the computer is booted. It contains the information required to start your computer. It replaces config.sys and autoexec.bat in later versions of Windows. A text file that contains the start-up and configuration variables and settings. It is loaded by io.sys. This is a batch file containing several commands that will automatically run when the computer starts. This is the command processor for MS-DOS and Windows 9x. It processes the commands that you type at the command prompt. It contains several internal DOS commands to assist in the management of the system which are loaded into memory. This contains commands to tell the operating system how to set up the computer system. It specifies how the main memory will be managed, i.e. it programs the way hardware devices will be controlled and can set limits on system resources. A system file which enables the real-mode

MSDOS.SYS

Root

AUTOEXEC.BAT

Root

COMMAND.COM

Root and Windows

CONFIG.SYS

Root

HIMEM.SYS

Root

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 6 of 20 Revision # 00

LFMJR

EMM386.EXE WIN.COM SYSTEM.INI

Root Windows Windows

WIN.INI

Windows

SYSTEM.DAT USER.DAT File BOOT.INI

Windows Windows

memory drivers. It must be present in config.sys for Windows to load. It enables extended memory (using device=himem.sys). This is used to emulate expanded memory using extended memory. An executable file that starts Windows. Type win at the DOS prompt to start Windows. This stores the information about the PC's system environment, including device drivers, DOS application execution and internal Windows settings. This contains entries that tell Windows which programs to load and run, and defines the screen, keyboard, mouse, display and fonts. One of the two files that make up the registry. One of the two files that make up the registry.

Description This contains information that Ntldr (the NT loader) uses to display the start-up menu. It also contains information on where the boot partition is and the text to display while the system is loading. Other system parameters can be included. NTLDR This is loaded from the boot sector and starts the loading of the operating system. NTDETECT.CO This detects the hardware on a system and matches it M against the registry database. NTBOOTDD.SYS This stores information about disk drives including drivers for SCSI devices. NTUSER.DAT This stores the settings for each user. If the user logs onto a computer that is part of a domain, this information is retrieved from the server. For added security and to stop the user from changing settings this file extension can be changed to (.man (mandatory) and if absent the user will not be able to log on. All the above files are located in the root directory of the boot drive apart from NTUSER.DAT which is located in the user's documents and settings folder

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 7 of 20 Revision # 00

LFMJR

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 8 of 20 Revision # 00

LFMJR

SELF-CHECK 2.1-1 This is a test on how far have you learned from the Information Sheet. Perform what is/are asked in the test. Do not look at the Answer Key before taking the test. Be HONEST. I. MULTIPLE CHOICES DIRECTION: Select the letter of the best answer. Write your answer on the Answer Sheet provided for. 1. A binary executable file that is loaded when the computer is booted. A. CONFYG.SYS C. NTDETECT.COM B. IO.SYS D. COMMAND.COM 2. This is a batch file containing several commands automatically run when the computer starts. A. IO.SYS C. AUTOEXEC.EXE B. MSDOS.SYS D. AUTOEXEC.BAT 3. EMM386.EXE is used to emulate expanded file using A. flash drive C. operating system B. extended memory D. memory card that will

4. This is a command processor for MS-DOS and Windows 9x. It processes the commands that you type at the command prompt. A. AUTOEXEC.BAT C. CONFYG.SYS B. COMMAND.COM D. CMD.EXE 5. Where can I find BOOT.INI file. A. Local Disk A: C. Local Disk C: B. Local Disk B: D. Local Disk D:

Compare your answers with the Answer Key on the next page. If you get 80% and above, then you may proceed to the next activity but if not, master the lesson and take the Self-Check again.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 9 of 20 Revision # 00

LFMJR

ANSWER KEY 2.1-1 I. MULTIPLE CHOICES 1. __B__ 2. __D__ 3. __B__ 4. __B__ 5. __C__

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 10 of 20 Revision # 00

LFMJR

INFORMATION SHEET 2.1-2 BASIC NETWORK CONFIGURATION Learning Objectives: After reading this INFORMATION SHEET, YOU MUST be able to: 1. Identify the basic concepts in networking 1. Analyze the different networking topologies 2. Compare the different networking configurations What is a Network? In general, the term network can refer to any interconnected group or system. More specifically, a network is any method of sharing information between two systems (human or mechanical). A computer network is an interconnected group of computers. A network is a communication of two computers or nodes that shares information vice versa and links each others resources. BENEFITS OF SHARING INFORMATION VIA NETWORK In addition to reducing hardware costs by sharing expensive printers and other peripherals among multiple users, networks provide additional benefits to the users. Software and data files can be shared for access by multiple users Electronic mail e-mail can be sent and received Collaboration features allow contributions by multiple users to a single document Remote-control programs can be used to troubleshoot problems or show new users how to perform a task SHARED HARDWARE COMPONENTS Virtually, any storage or output device can be shared over a network, but the most common devices to be used over a network include: Printers Disk drives CD-ROM and optical drives Modems Fax Tape backup units

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 11 of 20 Revision # 00

LFMJR

Network TOPOLOGY Network Topology signifies the way in which intelligent devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout.

Bus Topology It is often used when network installation is small, simple or temporary. On a typical bus network the cable is just 1 or more wires with no active electronics to amplify the signal or pass it along from computer to computer. This makes the bus a passive topology. When 1 computer sends a signal up the wire all the computers receive the information but only one with the address that matches accepts the information, the rest disregard the message.

Advantages: o Easy to use and to understand. o Requires least amount of cable to connect the computers together. It is therefore less expensive than other cabling arrangements. o It is easy to extend a bus; two cables can be joined into 1 longer cable with a BNC, Barrel connector making a longer cable and allowing more computers to join the network. Disadvantages: o Heavy network traffic can slow a bus considerably as only 1 computer can send a message at a time. o It is difficult to troubleshoot the bus. A cable break or loose connector causes reflection and stops all the activity.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 12 of 20 Revision # 00

LFMJR

STAR TOPOLOGY In this kind of topology all the cables run from the computers to the central location where they are all connected by a device called hub or switch. Each computer on a star network communicates with a central device that resends the message either to each computer or only to the destination computer, example if it is a hub then it will send to all and if it is a switch then it will send to only destination computer. When network expansion is expected and when the greater reliability is needed, star topology is the best.

Advantages: o It is easy to modify and add new computers without disturbing the rest of the network. o The center of the star network is a good place to diagnose the faults. o Single computer failure does not necessarily bring down the whole star network.

Disadvantages: o If the central device fails, the whole network fails to operate. o Star networking is expensive because all network cables must be pulled to one central point, requires more cable than other network topologies.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 13 of 20 Revision # 00

LFMJR

RING TOPOLOGY In this type each computer is connected to the next computer with the last one connected to the first. Each retransmits what it receives from the previous computer. The message flows around the ring in one direction. The ring network does not subject to signal loss problem as a bus network experiences. There is no termination because there is no end to the ring. Advantages: Each node has equal access. Capable of high speed data transfer. Disadvantages: Failure of one computer on the ring can affect the whole network. Difficult to troubleshoot the network. Types of networks Below is a list of the most common types of computer networks in order of scale. Personal Area Network (PAN) A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that may be used in a PAN are printers, fax machines, telephones, PDAs or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 meters).

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 14 of 20 Revision # 00

LFMJR

Local Area Network (LAN) A network covering a small geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library will have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. All of the PCs in the library are connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 GB/s. The staff computers (bright green) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup. Client/Server Vs Peer-to-Peer Networks Although every computer on a LAN is connected to every other, they do not necessarily mean all communicate with each other. There are two basic types of LAN, based on communication patterns between the machines, called client/server networks and peer-to-peer networks. Client/Server Networks Every computer has a distinct role, that of either a client or a server. A server is designed to share its resources among client computers on the network. The Client/Server is composed of: Servers These are located in secured areas, such as locked closets and data centers, because they hold the organization's most

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 15 of 20 Revision # 00

LFMJR

valuable data and do not have the accessed by operators on a continuous basis. The server runs a special network operating system such as: Windows NT Server, Windows 2000 or Novell Netware. \

Clients The rest of the computers on the network functions as client. A client standard PC that is running an operating system such as DOS or Windows.

Peer-to-Peer Network In a peer-to-peer network, every computer is equal and can communicate with other computer on a network to which it has been granted access rights. Essentially, every computer in this network functions as both server and client. Peer-to-peer network can be as small as two computers as many as hundreds of units. There is no theoretical limit to the size of a peer-to-peer network, performance drops significantly and security becomes a major headache on peer -based network with more than 10 computers. Also, Microsoft imposes a 10-station limit on computers running Windows 2000 Professional who are sharing resources with other system. For this reason, it is better you switch to a client/server network when your network climbs to 10 stations.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 16 of 20 Revision # 00

LFMJR

Example of Peer-to-Peer Network CAMPUS AREA NETWORK (CAN) A network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. Metropolitan Area Network (MAN) A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN. Wide Area Network (WAN) A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 17 of 20 Revision # 00

LFMJR

Global Area Network (GAN) Global area networks (GAN) specifications are in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless local area networks (WLAN). Internetwork Two or more networks or network segments connected using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork. In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them: Intranet Extranet Internet Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet. Intranet An intranet is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as web browsers and ftp tools, that is under the control of a single administrative entity. That administrative entity closes the intranet to the rest of the world,

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 18 of 20 Revision # 00

LFMJR

and allows only specific users. Most commonly, an intranet is the internal network of a company or other enterprise. Extranet An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g. a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network. Internet A specific internetwork, consisting of a worldwide interconnection of governmental, academic, public, and private networks based upon the Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the U.S. Department of Defense also home to the World Wide Web (WWW) and referred to as the 'Internet' with a capital 'I' to distinguish it from other generic internetworks. Participants in the Internet, or their service providers, use IP Addresses obtained from address registries that control assignments.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 19 of 20 Revision # 00

LFMJR

SELF-CHECK 2.1-2 I. Identify the following. Choose your answer from the grid below. Use a separate sheet of paper in answering. 1. The WORLD WIDE WEB. 2. The internal network of a company or other enterprise. 3. A model for supporting mobile communications across an arbitrary number of wireless LANs. 4. A data communications network that covers a relatively broad geographic area. 5. A network that connects two or more Local Area Networks or Campus Area Networks together. 6. It signifies the way in which intelligent devices in the network see their logical relations to one another. 7. It is the interconnected group of computers. 8. A network covering a small geographic area, like a home. 9. All the cables run from the computers to the central location where they are all connected by hub. 10. Each computer is connected to the next computer with the last one connected to the first.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 20 of 20 Revision # 00

LFMJR

ANSWER KEY 2.1-2 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Internet Intranet GAN WAN MAN Topology Network LAN Star topology Ring topology

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 21 of 20 Revision # 00

LFMJR

INFORMATION SHEET 2.1-3 OCCUPATIONAL HEALTH & SAFETY POLICIES AND PROCEDURES Learning Objectives: After reading this INFORMATION SHEET, YOU MUST be able to: 1. learn the proper OH&S Policies and Procedures before configuring 2. Identify safety precautions before and during configuration. Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that aim to protect the health, safety and welfare of all people at the workplace. Every worker has a right to healthy and safe work and to a work environment that enables them to live a socially and economically productive life. Safety practices should be learned early and always adhered to when working with any electrical device including personal computers and peripherals. Personal safety while working with PCs Here are some safety precautions to take before working with any computer devices: Before doing anything, listen to your teachers instruction to prevent accidents or any unwanted events that may occur on your workplace. Do not work on computer when you are wet because you might get electrocuted. Do not remove internal devices of the computer when it is turned on. Be sure not to mix electronic components and water. Avoid playing or running while inside the room. Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, . Ask for assistance from your teacher when it comes on dealing with computer devices. Applying safety measure when handling tools and equipment are necessary to avoid certain damages.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 22 of 20 Revision # 00

LFMJR

SELF-CHECK 2.1-3 Give the best answer for every question: I. Enumeration, Identify what is/are required in the following items. A. OH & S Policies and Procedures in configuring B. Personal Protective Equipment during configuration II. True or False Write true if the statement is true and false if not. 1. Be sure to mix electronic components and water. 2. Applying safety measure when handling tools and equipment are necessary to avoid certain damages. 3. Do not remove internal devices of the computer when it is turned on. 4. Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that does not aim to protect the health, safety and welfare of all people at the workplace. 5. Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, etc.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 23 of 20 Revision # 00

LFMJR

ANSWER KEY 2.1-3 I. Enumeration 1. Do not work on computer when you are wet because you might get electrocuted. Do not remove internal devices of the computer when it is turned on. Be sure not to mix electronic components and water. Avoid playing or running while inside the room. Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, . Ask for assistance from your teacher when it comes on dealing with computer devices. Applying safety measure when handling tools and equipment are necessary to avoid certain damages. 2. Cover all, Shoes with rubber sole Anti-static wrist strap

II. True or False 1. F 2. T 3. T 4. F 5. T

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 24 of 20 Revision # 00

LFMJR

INFORMATION SHEET 2.1-4 TOOLS, EQUIPMENT ANDMATERIAL IN CONFIGURING Learning Objectives: After reading this INFORMATION SHEET, YOU MUST be able to: 3. Identify proper tools, equipments and materials in configuring computer systems and networks 4. Discuss the used of tools , equipments and materials in configuring computer systems and networks These are the following materials needed in the Configuration task: 1. Connectors - It is used to connect external devices to the computer system.

2. Adapter - A piece of hardware that plugs into an expansion slot in your computer.

3. Wires and Cables - It is used to connect computers for network.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 25 of 20 Revision # 00

LFMJR

4. Appropriate software - This software packages are used to install new drivers needed in setting up your computer.

5. Computer storage media - These help you in saving data and providing backup for your files such as diskette, compact disc, flash drives and memory cards.

6. Reference book - These are books that will provide topics about networking or related books on computer.

7. Manuals -These provide instructions for certain operation or task.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 26 of 20 Revision # 00

LFMJR

8. Cable tie - It is used to organized wires and cables used in connecting computers to avoid tangling.

These are the following configuration task:

tools/

testing

devices

needed

in

the

1. Screw drivers -Flat screw driver is used to fasten negative slotted screws. -Philips Screw driver is used to fasten positive slotted screws.

2. Pliers -Side Cutter pliers is used for cutting and trimming of connecting wires or terminal leads in the circuit board. - Long nose pliers is used for holding, bending and stretching the lead of electronics component and connecting wire.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 27 of 20 Revision # 00

LFMJR

3. Soldering iron/gun - It is used to join two or more metal conductors with the support of soldering lead melted around it.

4. Multi-tester - It is used by technician for measuring current, voltage and resistance.

5. Magnifying glass -It is a device made of glass with handle. It exaggerates or increase the apparent size of an object.

6. Safety apparel suit (coverall) - It is used by the person for body protection.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 28 of 20 Revision # 00

LFMJR

7. Anti-static wrist strap -It absorbs the static electricity of the material when being hold by the hands.

9. Tweezers -It is used to hold the small sensitive part of the computer.

10. Mini-vacuum cleaner - It is used for cleaning sensitive parts of the computer.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 29 of 20 Revision # 00

LFMJR

SELF-CHECK 2.1-4
I.

Identify what is asked in the following questions. 1. It is a tool used to hold the small sensitive parts of computer. 2. A device made glass with handle, to exaggerate or to increase the apparent size of an object. 3. It is an instrument used by technician for measuring current, voltage and resistance. 4. It is a tool used for cutting and trimming of connecting wires or terminal leads in the circuit board. 5. It is a tool used to join two or more metal conductors with the support of soldering lead melted around it. 6. It is a material used to organize wires and cables used in connecting computers to avoid tangling. 7. These are the materials that are used in saving data and providing backup for your files such as diskette, compact disc, flash drives and memory cards. 8. It is a piece of hardware that plugs into an expansion slot in your computer. 9. It is a reference material that provides you instructions for certain operation or task. 10. It is a tool used for holding, bending and stretching the lead of electronics component and connecting wire.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 30 of 20 Revision # 00

LFMJR

ANSWER KEY 2.1-4 I. Identification

1. tweezers 2. magnifying glass 3. multi-tester 4. side-cutter pliers 5. soldering iron 6. cable tie 7. Computer Storage device 8. adapter 9. manuals 10. long nose pliers

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 31 of 20 Revision # 00

LFMJR

OPERATION SHEET 2.1-4 Title: IDENTIFYING TOOLS, EQUIPMENTS AND MATERIALS ACCORDING TOJOB REQUIREMENTS

Performance Objective: After the task, you must know the appropriate tools, materials and testing devices according to job requirements. Supplies/Materials Steps/Procedure:
1. 2.

tool room, tools, equipments, materials,

Get TASK/JOB REQUIREMENT from your trainer. Go to the Tool room and identify, select appropriate tools, materials and testing devices according to job requirements. Present output to trainer and discuss their uses.

3.

Assessment Method: Performance Test with Oral Questioning

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 32 of 20 Revision # 00

LFMJR

Performance Criteria Checklist CRITERIA Job requirements are analyzed correctly. Tools, materials and testing devices are identified and selected correctly according to job requirement. OHS practices are followed. Uses of tools and testing devices are explained REMARKS: ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ Yes NO

____________________________ Trainer

INFORMATION SHEET 2.1-5 CONFIGURE COMPUTER SYSTEMS AND NETWORKS Date Developed: Developed by: Document No. Issued by: Page 33 of 20 Revision # 00

POWERSKILLS Q&A SYSTEM

LFMJR

TERMS AND SYMBOLS IN CONFIGURING Learning Objectives: After reading this INFORMATION SHEET, YOU MUST be able to: 1. Learn the different terms and symbols in configuring 2. interpret electrical symbols and codes 3. use appropriate in configuring ACRONYMS: ATX Advance Technology Attachment RAM Random Access Memory DRAM Dynamic Random Access Memory EDO RAM Extended Data Output Random Access Memory SDRAM Synchronous Dynamic Random Access Memory BIOS Basic Input Output System ISA Industry Standard Architecture PCI Peripheral Component Interconnect EISA Extended Industry Standard Architecture VESA Video Electronics Standard Association IDE Integrated Drive Electronics SCSI Small Computer System Interface CMOS Complementary Metal-Oxide Semiconductor ROM Read Only Memory DDR Double Data Rate CPU Central Processing Unit UDMA Ultra Direct Memory Access

ELECTRONIC SYMBOLS: NAME Resistor Variable resistor Capacitor

SYMBOL

NAME

SYMBOL

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 34 of 20 Revision # 00

LFMJR

Variable Capacitor

Coil or Inductor Diode Zener Diode

Loud Speaker

Transistor

Transformer

Fuse Relay

Battery

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 35 of 20 Revision # 00

LFMJR

NAME Microphone

SYMBOL

Ground Switch (SPST) Single Pole Single Throw

Switch (SPDT) Single Pole Double Throw

Switch ( DPST) Double Pole Single Throw

Switch ( DPDT) Double Pole Double Throw

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 36 of 20 Revision # 00

LFMJR

Computer Terms: access time - The performance of a hard drive or other storage device - how long it takes to locate a file. active program or window - The application or window at the front (foreground) on the monitor. alert (alert box) - a message that appears on screen, usually to tell you something went wrong. alias - an icon that points to a file, folder or application (System 7). apple menu - on the left side of the screen header. System 6 = desk accessories System 7 = up to 50 items. application - a program in which you do your work. application menu - on the right side of the screen header. Lists running applications. ASCII (pronounced ask-key ) - American Standard Code for Information Interchange. a commonly used data format for exchanging information between computers or programs. background - part of the multitasking capability. A program can run and perform tasks in the background while another program is being used in the foreground. bit - the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0). backup - a copy of a file or disk you make for archiving purposes. boot - to start up a computer.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 37 of 20 Revision # 00

LFMJR

bug - a programming error that causes a program to behave in an unexpected way. bus - an electronic pathway through which data is transmitted between components in a computer. byte - a piece of computer information made up of eight bits. card - a printed circuit board that adds some feature to a computer. cartridge drive - a storage device, like a hard drive, in which the medium is a cartridge that can be removed. CD-ROM - an acronym for Compact Disc Read-Only Memory. Chooser - A desk accessory used to select a printer, or other external device, or to log onto a network. Clipboard - A portion of memory where the Mac temporarily stores information. Called a Copy Buffer in many PC applications because it is used to hold information which is to be moved, as in word processing where text is "cut" and then "pasted". Clock Rate (MHz) - The instruction processing speed of a computer measured in millions of cycles per second (i.e., 200 MHz). command - the act of giving an instruction to your Mac either by menu choice or keystroke. command (apple) key - a modifier key, the Command key used in conjunction with another keystroke to active some function on the Mac. compiler - a program the converts programming code into a form that can be used by a computer.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 38 of 20 Revision # 00

LFMJR

compression - a technique that reduces the size of a saved file by elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.) control key - seldom used modifier key on the Mac. control panel - a program that allows you to change settings in a program or change the way a Mac looks and/or behaves. CPU - the Central Processing Unit. The processing chip that is the "brains" of a computer. crash - a system malfunction in which the computer stops working and has to be restarted. cursor - The pointer, usually arrow or cross shaped, which is controlled by the mouse. daisy chaining - the act of stringing devices together in a series (such as SCSI). database - an electronic list of information that can be sorted and/or searched. data - (the plural of datum) information processed by a computer. defragment - (also - optimize) to concatenate fragments of data into contiguous blocks in memory or on a hard drive. desktop - 1. the finder. 2. the shaded or colored backdrop of the screen. desktop file - an invisible file in which the Finder stores a database of information about files and icons. dialog box - an on-screen message box that appears when the Mac requires additional information before completing a command.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 39 of 20 Revision # 00

LFMJR

digitize - to convert linear, or analog, data into digital data which can be used by the computer. disk - a spinning platter made of magnetic or optically etched material on which data can be stored. disk drive - the machinery that writes the data from a disk and/or writes data to a disk. disk window - the window that displays the contents or directory of a disk. document - a file you create, as opposed to the application which created it. DOS - acronym for Disk Operating System - used in IBM PCs. DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed page or on the computer screen. download - to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ). drag - to move the mouse while its button is being depressed. drag and drop - a feature on the Mac which allows one to drag the icon for a document on top of the icon for an application, thereby launching the application and opening the document. driver - a file on a computer which tells it how to communicate with an addon piece of equipment (like a printer). Ethernet - a protocol for fast communication and file transfer across a network. expansion slot - a connector inside the computer which allows one to plug

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 40 of 20 Revision # 00

LFMJR

in a printed circuit board that provides new or enhanced features. extension - a startup program that runs when you start the Mac and then enhances its function. fibre channel - as applied to data storage and network topology - file - the generic word for an application, document, control panel or other computer data. finder - The cornerstone or home-base application in the Mac environment. The finder regulates the file management functions of the Mac (copying, renaming, deleting...) floppy - a 3.5 inch square rigid disk which holds data. (so named for the earlier 5.25 and 8 inch disks that were flexible). folder - an electronic subdirectory which contains files. font - a typeface that contains the characters of an alphabet or some other letterforms. footprint - The surface area of a desk or table which is occupied by a piece of equipment. fragmentation - The breaking up of a file into many separate locations in memory or on a disk. freeze - a system error which causes the cursor to lock in place. gig - a gigabyte = 1024 megabytes. hard drive - a large capacity storage device made of multiple disks housed in a rigid case. high density disk - a 1.4 MB floppy disk.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 41 of 20 Revision # 00

LFMJR

highlight - to select by clicking once on an icon or by highlighting text in a document. icon - a graphic symbol for an application, file or folder. initialize - to format a disk for use in the computer; creates a new directory and arranges the tracks for the recording of data. insertion point - in word processing, the short flashing marker which indicates where your next typing will begin. installer - software used to install a program on your hard drive. interrupt button - a tool used by programmers to enter the debugging mode. The button is usually next to the reset button. K - short for kilobyte. keyboard shortcut - a combination of keystrokes that performs some function otherwise found in a pull down menu. kilobyte - 1024 bytes. landscape - in printing from a computer, to print sideways on the page. launch - start an application. Measurements (summary) *a bit = one binary digit (1 or 0) *"bit" is derived from the contraction bit (binary digit) -> 8 bits = one byte *1024 bytes = one kilobyte *K = kilobyte *Kb = kilobit *MB = megabyte *Mb = megabit *MB/s = megabytes per second *Mb/s = megabits per second *bps = bits per second i.e., 155 Mb/s = 19.38 MB/s

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 42 of 20 Revision # 00

LFMJR

MB - short for megabyte. megabyte - 1024 kilobytes. memory - the temporary holding area where data is stored while it is being used or changed; the amount of RAM a computer has installed. menu - a list of program commands listed by topic. menu bar - the horizontal bar across the top of the Macs screen that lists the menus. multi finder - a component of System 6 that allows the Mac to multi task. multi tasking - running more than one application in memory at the same time. nanosecond - one billionth of a second. ( or, the time between the theatrical release of a Dudley Moore film and the moment it begins to play on airplanes). native mode - using the computers original operating system; most commonly used when talking about the PowerPC can run software written for either the 80x0 systems, or the PowerPCs RISC code. Nu-Bus - expansion slots on the Mac which accept intelligent, selfconfiguring boards. Nu-Bus is different bus architecture than the newer PCI bus and the boards are not interchangeable. operating system - the system software that controls the computer. optical disk - a high-capacity storage medium that is read by a laser light. palette - a small floating window that contains tools used in a given application.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 43 of 20 Revision # 00

LFMJR

partition - a subdivision of a hard drives surface that is defined and used as a separate drive. paste - to insert text, or other material, from the clipboard or copy buffer. PC - acronym for personal computer commonly used to refer to an IBM or IBM clone computer which uses DOS. PCI - acronym for Peripheral Component Interchange - the newer, faster bus architecture. peripheral - an add-on component to your computer. point - (1/72") 12 points = one pica in printing. pop-up menu - any menu that does not appear at the top of the screen in the menu bar. (may pop up or down) port - a connection socket, or jack on the Mac. Power PC - a processing chip designed by Apple, IBM and Motorola (RISC based). print spooler - a program that stores documents to be printed on the hard drive, thereby freeing the memory up and allowing other functions to be performed while printing goes on in the background. RAM - acronym for Random-Access Memory. Resize box - the small square at the lower right corner of a window which, when dragged, resizes the window. RISC - acronym for Reduced Instruction Set Computing; the smaller set of commands used by the PowerPC and Power Mac. ROM - acronym for Read Only Memory; memory that can only be read from

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 44 of 20 Revision # 00

LFMJR

and not written to. Root directory - the main hard drive window. Save - to write a file onto a disk. Save as - (a File menu item) to save a previously saved file in a new location and/or with a new name. Scroll - to shift the contents of a window to bring hidden items into view. Scroll bar - a bar at the bottom or right side of a window that contains the scroll box and allows scrolling. Scroll box - the box in a scroll bar that is used to navigate through a window. SCSI - acronym for Small Computer System Interface. SCSI address - a number between zero and seven that must be unique to each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15 SCSI Ids (hexadecimal); however, the length restriction (3 meters) is such that it is virtually impossible to link 15 devices together. SCSI port - a 25 pin connector on the back of a Mac (native SCSI port); used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO) have a 68 pin connector. SCSI terminator - a device placed at the end of a SCSI chain to complete the circuit. (Some SCSI devices are self-terminating, or have active termination and do not require this plug). Serial port - a port that allows data to be transmitted in a series (one after the other), such as the printer and modem ports on a Mac.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 45 of 20 Revision # 00

LFMJR

Server - a central computer dedicated to sending and receiving data from other computers (on a network). Shut down - the command from the Special menu that shuts down the Mac safely. software - files on disk that contain instructions for a computer. start up disk - the disk containing system software and is designated to be used to start the computer. System file - a file in the System folder that allows your Mac to start and run. System folder - an all-important folder that contains at least the System file and the Finder. 32 bit addressing - a feature that allows the Mac to recognize and use more than 8MB of memory. title bar - the horizontal bar at the top of a window which has the name of the file or folder it represents. upload - to send a file from one computer to another through a network. Uninterruptible Power Source (UPS)- a constantly charging battery pack which powers the computer. A UPS should have enough charge to power your computer for several minutes in the event of a total power failure, giving you time to save your work and safely shut down. UPS - acronym for Uninterruptible Power Source. virtual memory - using part of your hard drive as though it were "RAM".

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 46 of 20 Revision # 00

LFMJR

SELF-CHECK 2.1-5 I. Matching Type Directions: match the symbols from the names listed below. Write the letter of your choice. Symbols Names

1.

NAMES a. RESISTOR b. TRANSISTOR

2.

3.

c.
4.

LOUD SPEAKER

d. ZENER DIODE e. TRANSFORMER

5.

f. CAPACITOR g. COIL/INDUCTOR

6.

h. VARIABLE CAPACITOR
7.

i. DIODE j. FUSE

8.

k. BATTERY l. MICROPHONE

9.

10.

POWERSKILLS Q&A SYSTEM

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: Developed by:

Document No. Issued by: Page 47 of 20 Revision # 00

LFMJR

II.

IDENTIFICATION Directions: Identify what is being asked in the following. 1. A central computer dedicated to sending and receiving data from other computers (on a network). 2. To start up a computer.

3. The disk containing system software and is designated to be used to start the computer. 4. It is an add-on component to your computer.

5. It a subdivision of a hard drives surface that is defined and used as a separate drive. III. ACRONYMS Directions: Give the meaning of the following acronyms. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. ATX SDRAM DRAM PCI IDE SCSI CMOS ROM DDR CPU

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: 11/23/2013 Developed by:

Document No. Issued by: Page 1 of 49 Revision # __

LFMJR

ANSWER KEY 2.1-5 I. MATCHING TYPE 1. E 2. J 3. I 4. D 5. F 6. A 7. H 8. C 9. B 10. G II. IDENTIFICATION 1. SERVER 2. BOOT 3. START-UP DISK 4. PERIPHERAL 5. PARTITION

III. ACRONYMS 1. ATX Advance Technology Attachment 2. SDRAM Synchronous Dynamic Random Access Memory 3. DRAM Dynamic Random Access Memory 4. PCI Peripheral Component Interconnect 5. IDE Integrated Drive Electronics 6. SCSI Small Computer System Interface 7. CMOS Complementary Metal-Oxide Semiconductor 8. ROM Read Only Memory 9. DDR Double Data Rate 10. CPU Central Processing Unit

CONFIGURE COMPUTER SYSTEMS AND NETWORKS

Date Developed: 11/23/2013 Developed by:

Document No. Issued by: Page 2 of 49 Revision # __

LFMJR

S-ar putea să vă placă și