262
Information and Communications Technology Learner’s Material 9 GOVERNMENT PROPERTY NOT FOR SALE ALLOTTED TO District/ School: _________________________________________ Division _________________________________________________ First Year of Use: _________________________________________ Source of Fund (Year included):__________________________ Computer Hardware Servicing

K-12 Module in TLE - ICT Grade 9 [All Gradings]

Embed Size (px)

Citation preview

Page 1: K-12 Module in TLE - ICT Grade 9 [All Gradings]

Information and

Communications

Technology

Learner’s Material

9

GOVERNMENT PROPERTY

NOT FOR SALE

ALLOTTED TO

District/ School: _________________________________________

Division _________________________________________________

First Year of Use: _________________________________________

Source of Fund (Year included):__________________________

Computer Hardware Servicing

Page 2: K-12 Module in TLE - ICT Grade 9 [All Gradings]

ii

Department of Education

Republic of the Philippines

Technology and Livelihood Education – Grade 9 Learner’s Material First Edition, 2013 ISBN: ___________ Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Br. Armin A. Luistro FSC Undersecretary: Dina S. Ocampo, Ph.D. Assistant Secretary: Lorna Dig Dino, Ph.D.

Printed in the Philippines by ____________

Department of Education-Instructional Materials Council Secretariat (DepEd-IMCS)

Office Address: 2nd Floor Dorm G, Philsports Complex, Meralco Avenue,

Pasig City, Philippines 1600

Telefax: (02) 634-1054, 634-1072

E-mail Address: [email protected]

Development Team of the Learner’s Material

Authors: Owen M. Milambiling, Cesar T. Arriola, Dante B. Bermas, Ronaldo V. Ramilo, Rosalie P. Lujero, Diana Marie B. Dagli, Dr. Virgilio O. Guevarra, and Maria Angelica G. Mates

Editors: Dr. Paraluman R. Giron, Ofelia C. Flojo, and Perla H. Cuanzon

Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas

Illustrator and Layout Artists:

Subject Specialist: Owen M. Milambiling Management Team: Dr. Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Mariñas, Dr. Jose D. Tuguinayo, Jr.

Page 3: K-12 Module in TLE - ICT Grade 9 [All Gradings]

iii

TABLE OF CONTENTS

Module 1: PERSONAL ENTREPRENEURIAL COMPETENCIES

Explore your Understanding ………………………………………….… 1

Guide Questions …………………………………………………………. 2

Pre-Assessment …………………………………………………………. 2

Self-Assessment ………………………………………………………… 5

Lesson 1 ……………………………………………………………………. 6

Firm Up ……………………………………………………………………. 8

Deepen …………………………………………………………………... 10

Transfer ………………………………………………………………….. 12

Post-Assessment ………………………………………………………. 14

Feedback ……………………………………………………………….. 16

Module 2: ENVIRONMENT AND MARKET

Explore your Understanding ………………………………………….. 18

Lesson 1: Needs and Wants of People ……………………………….. 19

Lesson 2: Generating Ideas for Business ……………………………. 20

Lesson 3: Selecting the Right Ideas…………………………………… 22

Lesson 4: Environmental Scanning …………………………………… 23

Firm Up ………………………………………………………………….. 24

Deepen ....……………………………………………………………….. 24

Transfer ………………………………………………………………….. 26

Post-Assessment ………………………………………………………. 27

Feedback ………………………………………………………………… 28

Module 3: INSTALL COMPUTER SYSTEMS AND NETWORKS

Introduction ………………………………………………………………… 30

Objectives………………………………………………………………….. 31

Pre- Assessment …………………………………………… 32

Lesson 1: PLAN AND PREPARE FOR INSTALLATION …………….. 33

1.1 Safety Measures: OHS Policies and Procedures……… 33

1.2 Understanding Computer System…………………………… 37

1.3 Computer Systems, Devices and Peripheral ………..……. 42

Page 4: K-12 Module in TLE - ICT Grade 9 [All Gradings]

iv

1.4 Network…………………………..……………………………. 57

1.5 Materials, tools, equipment and testing devices………….. 61

Lesson 2: INSTALL EQUIPMENT / DEVICES and SYSTEMS ……….… 65

2. 1 Safety Precautions…………………………..……………… 65

2.2 System Specification..………………………………………. 69

2.3 Installation of Hardware components and other peripherals…… 73

2.4 Installing Operating System …………………………….…… 91

2.5 Windows 7 installation ……………………………………….. 107

2.6 Basic Computer Configuration Set- up …………………….. 119

Lesson 3: CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM ……. 127

3.1. Testing Installed equipment/devices/system………………….. 127

Summative Test ……………………………………………………………….. 134

Post- Test ………………………………………………………………………. 138

Glossary of Terms.…………………………………………………………….. 139

Acronyms ………………………………………………………………………. 141

References …………………………………………………………………….. 143

Module 4: DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEM …. 145

Pre- assessment ………………………………………………………………… 147

Lesson 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEM.. 145

1.1 Safety Precautions ………………………………………… 148

1.2 Types of Computer System Error …..…………………….. 151

1.3 Diagnosing Computer Systems …………………….. 153

Lesson 2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND NETWORKS……………………………………………………………… 158

2.1 Safety Precautions ………………………….………………. 158

2.2 Basic Concepts of Electricity……………………………… 159

2.3 Techniques for Testing Computer System…………………. 165

2.4 Tools for Testing Computer System..………………………. 177

2.5 Troubleshooting Computer System Network ……………... 180

2.6 Computer System and Network Configurations ………….. 186

Lesson 3: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND NETWORKS …………………………………………………………………….. 195

3.1 General Safety Tips and Reminders ……………………… 196

3.2 Replacing Different Components …………………………. 200

Page 5: K-12 Module in TLE - ICT Grade 9 [All Gradings]

v

3.3 Upgrading your Computer Components ……………………. 203

3.3 Basic Network Errors ………………………………………….. 211

3.4 Award BOS / CMOS Setup …………………………………… 220

Lesson 4: TEST SYSTEMS AND NETWORKS……………………………………….. 230

4.1 Testing Computer System …………………………………….. 230

4.2 Error Beep Codes ………………………………………………. 236

Post Assessment ………………………………………………………………. 245

Summative Test ………………………………………………………….……. 247

Glossary ……………………………………………………………………….. 252

References …………………………………………………………………….. 254

Page 6: K-12 Module in TLE - ICT Grade 9 [All Gradings]

1

Technology and Livelihood Education

Entrepreneurship

Module 1: Personal Entrepreneurial Competencies

Have you ever thought running your own business? Entrepreneurship has brought great success to some, but it's not a career path for all. Do you think you can handle the stress and hard work that go with running a small business enterprise? The key to succeed in a small business enterprise is your entrepreneurial ability to produce the desired results. Before embarking on your first business, it's worth spending some time evaluating your own preparedness for entrepreneurship. Try to examine your own personality and compare it with the Personal Entrepreneurial Competencies (PECs) of a successful entrepreneur. Ask yourself if you are ready to enter into the world of business. If your answer is yes, take this reminder: “Successful entrepreneurs continuously develop and improve their PECs”.

EXPLORE Your Understanding

Essential Question

- How does one ensure success in a chosen career?

Content Standard - The learner demonstrates understanding of Personal Entrepreneurial

Competencies (PECs) Performance Standard

Page 7: K-12 Module in TLE - ICT Grade 9 [All Gradings]

2

- The learner prepares an activity plan that addresses his/her development areas

based on his/her PECs and improves further his/her areas of strength. Guide Questions:

1. Why is there a need to assess ones personal characteristics, attributes, lifestyles, skills and traits?

2. What are the personal entrepreneurial competencies of a successful entrepreneur?

3. Why is it necessary to compare ones personal characteristics, attributes, lifestyles, skills and traits to the personal entrepreneurial competencies of a successful entrepreneur?

4. How do you relate your PECs to the PECs of a successful entrepreneur?

5. Based on the data that you have gathered from the interview with the successful entrepreneur in your community, how do you develop your PECs?

6. Can you prepare an action plan that addresses your areas of development and strength based on your PECs?

7. How does your action plan help sustain your strong areas and or address your development areas based on your PECs?

Hello there! Are you ready to assess yourself to become a

successful entrepreneur in the future? As honest as you could, please

answer the pre-assessment below.

Pre- Assessment

A. Matching Type

Directions: Column A lists the characteristics of a successful entrepreneur. Draw a line from the items in Column A that connects the correct definition of terms listed in Column B.

Column A Column B

Page 8: K-12 Module in TLE - ICT Grade 9 [All Gradings]

3

1. Hardworking

2. Self-confident

3. Profit-Oriented

4. Goal-Oriented

5. Persistent

6. Responds to feedback

7. Willing to listen

8. Committed

9. Reliable and has integrity

10. Risk-taker

a. Ability to set realistic targets.

b. Interest in money generation.

c. To succeed, one must believe in one’s

self.

d. Working diligently and industriously.

e. Being able to listen to the advice of

others.

f. Obtaining useful feedback and advice

from others.

g. Being patient and strives to achieve the

goal.

h. Ability to take measured or calculated

risks.

i. Being honest, fair and trustworthy.

j. A major priority in the entrepreneur’s

life.

Are you done? This time you will do another set of pre- assessment which could give you a better understanding of what this module is all about. Are you ready? So, let’s begin!

B. Multiple Choice.

Directions: Read and study the situation that describes the entrepreneurial

characteristics or attributes. Answer the question by writing the letter of your choice in your assignment notebook or in the answer sheet provided.

Mrs. Gina Magno opens up her own retail business. She knows that her personal entrepreneurial characteristics are insufficient to ensure a successful operationalization of a business that she has in mind. Your answers to the questions below will help in developing her PECs.

Page 9: K-12 Module in TLE - ICT Grade 9 [All Gradings]

4

1. What PECs must she possess if there are customers who complain about the quality of

her product?

a. Patience

b. Hardworking

c. Versatile

d. All of the above

2. Which of the following is NOT considered as a characteristic of an entrepreneur?

a. Copes with failure

b. Dependent

c. Persistent

d. Opportunity seeker

3. If she wants to ensure a profitable business operation, what characteristic will she

maintain?

a. Commitment

b. Goal oriented

c. Futuristic

d. Opportunity seeker

4. Mrs. Magno follows the advice of a friend to be flexible especially if she intends to

open a retail business. What PECs has been demonstrated by Mrs. Magno?

a. Self- confidence

b. Reliable and has integrity

c. Open to feedback

d. Persistent

5. She tells Mary, her best friend that she has a strong will and does not give up to find a

solution to a business problem. What PECs has been demonstrated by Mrs. Magno?

a. Hard work

b. Persistence

c. Self-confidence

d. Risk- taking

Page 10: K-12 Module in TLE - ICT Grade 9 [All Gradings]

5

This time evaluate your own personal entrepreneurial

characteristics to determine whether you too, can become an

entrepreneur. If you are ready, you may begin!

C. Self- Assessment

Directions: Below is a list of Personal Entrepreneurial Competencies (PECs) of a

successful entrepreneur. Put a check mark on the 2nd column that indicates

your strong PECs. The check mark on the 3rd column are those PECs that

need to be developed.

Personal Entrepreneurial Competencies of an

Entrepreneur

My Personal Entrepreneurial Competencies

Strength

Needs to be Developed

Hardworking

Self-confident

Builds for the future

Profit-oriented

Goal-oriented

Persistent

Copes with failure

Responds to feedback

Demonstrates initiative

Willing to listen

Sets own standards

Copes with uncertainty

Committed

Builds on strengths

Reliable and has integrity

Risk-taker

Page 11: K-12 Module in TLE - ICT Grade 9 [All Gradings]

6

Did you enjoy examining yourself? You can become a successful

entrepreneur someday. Please don’t feel bad when you discover that

there are still to be developed. Continue your exploration to find

answers to these underdeveloped PECs.

Lesson1. Important Entrepreneurial Traits

The following are the fundamental characteristics of an entrepreneur:

1. Hard working: If you are determined to run your own business, you must

concentrate on your work either as a producer or a seller. The success of your

business depends on how much time and effort you will spend on it.

2. Self- Confidence: You must have a strong faith in your ability despite the problems

that you will encounter along the way.

3. Future-Oriented: Once a person enters in a line of business, you must understand

that you are in a non-stop contract that an entrepreneur should understand. It may

take several years to build up a business to a reasonable standard. The goal for

most successful business people is to build a secure job and stable income for

themselves based on their own ability.

4. Profit-Oriented: When you enter into the world of business, obviously, you are

looking for income because you know that this will be your bread and butter not only

for you but also for your family. Therefore, you must see to it the business can

generate income. Another plan of action is to expand your own business through

the use of your generated income.

5. Goal-Oriented: An entrepreneur is forward looking. You have an advanced

preparation for your business. You set a long-term goal for the activities that are

needed, an extensive preparation for the production process and procedures that

you need to go through to acquire, human and non-human resources. Everything in

Page 12: K-12 Module in TLE - ICT Grade 9 [All Gradings]

7

your business will have to be set clearly, organized, and planned depending on the

goal you want to achieve.

6. Persistence: Differences in opinion and judgment. Your opponent can be a part of

the rejection on what you intend to do for your endeavor. As an entrepreneur, you

must be firm, strong-willed, and stick or follow your own belief.

7. Copes with Failure: “Learn from your mistakes”. As an entrepreneur, you must

learn how to deal with the frustrations and failures instead, turn these into productive

learning experiences.

8. Responds to Feedback or Open to Feedback: You must be concerned to know

how well you are doing and keep track of your performance. You must obtain useful

feedback and advice from others.

9. Take the Initiative: A successful entrepreneur takes the initiative. You must put

yourself in a position where you personally are responsible for the failure or success

of your business.

10. Willing to Listen: Take time to listen to the advice, suggestions, and

recommendations of fellow entrepreneurs. It will help your business grow.

11. Set your Own Standards: This involves developing and using logical, step-by-step

plans to reach the goals, or offering evaluation alternatives, monitoring progress,

and switching to successful strategies for the goal you want to achieve. To be a

successful entrepreneur you must take into consideration that sales and production

depend on your own standards.

12. Copes with Uncertainty: Pursue your vision to be a successful entrepreneur, you

should know how to handle unusual events that may happen in the business which

include problems in managing the workers, problems on the delivery of goods and

services, and the problems on demand and production. You must be patient in

dealing with these uncertainties.

13. Committed: You should know that in your business, personal needs, attachment to

your friends, families and relatives are set aside. You must separate the money for

your business from the amount that you need to spend for personal obligations and

lifestyles.

Page 13: K-12 Module in TLE - ICT Grade 9 [All Gradings]

8

14. Builds on Strengths: Successful business people base their work on strengths.

Use your manual skills, knowledge in creating products or services, knowledge in

trade and industry, ability to make and use of a wide network of contacts to build

your business.

15. Reliable and has Integrity: An entrepreneur must build a good reputation, possess

the courage to do the right thing, do what you say, walk your talk, be loyal, and be

fair in dealing with the subordinates and costumers.

16. Risk-Taker: Risk sometimes cannot be anticipated. When misfortunes happen,

consider these as challenges and work them out and set good alternatives. Risks

may result to loss of your business or even bankruptcy.

FIRM UP your Understanding

Activity1: Aligning one’s PECs

Directions: Choose from the list below the characteristics and traits that best describe

your own personal entrepreneurial characteristics. Find ways on how to align

them according to the personal entrepreneurial characteristics of an

entrepreneur which were discussed earlier. Write your answers in the activity

sheet provided.

Creative Resourceful Persistent Organized Independent

Confident Risk taker Observant Competent Trustworthy

Optimistic Passionate Flexible Sensitive Committed

Dynamic Efficient Hardworking Decision-maker Reliable

Knowledgeable Persevering Decisive Strong–minded Courteous

Page 14: K-12 Module in TLE - ICT Grade 9 [All Gradings]

9

Example: My PECs

Try to design a concept map that indicates your traits, characteristics

and skills that you need to possess in order to become a successful

entrepreneur.

Activity 2. My PECs that need to be further improved

Directions: At the center of the street are arrows where positive and negative

characteristics and traits are written. Pick out the positive PECs that you are

already strong at, and write them down on the blank arrows on the left side.

PECs written on the arrows at the right side are the negative characteristics

that need to be further improved.

My PECs

My simple definition

Things to do to align with PECs

of a successful entrepreneur

1. Creative

2. Organized

3. Competent

4. Observant

Page 15: K-12 Module in TLE - ICT Grade 9 [All Gradings]

10

DEEPEN Your Understanding

Lesson 1 Strengthening your Identified PECs

Here are your guides on how to strengthen your own PECs.

1. React positively to criticisms and open to feedback.

2. Always demonstrate positive attitude to achieve a desired goal.

3. Always project strong and well-balanced behavior.

4. Always exercise the assertive style in your work environment.

Page 16: K-12 Module in TLE - ICT Grade 9 [All Gradings]

11

5. Avoid being too passive and too aggressive.

6. Don’t let anyone worsen your business life.

7. Prioritize your business goal rather than personal goal in order to become a

successful entrepreneur.

8. Acquire specific skills for creating and maintaining a conducive work environment.

9. Be responsible in everything you do in your business.

10. Always observe business ethics in putting up a business.

Hello! I’m here once again reminding you whether you have achieved

a certain point that you could honestly tell that you are already

successful in strengthening your own PECs.

Let’ s see!

Activity 1: My techniques to strengthen PECs

Directions: From the given chart below, write at least six techniques on how you would

strengthen your own PECs. Write the PECs that you feel that you still need to

focus on to strengthen these.

Example: Self-confidence

Page 17: K-12 Module in TLE - ICT Grade 9 [All Gradings]

12

TRANSFER Your Learning

Preparation of an Action Plan

Culminating Activity

Directions: Examine yourself once again. Make a short list of PECs that you need to

strengthen. From this activity, prepare of an action plan that requires further development.

You may opt to follow the suggested format below. You may improve or change it as long

as it suits your own plan of action.

Sample Action Plan

Self-confidence

Page 18: K-12 Module in TLE - ICT Grade 9 [All Gradings]

13

Specific Purpose Statement: ( Your vision of your future)

Ex. Developing self-confidence in retail business.

Focus

Area

Current

Situation

Goal

Measures

of

Success

Actions

Required

Time

Frame

Reward/

Recognition

My PECs

I need to

develop

my

undefined

characteris

-tics need

for my

retail

business.

such as:

_________

_________

_________

_________

_________

- To

exercise

my own

PECs

during

selling and

producing

products/

services

-To become

proficient

in my

chosen

skill.

Achieve

100%

completion of

development

of my own

PECs through

selling and

production of

products,

proper

manner when

dealing with

people.

-Selling

finished

products

derived

from

culminating

activities in

any of

chosen

career.

-Participate

in skills

competition

sponsored

by the NGO

and GO

-During

culminating

activities

-After

learning

the

principles,

theories,

process and

of any

chosen

career

-Earns

expected

income

-Outstanding

performance in

selling and

promoting

products and

services

Post-Assessment

Page 19: K-12 Module in TLE - ICT Grade 9 [All Gradings]

14

Answer the post assessment below to determine whether there

is significant increase in your understanding of PECs. The feedback to

this post assessment is appended on page 16.

Good Luck!

A. Matching Type

Directions: Column A lists the characteristics of a successful entrepreneur. Draw a line from the items in Column A that connects the correct definition of terms listed in Column B.

Column A Column B

1. Hardworking

2. Self-confident

3. Profit-oriented

4. Goal-oriented

5. Persistent

6. Responds or open to

feedback

7. Willing to listen

8. Committed

9. Reliable and has integrity

10. Risk-taker

a. Ability to set realistic targets.

b. Interest in money generation.

c. To succeed, one must believe in one’s self.

d. Working diligently and industriously.

e. Being able to listen to the advice of others.

f. Obtaining useful feedback and advice from

others.

g. Being patient and strives to achieve the

goal.

h. Ability to take measured or calculated risks.

i. Being honest, fair and trustworthy.

j. A major priority in the entrepreneur’s life.

Page 20: K-12 Module in TLE - ICT Grade 9 [All Gradings]

15

B. Multiple Choice.

Directions: Read and study the situation that describes entrepreneurial characteristics. Then answer the question by writing the letter of your choice in your assignment notebook or in the provided answer sheet.

Mrs. Gina Magno opens up her own retail business. She knows that her personal entrepreneurial characteristics are insufficient to ensure a successful operationalization of a business she has in mind. Your answers to the questions below will help in developing her PECs.

1. What PECs must she possess if there are customers who complain about the quality

of her product?

a. Patience

b. Hardworking

c. Versatile

d. All of the above

2. Which of the following is NOT considered as a characteristic of an entrepreneur?

a. Copes with failure

b. Dependent

c. Persistent

d. Opportunity seeker

3. If she wants to ensure a profitable business operation, what characteristic will she

maintain?

a. Commitment

b. Goal oriented

c. Futuristic or future-oriented

d. Opportunity seeker

4. Mrs. Magno follows the advice of a friend to be flexible especially if she intends to

open a retail business. What PECs has been demonstrated by Mrs. Magno?

a. Self- confidence

b. Reliable and has integrity

c. Responsive to feedback

d. Persistent

Page 21: K-12 Module in TLE - ICT Grade 9 [All Gradings]

16

5. She tells Mary, her best friend that she has a strong will and does not give up to find

a solution to a business problem. What PECs has been demonstrated by Mrs.

Magno?

a. Hard work

b. Persistence

c. Self-confidence

d. Risk- taking

Feedback Pre-assessment/ Post- assessment

A. Matching Type

1.d 6. f 2.c 7. e 3.b 8. j 4.a 9. i 5.g 10. h

B. Multiple Choice

1. a 2. b 3. d

4. c

5. b

Page 22: K-12 Module in TLE - ICT Grade 9 [All Gradings]

17

Technology and Livelihood Education

Entrepreneurship

Module 2: Environment and Market

One of your greatest dreams in life is to become a successful entrepreneur. As a

person, you are capable of developing your character and personality and how to

respond to some business challenges and opportunities. You can make things happen

by identifying the opportunities around you. You may ask yourself these questions:

What do people need? What products and services are available in the market today?

Can they be improved? How are they made or delivered? Can things be done better?

cheaper? faster? cleaner? Can a product which is used for specific purpose be also

used for some other purposes?

You slowly find answers to these questions as you decide to do the first step in

launching a business enterprise. Be cautious however, that you should develop a habit

of identifying opportunities around you. Only then, you will find the activity both exciting

and easy.

Page 23: K-12 Module in TLE - ICT Grade 9 [All Gradings]

18

EXPLORE your Understanding

Essential Question

How does one select an entrepreneurial activity?

Content Standard

- The learner demonstrates understanding of environment and market that relates with the career choice.

Performance Standard

- The learner formulates a business idea based on the analysis of the environment and market

Guide Questions:

1. How does one determine the product to be produced or services to be offered and delivered to the target market or customers in a particular community?

2. How does one select an entrepreneurial activity?

3. How can one respond effectively to a business enterprise?

Hello there! Are you ready to assess yourself if you are ready to

generate potential business ideas? Let’s try by answering the

succeeding pre-assessment.

Pre-assessment

1. The following are examples of peoples’ basic needs, except:

a. Recreation

b. Clothing

c. Shelter

d. Food

Page 24: K-12 Module in TLE - ICT Grade 9 [All Gradings]

19

2. Which of the following should be considered first by a prospective entrepreneur

in choosing the right location for his/her store?

a. Types of merchandise

b. Access of the target customers

c. The attractiveness of the store layout

d. The prevailing prices of goods in the area

3. Thong plans to put a “digi-print” studio in their locality. Which of the following

will help him determine a successful plan for setting up of his business?

a. Survey of consumer associations

b. Checking for similar business to avoid competition

c. Getting feedback on the quality of service

d. Conduct a SWOT analysis

4. Ceasar studies the population in his immediate community. He is doing this to –

a. identify his would be “suki”.

b. predict his biggest buyer.

c. select his favorite costumers.

d. determine whom to sell his product or service.

5. When an entrepreneur improves and alter products to make it more appealing to

target consumers, he/she is doing an -------- of the product.

a. alteration

b. invention

c. innovation

d. improvisation

Lesson 1 Needs and Wants of People

Everyone has his or her own needs and wants. However, people have different

concepts of needs and wants. Needs in business are important things that every

individual cannot do without in a society. These include:

1. Basic commodities for consumption

2. Clothing and other personal belongings,

3. Shelter, sanitation and health

Page 25: K-12 Module in TLE - ICT Grade 9 [All Gradings]

20

4. Education and relaxation

Basic needs are essential to every individual so he/she may be able to live with

dignity and pride in the community of people. These needs can obviously help you

generate business ideas.

Wants are desires, luxury and extravagance that signify wealth and an expensive

way of living. Wants or desires are considered above all the basic necessities of life.

Some examples are the eagerness or the passion of every individual which are non-

basic needs like; fashion accessories, shoes, clothes, travelling around the world, eating

in an exclusive restaurant; watching movies, concerts, plays, having luxurious cars,

wearing expensive jewelry, perfume, living in impressive homes, and others.

Needs and wants of people are the basic indicators of the kind of business that

you may engage into because it can serve as the measure of your success. Some

other good points that you might consider in business undertakings are the kind of

people, their needs, wants, lifestyle, culture and tradition, and social orientation that

they belong.

Lesson 2 Generating Ideas for Business

Here are some ways by which you may generate possible ideas for business.

1. Examine the existing goods and services. Are you satisfied with the product?

What do other people who use the product say about it? How can it be

improved? There are many ways of improving a product from the way it is made

to the way it is packed and sold? You can also improve the materials used in

crafting the product. In addition, you introduce new ways of using the product,

making it more useful and adaptable to the customers’ many needs. When you

are improving the product or enhancing it, you are doing an innovation. You can

also do an invention by introducing an entirely new product to replace the old

one.

Business ideas may also be generated by examining what goods and services

are sold outside by the community. Very often, these products are sold in a form

that can still be enhanced or improved.

2. Examine the present and future needs. Look and listen to what the

customers, institution, and communities are missing in terms of goods and

Page 26: K-12 Module in TLE - ICT Grade 9 [All Gradings]

21

services. Sometimes, these needs are already obvious and felt at the moment.

Other needs are not that obvious because they can only be felt in the future, in

the event of certain developments in the community. For example, a town will

have its electrification facility in the next six months. Only by that time will the

entrepreneur could think of electrically- powered or generated business such as

xerox copier, computer service, digital printing, etc.

3. Examine how the needs are being satisfied. Needs for the products and

services are referred to as market demand. To satisfy these needs is to supply

the products and services that meet the demands of the market. The term

market refers to whoever will use or buy the products or service, and these may

be people or institutions such as other businesses, establishments,

organizations, or government agencies.

There is a very good business opportunity when there is absolutely no supply to

a pressing market demand.

Businesses or industries in the locality also have needs for goods and services.

Their needs for raw materials, maintenance, and other services such as selling

and distribution are good sources of ideas for business.

4. Examine the available resources around you. Observe what materials or

skills are available in abundance in your area. A business can be started out of

available raw materials by selling them in raw form and by processing and

manufacturing them into finished products. For example, in a copra-producing

town, there will be many coconut husks and shells available as “waste” products.

These can be collected and made into coco rags/doormat and charcoal bricks

and sold profitably outside the community.

A group of people in your neighborhood may have some special skills that can be

harnessed for business. For example, women in the Mountain Province possess

loom weaving skills that have been passed on from one generation to the next

generation. Some communities there set up weaving businesses to produce

blankets, as well as decorative items and various souvenir items for sale to

tourists and lowland communities.

Business ideas can come from your own skills. The work and experience you

may have in agricultural arts, industrial arts, home economics, and ICT classes

will provide you with business opportunities to acquire the needed skills which

will earn for you extra income, should you decide to engage in income-generating

Page 27: K-12 Module in TLE - ICT Grade 9 [All Gradings]

22

activities. With your skills, you may also tinker around with various things in your

spare time. Many products were invented this way.

5. Read magazines, news articles, and other publications on new products and techniques or advances in technology. You can pick up new business

ideas from Newsweek, Reader’s Digest, Business Magazines, Go Negosyo, KAB materials, Small- industry Journal. The Internet serves as a library where you may browse and surf on possible businesses. It will also guide you on how to put the right product in the right place, at the right price, at the right time.

Listing of possible businesses to set up in an area may also be available from

banks or local non-government organizations.

Lesson 3 Selecting the Right Idea

Once you have embarked on identifying the business opportunities, you

will eventually see that there are many possibilities that are available for you. It

is very unlikely that you will have enough resources to pursue all of them at once.

Which one will you choose?

You have to select the most promising one from among hundreds and one

ideas. It will be good to do this in stages. In the first stage, you screen your

ideas to narrow them down to about five choices. In the next stage, trim down

the five choices to two options. In the final stage, choose between the two and

decide which business idea worth pursuing.

In screening your ideas, examine each one in terms of the following

factors:

1. How much capital is needed to put up the business?

2. How big is the demand for the product? Do many people need this product

and will continue to need it for a long time?

3. How is the demand met? Who are processing the products to meet the need

(competition or demand)? How much of the need is now being met (supply)?

4. Do you have the background and experience needed to run this particular

business?

5. Will the business be legal, not going against any existing or foreseeable

government regulation?

6. Is the business in line with your interest and expertise?

Page 28: K-12 Module in TLE - ICT Grade 9 [All Gradings]

23

Your answers to these questions will be helpful in screening which ones

from among your many ideas are worth examining further and worth pursuing.

Lesson 4 Environmental Scanning

There is a need to conduct environmental scanning to identity the needs

and wants of people, the niche for your business mission, and to give attention to

trends and issues. This may also serve as an evaluation of the type of the

entrepreneurial activity appropriate in the community.

Environmental scanning is defined as a process of gathering, analyzing,

and dispensing information for tactical or strategic purposes. The environmental

scanning process entails obtaining both factual and subjective information on the

business environments in which a company is operating.

Environment in the community can be viewed according to its

technological, political, economic, and social aspects. For example, in the past,

people in the community used personal computers but the transmission of

development in terms of technology was interrupted because people were not

satisfied with what they have today. They still look for the changes in their life

and the corresponding in their environment.

As a future entrepreneur, you must be well-versed in this kind of

advancement and progression of your environment particularly in technology so

as to secure the success of your future business. Always think of something new,

something novel, authentic, reinvent the existing ones, and create your new

version of goods/products, and services. For instance, your own hair straightening

is herbal, while in the other salons it is made of synthetic chemicals. This kind of

changes being made will effect the existing principles in business and industries

that can be easily adapted to the changes in producing the products/services to

meet the needs and wants of people in the community.

Page 29: K-12 Module in TLE - ICT Grade 9 [All Gradings]

24

FIRM UP Your Understanding

In generating business idea, you should first identify what type of business is suited to your business idea. You should analyze and scan the potential environment, study the marketing practices and strategies of your competitors, analyze the Strengths, Weaknesses, Opportunities, and the Threats in your environment to ensure that the

products/goods and services you are planning to offer will be patronized within the

easy reach by your target markets/consumers.

Bear in mind these simple rules for successful SWOT analysis.

Be realistic about the strengths and weaknesses of your business when conducting SWOT analysis.

SWOT analysis should distinguish between where your business is today, and where it could be in the future.

SWOT should always be specific. Avoid any grey areas. Always apply SWOT in relation to your competition i.e. better than or

worse than your competition. Keep your SWOT short and simple. Avoid complexity and over analysis SWOT is subjective.

DEEPEN Your Understanding

People keep on searching for new things, new trends, and new

issues. For these reasons, an entrepreneur hurriedly responds to these needs

and wants of people.

As generations come and go, another set of new trends will come or will

exist. In order to adapt to the rapid changes in the business environment, the

existing industries need to improve their products and services. But how can you

generate business ideas with those strong competitors? There are three main

sets of decisions that you need to make - what to produce, how to produce, and

how to share or sell out the product to the market.

Page 30: K-12 Module in TLE - ICT Grade 9 [All Gradings]

25

Activity 1 Mini survey

Directions: Conduct a mini survey in your immediate community. Gather

pertinent data on population across age brackets as suggested in the matrix

b

e

l

o

w

.

O

p

p

o

s

i

t

e

each age group, indicate their probable needs and wants.

Age Bracket Population Needs Wants

Example: 5 and below

35 Toys, coloring books, pajama

Wooden toys, glossy coloring books, etc. fashionable pajama

6- 10 years old

11-15 years old

16-20 years old

Page 31: K-12 Module in TLE - ICT Grade 9 [All Gradings]

26

A

ctivity 2 Screening business ideas

Directions: After filling out the chart above, try to list down all the probable

business opportunities which you may wish to venture in. Remember to consider

the ideas and suggestions discussed in Lesson 3. Use the suggested matrix

below to indicate your choice. Write your answers in your notebook.

Example: Selling wooden toys

Positive Factors

Negative Factors

Strengths Opportunities Weaknesses Threats

TRANSFER Of Learning

Now that, you have all the information, are you ready to test

your ability to generate your own business idea? If your answer is yes, start

studying the sample vicinity map of a community with a population of two

21-25 years old

26-35 years old

35-45 years old

46-55 years old

56-65 years old

66 and above

Page 32: K-12 Module in TLE - ICT Grade 9 [All Gradings]

27

thousand people. A new housing project will be constructed adjacent to Daang

Hari St, close to Old Molino St., its main road. This housing project targets the

homeowners who are young couples with two kids.

In this activity, you need to answer the questions that may lead to the

generation of a probable business. Your answers to these questions will serve

as the bases in formulating your own business ideas.

1. Who do you think are your target consumers/markets?

2. Where is the most ideal location to situate your business?

3. Which products or services would appeal to your target

consumers/markets?

4. Can you say that you have seized the most feasible business

opportunity?

Page 33: K-12 Module in TLE - ICT Grade 9 [All Gradings]

28

Post-assessment

1. The following are examples of peoples’ basic needs, except:

a. Recreation

b. Clothing

c. Shelter

d. Food

2. Which of the following should be considered first by a prospective entrepreneur

in choosing the right location for his/her store?

a. Type of merchandise

b. The access of the target customers

c. The attractiveness of the store layout

d. The prevailing prices of goods in the area

3. Thong plans to put a “digi-print” studio in their locality. Which of the following

will help him determine his plan for a success setting up of his business?

a. Survey of consumer associations

b. Checking for similar business to avoid competition

c. Getting feedback on the quality of service

d. Conduct a SWOT analysis

4. Ceasar studies the population in his immediate community. He is doing this to –

a. identify his would be “suki”.

b. predict his biggest buyer.

c. select his favorite costumers.

d. determine whom to sell his product or service.

5. When an entrepreneur improves and alter products to make it more appealing to

target consumers, he/she is doing an -------- of the product.

a. alteration

b. invention

c. innovation

d. improvisation

Page 34: K-12 Module in TLE - ICT Grade 9 [All Gradings]

29

Feedback

Pre-assessment and Post assessment

1. a

2. b

3. d

4. c

5. b

Page 35: K-12 Module in TLE - ICT Grade 9 [All Gradings]

29

K to 12 Basic Education Curriculum

Technology and Livelihood Education

Content Standard Performance Standard

The learner demonstrates understanding of basic concepts, underlying theories and core competencies in computer systems and networks.

The learner independently provides

quality and marketable service in

computer hardware servicing in terms of

computer systems and networks

installation and diagnose and trouble

shoot computer systems as prescribed in

the TESDA Training Regulation.

MODULE 3:

INSTALL COMPUTER SYSTEMS AND

NETWORKS

Number of Sessions (Time Allotment): 60 Hours (2 Quarters)

Republic of the Philippines

DEPARTMENT OF EDUCATION

Page 36: K-12 Module in TLE - ICT Grade 9 [All Gradings]

30

Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under the Information and Communications Technology (ICT) Course. In this module you will have a great deal of understanding of Installing Computer Systems and Networks. At the end of this module you will be able to apply the knowledge and skills on installing computer hardware, operating system, software components and networks. Those skills are essential for you to pass the National Certification II in Computer Hardware Servicing.

In this module, topics will be introduced progressively lesson by lesson for

easy understanding. After carefully answering the diagnostic assessment, reading all the lessons, answering all the guide questions, masterfully performing all the activities, showing evidences of learning and finally answering the summative test, then you will have a considerable knowledge and skills in installing computer systems and networks essential to be successful in computer hardware servicing as one of the career option in ICT.

Reminder! Just follow the instructions given in this module. Now let us start

exploring new things in this module.

Page 37: K-12 Module in TLE - ICT Grade 9 [All Gradings]

31

In this module, there will be three (3) major topics that you will encounter: (1)

plan and prepare for installation; (2) install hardware and software components and

operating systems; and (3) conduct test on the installed computer system. The three

major topics contain sub-topics that discuss the details on installing computer

systems and networks. This module contains what to KNOW, what to PROCESS,

what to REFLECT and UNDERSTAND as well as what to TRANSFER. The

competencies for this module are:

LO 1. Plan and prepare for installation

Observe Occupational Health and Safety policies and procedures in planning for

installation activity in accordance with requirements

Familiarize with computer hardware, software component and other peripherals

in accordance with established procedures on correct operation and safety

policies

Consult appropriate/ technical personnel to ensure that work is coordinated with

others who are involved in the activity

Obtain materials necessary to complete the work in accordance with

established procedures

Check the materials received against job requirements

LO 2. Install equipment/devices (hardware, software components and

peripherals) and operating systems

Follow OHS procedures in installing devices, systems, networking devices, and

peripherals

Comply with the requirements in installing devices,/systems, networking

devices, and peripherals

Install computer systems, networking devices and peripherals in accordance

with job requirements

Perform installation of devices and variety of operating systems in accordance

with customer/client’s requirements

Obtain approval from appropriate personnel before implementing contingency

procedures

Respond to unplanned events or conditions in accordance to established

procedures

Check the quality of the work undertaken in accordance with the established

procedures

Page 38: K-12 Module in TLE - ICT Grade 9 [All Gradings]

32

LO 3. Conduct test on the installed computer system

Follow OHS policies and procedures in conducting tests

Check circuits and systems being isolated using specified testing procedures

Test devices, systems and/or installation to determine its conformity with the

requirements

Undertake final inspections on the installed devices, systems to ensure

conformity with the requirements

Accomplish technical reports on the tests conducted

Follow procedures in forwarding documentation to appropriate personnel and/or

authority on the test conducted

In order to master the above listed competencies, you must be knowledgeable

of the topics under what to KNOW, perform activities required under what to

PROCESS, accomplish additional meaningful tasks under what to REFLECT and

UNDERSTAND and finally show some evidences of your learning by transferring

what you have learned in a different context under what to TRANSFER.

You will be challenged to dig deeper into your prior knowledge and previous

experiences about computer hardware servicing.

SKILLS TEST Direction: Listed below are some of the most important skills that you must

gain in order to render quality service when you enter the real world of Computer

Hardware Servicing. Read the skills carefully. Write “YES” if you are familiar with the

skill and “NO” if not. Feel free to answer each skill. Write your answers in your

notebook.

Skills in Computer Hardware Servicing YES NO

I can open a computer case.

I can connect the mouse.

I can connect the keyboard.

I can connect the monitor.

I can apply occupational health and safety precautions while working.

I can remove the system fan.

I can detach the power supply from the system unit.

I know how to remove the RAM from the motherboard.

I can remove the hard drive from the system unit.

I can install the power supply.

I know how to install the motherboard.

I can install the internal drives in a system unit.

I know how to attach RAM in the memory socket.

I can install CD / DVD drives.

Page 39: K-12 Module in TLE - ICT Grade 9 [All Gradings]

33

I know how to install an operating system

I know how to configure a hardware components and its related software

I know the procedures in testing the installed computer components

The following topics will enable you to be familiar with planning and preparing

for installation, install equipment and devices, and conduct test on the installed

computer system. All you need to do is to read carefully all the topics and apply the

skills you’ve gained through the distinct activities provided in this module.

LESSON 1: PLAN AND PREPARE FOR INSTALLATION

This lesson is intended to develop your skills in planning and preparing for

installation of computer devices and operating system. At the end of this lesson you

are expected to:

Observe OHS policies and procedures in planning for installation activity in

accordance with requirements

Familiarize with computer peripheral/ devices/systems in accordance with

established procedures correct operation and safety

Consult appropriate/ technical personnel to ensure that work is coordinated with

others who are involved in the activity

Obtain materials necessary to complete the work in accordance with

established procedures

Check the materials received against job requirements

OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES

Occupational Health and Safety (OHS) Policy – An Information and

communication technology (ICT) student should know how to behave when working

in the computer laboratory, as well as implement a safe way of accomplishing every

task. Safety practices should be learned early and always adheres in working with

any electrical and electronic device, including personal computers and its

peripherals. This is for your protection as well as to the people working with you,

Page 40: K-12 Module in TLE - ICT Grade 9 [All Gradings]

34

and for the devices that you are using. The basis for this process begins with

Occupational Health and Safety Policies.

Occupational safety and health (OSH) is a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks. Health and safety procedure is the responsibility of all persons in the computer and technology industries. You must identify the hazards where you are working and decide how dangerous they are. Eliminate the hazard or modify the risk that it presents.

Occupational Health and Safety standards

Each student has a responsibility to their colleagues and their organization to

report and act upon any potential workplace hazard. Students need to be aware of

the type of hazards that are possibly present in their work environment.

Procedure

1. Identify the hazard

2. Clear the area close to the hazard

3. Partition the hazard off or clearly identify the area to protect other people

from harm

4. If the hazard is easily and safely cleared, then do so

If not…

5. Report the hazard to the appropriate person (such as teacher in charge,

principal etc.) to obtain assistance

6. Following clearing of the hazard fill out the correct documentation to assist

in identifying improved practice to reduce further incidence of hazards.

All hazards must be reported using Accidental Report form. This enables us to

track the kinds of hazards we have in our workplace, and take action where

necessary to make it safer for all student and clients.

Accident reports

Forms are used to give specific details with regards to the accidents

happened in the laboratory during experiments.

Accident reports contain the following details:

Name of the person injured Date and time of the accident Type of injury First aid given Action taken to prevent further accidents

Page 41: K-12 Module in TLE - ICT Grade 9 [All Gradings]

35

Accident report sample form

Form No:

Accident Report Form

Date:

Rm. No:

Name: Yr/Sec:

Type of Injury

Cause of Injury

Remedy

Hazardous substances

If the workplace hazard appears to be dangerous to staff and clients and

professional assistance is required:

A. Call the supervisor or manager and advise them of the problem and the

urgency of the matter.

B. Depending on the risk it may be called as an evacuation.

C. Follow the evacuation procedure.

D. The supervisor or manager will call in the fire brigade or specialized

personnel who will deal with the spill.

Fire exits

All fire exits should be kept clear of from obstacles. All students have a

responsibility to make sure that chairs, empty boxes or any other type of obstacle are

not placed in or near fire exit doorways.

All corridors also need to have equipment stored on one side only to ensure

that in the event of an emergency there is a clear exit.

Fire Safety Procedure

Each work area has a designated fire warden, who in the event of a fire will take

charge. They are recognized by the wearing of a red hard hat.

Page 42: K-12 Module in TLE - ICT Grade 9 [All Gradings]

36

If you find the fire

Assess the danger prior to doing anything.

If it is safe to move assist anyone in the vicinity of the fire away from danger.

If it is possible close the door to the fire area.

Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.

Break the glass section of the fire alert call point.

Call to the switch; ensure you know where the fire is, any other details that

may be of assistance to the fire brigade. Details could be size of the fire,

cause or type of fire, any people hurt or trapped, has anyone tried to put it out.

If safe to do so, attack the fire with the correct extinguisher or fire hose.

If the designated fire officer is not present, someone quickly needs to take

responsibility and:

1. Locate the source of the fire.

2. Locate any people.

3. Remove all people from the building.

4. Once outside do a head count?

5. Notify the authorities.

Personal Safety While Working with PC’s

Computer equipment can be dangerous, and you or others can be injured or

even killed if you don’t follow proper safety guidelines when working along with PC’s.

The following are some precautionary measures to take before working with any

computer equipment:

Wear shoes with non-conductive rubber soles to help reduce the chance of

being shocked or seriously injured in an electrical accident.

Do not work on components that are plugged into their power source.

Do not remove expansion cards from a computer when it is turned on.

Remove jewelries when working inside any computer related equipment.

Be sure not to mix electronic components and water.

Applying OH&S Policies

1. Group yourselves into six members. 2. Conduct a simulation on: “Applying OHS Policies and Procedures”.

Page 43: K-12 Module in TLE - ICT Grade 9 [All Gradings]

37

3. The performance will be rated according to the following:

Performance Criteria:

5 - Have shown five OHS policies in different areas

4 - Have shown four OHS policies in different areas

3 - Have shown three OH&S policies in different areas

2 - Have shown two OH&S policies in different areas

1 - Have not shown any OH&S policies

UNDERSTANDING COMPUTER

A computer is one of the most brilliant inventions of mankind. Thanks to the

computer technology, we were able to achieve storage and processing of huge

amounts of data; we could rest our brains by employing computer memory capacities

for storing information. Due to computers, we have been able to speed up daily work,

carry out critical transactions and achieve accuracy and precision in work.

Computers of the earlier years were of the size of a large room and were required to

consume huge amounts of electric power. However, with the advancing technology,

computers have shrunk to the size of a small watch. Depending on the processing

power and size of computers, they have been classified under various types. Let us

look at the classification of computers.

Different Types of Computers

Based on the operational principle of computers, they are categorized as

analog, digital and hybrid computers.

Analog Computers: These are almost extinct today. These are different from a

digital computer because an analog computer can perform several mathematical

operations simultaneously. It uses continuous variables for mathematical operations

and utilizes mechanical or electrical energy.

Page 44: K-12 Module in TLE - ICT Grade 9 [All Gradings]

38

Figure1. Different Types of Computer

Digital Computers: They use digital circuits and are designed to operate on two

states, namely bits 0 and 1. They are analogous to states ON and OFF. Data on

these computers is represented as a series of 0s and 1s. Digital computers are

suitable for complex computation and have higher processing speeds. They are

programmable. Digital computers are either general purpose computers or special

purpose ones. Special purpose computers, as their name suggests, are designed for

specific types of data processing while general purpose computers are meant for

general use.

Hybrid Computers: These computers are a combination of both digital and analog

computers. In this type of computers, the digital segments perform process control

by conversion of analog signals to digital ones.

Classification of Computers

The following are the classification of the different types of computers based

on their sizes and functionalities:

Mainframe Computers: Large organizations use mainframes for highly critical

applications such as bulk data processing and ERP. Most of the mainframe

computers have the capacities to host multiple operating systems and operate as a

number of virtual machines and can substitute for several small servers.

Minicomputers: In terms of size and processing capacity, minicomputers lie in

between mainframes and microcomputers. Minicomputers are also called mid-range

Page 45: K-12 Module in TLE - ICT Grade 9 [All Gradings]

39

systems or workstations. The term began to be popularly used in the 1960s to refer

to relatively smaller third generation computers.

Servers: They are computers designed to provide services to client machines in a

computer network. They have larger storage capacities and powerful processors.

Running on them are programs that serve client requests and allocate resources like

memory and time to client machines. Usually they are very large in size, as they

have large processors and many hard drives. They are designed to be fail-safe and

resistant to crash.

Supercomputers: The highly calculation-intensive tasks can be effectively

performed by means of supercomputers. Quantum physics, mechanics, weather

forecasting, molecular theory are best studied by means of supercomputers. Their

ability of parallel processing and their well-designed memory hierarchy give the

supercomputers, large transaction processing powers.

Figure2. Classification of Computer

Page 46: K-12 Module in TLE - ICT Grade 9 [All Gradings]

40

Microcomputers: A computer with a microprocessor and its central processing unit

it is known as a microcomputer. They do not occupy space as much as mainframes

do. When supplemented with a keyboard and a mouse, microcomputers can be

called personal computers. A monitor, a keyboard and other similar input output

devices, computer memory in the form of RAM and a power supply unit come

packaged in a microcomputer. These computers can fit on desks or tables and prove

to be the best choice for single-user tasks.

Personal computers come in different forms such as desktops, laptops and

personal digital assistants (refer to Figure 3). Let us look at each of these types of

computers.

Desktops: A desktop is intended to be used on a single location. The spare parts of

a desktop computer are readily available at relatively lower costs. Power

consumption is not as critical as that in laptops. Desktops are widely popular for daily

use in the workplace and households.

Laptops: Similar in operation to desktops, laptop computers are miniaturized and

optimized for mobile use. Laptops run on a single battery or an external adapter that

charges the computer batteries.

Figure3. Types of Personal Computer

Page 47: K-12 Module in TLE - ICT Grade 9 [All Gradings]

41

Netbooks: They fall in the category of laptops, but are inexpensive and relatively

smaller in size. They had a smaller feature set and lesser capacities in comparison

to regular laptops, at the time they came into the market.

Personal Digital Assistants (PDAs): It is a handheld computer and popularly

known as a palmtop. It has a touch screen and a memory card for storage of data.

PDAs can also be used as portable audio players, web browsers and smart phones.

Most of them can access the Internet by means of Bluetooth or Wi-Fi

communication.

Tablet Computers: Tablets are mobile computers that are very handy to use. They

use the touch screen technology. Tablets come with an onscreen keyboard or use a

stylus or a digital pen. Apple's iPod redefined the class of tablet computers.

Wearable Computers: A record-setting step in the evolution of computers was the

creation of wearable computers. These computers can be worn on the body and are

often used in the study of behavior modeling and human health. Military and health

professionals have incorporated wearable computers into their daily routine, as a

part of such studies. When the users' hands and sensory organs are engaged in

other activities, wearable computers are of great help in tracking human actions.

Wearable computers do not have to be turned on and off and remain in operation

without user intervention.

Direction: Identify the type of computer being described in the following sentences

and write your answer on a separate sheet of paper.

1. These are mobile computers that are very handy to use. 2. They are computers designed to provide services to client machines in a

computer network. 3. They are also called mid-range systems or workstations. 4. A computer with a microprocessor and its central processing unit. 5. They fall in the category of laptops, but are inexpensive and relatively smaller in

size. 6. A type of computer which is intended be used on a single location. 7. They use digital circuits and are designed to operate on two states, namely bits

0 and 1. 8. Computers that have the capacities to host multiple operating systems and

operate as a number of virtual machines and can substitute for several small servers.

9. It is a handheld computer and popularly known as a palmtop. 10. These computers can be worn on the body and are often used in the study of

behavior modeling and human health.

Page 48: K-12 Module in TLE - ICT Grade 9 [All Gradings]

42

COMPUTER SYSTEM, DEVICES AND PERIPHERALS

As an aspiring computer technician, it is very important to know the system

that runs your computer and different devices attached to it. Each device plays an

important role, without each other computer system will not work properly.

What is an Operating System?

The operating system is the most

important program that runs on a computer. Every

general-purpose computer must have an operating

system to run other programs. Operating systems

perform basic tasks, such as recognizing input from

the keyboard, sending output to the display screen,

keeping track of files and directories on the disk,

and controlling peripheral devices such as disk

drives and printers.

For large systems, the operating system has

even greater responsibilities and powers. It is like a

traffic cop -- it makes sure that different program and users running at the same time

do not interfere with each other. The operating system is also responsible

for security, ensuring that unauthorized users do not access the system.

Operating systems can be classified as follows:

o Multi-user: Allows two or more users to run programs at the same time.

Some operating systems permit hundreds or even thousands of

concurrent users.

Linux

Unix

Windows 2000

o Multiprocessing : Supports running a program on more than one CPU.

Linux

Unix

Windows 2000

o Multitasking : Allows more than one program to run concurrently.

Unix

Windows 2000 and Windows multi point

o Multithreading : Allows different parts of a single program to run

concurrently.

Page 49: K-12 Module in TLE - ICT Grade 9 [All Gradings]

43

Linux

Unix

Windows 2000 and Windows 7

o Real time: Responds to input instantly. General-purpose operating

systems, such as DOS and UNIX, are not real-time.

Operating systems provide a software platform on which

other application programs can run. The application programs must be written to run

on top of a particular operating system. Your choice of operating system, therefore,

determines to a great extent the applications you can run. For PCs, the most popular

operating systems are DOS, OS/2, and Windows, but others are available, such

as Linux.

What are the devices of a computer?

The physical, touchable, electronic and mechanical parts of a computer are

called the hardware which is composed of different devices attached to the

computer.

The following list represents a basic set of devices found in most Personal

Computers.

1. System Unit- The main part of a microcomputer, sometimes called the chassis. It

includes the following parts: Motherboard, Microprocessor, Memory Chips, Buses,

Ports, Expansion Slots and Cards.

Figure4. Tower Type System Unit

Page 50: K-12 Module in TLE - ICT Grade 9 [All Gradings]

44

2. Motherboard / Mainboard / System Board- The main circuit board of a

computer. It contains all the circuits and components that run the computer.

Figure5. Modern Motherboard

3. CPU (Central Processing Unit) - The processor is the main “brain” or “heart” of a

computer system. It performs all of the instructions and calculations that are needed

and manages the flow of information through a computer.

Figure6. Examples of CPU (Intel Core 2 Duo and AMD Athlon)

4. Primary storage- (internal storage, main memory or memory) is the computer's

working storage space that holds data, instructions for processing and processed

data (information) waiting to be sent to secondary storage. Physically, primary

storage is a collection of RAM chips.

Page 51: K-12 Module in TLE - ICT Grade 9 [All Gradings]

45

Two (2) Types of Memory

a. ROM – (Read Only Memory) ROM is non-volatile, meaning it holds data even

when the power is ON or OFF.

b. RAM – (Random Access Memory) RAM is volatile, meaning it holds data only

when the power is on. When the power is off, RAM's contents are lost.

Figure 7.Examples of RAM

5. Expansion Bus - A bus is a data pathway between

several hardware components inside or outside a

computer. It does not only connect the parts of the CPU to

each other, but also links the CPU with other important

hardware.

Figure 8.Expansion Bus

6. Adapters- Printed-circuit boards (also called interface

cards) that enable the computer to use a peripheral

device for which it does not have the necessary

connections or circuit boards. They are often used to

permit upgrading to a new different hardware.

Figure 9. Adapter (Network Adapter)

Page 52: K-12 Module in TLE - ICT Grade 9 [All Gradings]

46

7. Power Supply Unit (PSU) - Installed in the back corner

of the PC case, next to the motherboard. It converts

120vac (standard house power) into DC voltages that are

used by other components in the PC.

Figure10. Power supply

8. Hard Disk Drive (HDD) - Also known as hard drive,

is a magnetic storage device that is installed inside the

computer. The hard drive is used as permanent

storage for data. In a Windows computer, the hard

drive is usually configured as the C: drive and contains

the operating system and applications.

Figure 11.Hard Disc

9. Optical Drive- An optical drive is a storage

device that uses lasers to read data on the optical

media. There are three types of optical drives:

Compact Disc (CD), Digital Versatile Disc (DVD)

and Blu-ray Disc (BD).

Figure12. CD ROM

10. Digital Versatile Disc (DVD) - Designed to

optically access data stored on a DVD. A laser

moves back and forth near the disk surface and

accesses data at a very fast rate.

Figure 13.DVD ROM

What are the input and output devices of a computer?

The devices attached to a personal computer can be classified into two- the

input and output devices. Input Device is composed of a device that accepts data

and instructions from the user or from another computer system. While, output

Page 53: K-12 Module in TLE - ICT Grade 9 [All Gradings]

47

device is any piece of computer hardware that displays results after the computer

has processed the input data that has been entered.

Two (2) Types of Input Devices

1. Keyboard Entry – Data is inputted to the computer through a keyboard.

Keyboard - The first input device developed for the PC. Data is transferred to

the PC over a short cable with a circular 6-pin Mini-din connector that plugs

into the back of the motherboard.

Figure14. Keyboard

2. Direct Entry – A form of input that does not require data to be keyed by someone

sitting at a keyboard. Direct-entry devices create machine-readable data on paper,

or magnetic media, or feed it directly into the computer’s CPU.

Three Categories of Direct Entry Devices

1. Pointing Devices - An input device used to move the

pointer (cursor) on screen.

Mouse - The most common 'pointing device' used

in PCs. Every mouse has two buttons and most

have one or two scroll wheels.

Figure15. Mouse

Touch screen- A display screen that is sensitive to the touch of a finger or

stylus. Used in myriad applications, including ATM machines, retail point-

of-sale terminals, car navigation and industrial controls. The touch screen

became wildly popular for smart phones and tablets.

Figure16. Touch Screen Devices

Page 54: K-12 Module in TLE - ICT Grade 9 [All Gradings]

48

Light Pen - A light-sensitive stylus wired to a video terminal used to draw

pictures or select menu options. The user brings the pen to the desired

point on screen and presses the pen button to make contact.

F

i

Figure17. Light Pen

Digitizer Tablet - A graphics drawing tablet used for sketching new

images or tracing old ones. Also called a "graphics tablet," the user

contacts the surface of the device with a wired or wireless pen or puck.

Often mistakenly called a mouse, the puck is officially the "tablet cursor."

Figure18. Digitizer Tablet

2. Scanning Devices- A device that can read text or

illustrations printed on paper and translates the

information into a form the computer can use.

Figure19. Image scanner

Figure20. Bar Code Reader

Page 55: K-12 Module in TLE - ICT Grade 9 [All Gradings]

49

3. Voice- Input Devices - Audio input devices also known as speech or voice

recognition systems that allow a user to send audio signals to a computer for

processing, recording, or carrying out commands. Audio input devices such as

microphones allow users to speak to the computer in order to record a voice

message or navigate software.

Figure 21. Microphones

Output Devices

1. Computer Display Monitor- It displays information in visual form, using text and

graphics. The portion of the monitor that displays the information is called the

screen or video display terminal.

Types of Monitor

a. CRT Monitors - Cathode Ray Tubes (CRT) were the only type of displays for use

with desktop PCs. They are relatively big (14" to 16" deep) and heavy (over 15

lbs).

Figure22. Types of Monitor

b. LCD Monitors – Liquid Crystal Display (LCD) technology has been used in

laptops for some time. It has recently been made commercially available as

monitors for desktop PCs.

Page 56: K-12 Module in TLE - ICT Grade 9 [All Gradings]

50

c. LED Monitors (Light Emitting Diode) - A display and lighting technology used in

almost every electrical and electronic product on the market, from a tiny on/off

light to digital readouts, flashlights, traffic lights and perimeter lighting.

2. LCD Projectors- utilize two sheets of polarizing

material with a liquid crystal solution between them. An

electric current passed through the liquid causes the

crystals to align so that light cannot pass through them.

Each crystal, therefore, is like a shutter, either allowing

light to pass through or blocking the light.

FFigure23. LCD Projector

3. Smart Board - A type of display screen that has a touch sensitive transparent

panel covering the screen, which is similar to a touch screen.

Figure24. Smart Board

4. Printer - A device that prints text or illustrations on paper.

Types of printer

a) Ink-Jet or Bubble-Jet Printer - spays ink at a sheet of paper. Ink-jet printers

produce high-quality text and graphics.

b) Laser Printer - Uses the same technology as copy machines. Laser printers

produce very high quality text and graphics.

c) LCD and LED Printer- Similar to a laser printer, but uses liquid crystals or light-

emitting diodes rather than a laser to produce an image on the drum.

d) Line Printer - Contains a chain of characters or pins that print an entire line at

one time. Line printers are very fast, but produce low-quality print.

Page 57: K-12 Module in TLE - ICT Grade 9 [All Gradings]

51

Figure 28.Types of Printer

(e) Thermal Printer- An inexpensive printer that works by pushing heated pins against heat-sensitive paper. Thermal printers are widely used in calculators and fax machines.

5. Speakers - Used to play sound. They may be built into

the system unit or connected with cables. Speakers allow

you to listen to music and hear sound effects from your

computer.

Figure 29.Speaker

What is a Storage Device?

Aside from the devices attached on a PC, there are also the so called storage

devices that perform a special task in computing system. Storage device is any

apparatus for recording computer data in a permanent or semi-permanent form.

Page 58: K-12 Module in TLE - ICT Grade 9 [All Gradings]

52

Figure 30.Storage Devices

Types of storage devices

Floppy diskette- is a random access, removable data storage medium that can be

used with personal computers. The term usually refers to the magnetic medium

housed in a rigid plastic cartridge measuring 3.5 inches square and about

2millimeters thick. Also called a "3.5-inch diskette," it can store up to 1.44 megabytes

(MB) of data.

Compact disc (CD) – also called optical disc is a nonmagnetic, polished metal disk

used to store digital information. The disc is read by the CD- ROM.

Digital Versatile Disc (DVD)- an optical disc technology with a 4.7 gigabyte storage

capacity on a single-sided, one-layered disk, which is enough for a 133-minute

movie.

Jump drive and USB flash drive- is a plug-and-play portable storage device that

uses flash memory and is lightweight enough to attach to a key chain. A USB drive

can be used in place of a floppy disk, Zip drive disk, or CD.

Hard drive- is the main, and usually largest, data storage device in a computer.

The operating system, software titles and most other files are stored in the hard disk

drive.

Page 59: K-12 Module in TLE - ICT Grade 9 [All Gradings]

53

LS-120- is a drive which supports a special floppy diskette which can store up to

120MB of information as well as being backwards compatible and still supporting the

standard 1.44MB floppy diskettes.

Zip drive-is a small, portable disk drive used primarily for backing up and archiving

personal computer files.

Direction: In the puzzle below, look for the 10 hidden computer devices and

determine whether it belongs to INPUT, OUTPUT or STORAGE DEVICE.

REVEAL THE PARTS OF A COMPUTER SYSTEM

C G M M Q F Y L W K C P A H K H G C N H

P O R K I R X N A A O A U A K B M P H U

Z A M Z W G W P X W A F V R Q V X U M Y

Q U I P R Y P T E X V I R D B W A O R B

I R T B A R S R U Y L G R D V J B O C U

A O N R D C S G S I L N H I Q S M I L X

C U H L Q U T Z G D C J F S E E J K O U

N H X S P U P D A K O Z X K M T Y U Z S

G H L P F H G P I Z T A F D O U U F T R

A S L W W T R A O S Q F A R E H B G M O

R Y B E A E M J I X K P I I X E C F H T

E S A C M E T S Y S D D E V W T I D V I

K W M I Q K K I S I O R R E I L D F F N

L E I O M E H Y A S K S A I I D G Z K O

M Q U N D H M R W O Q U H O V K T M J M

W P T H E R M K Z W J U B J B E A P Q Z

K Z Z M L H M O U S E C K Y C Y V Y S D

Y B Y V X E W P L Q Q Y O V N H E Z H D

R N F H T U B U G L S N P F J W N K N J

M J G N Y H V J D U G F L U X O M K D A

1. ________________________ ______________________ 2. ________________________ ______________________ 3. ________________________ ______________________ 4. ________________________ ______________________ 5. ________________________ ______________________ 6. ________________________ ______________________ 7. ________________________ ______________________ 8. ________________________ ______________________ 9. ________________________ ______________________ 10. ________________________ ______________________

Page 60: K-12 Module in TLE - ICT Grade 9 [All Gradings]

54

Matching Type. Match column A with Column B and write your answer on a

separate sheet of paper.

What is a Network?

To deepen your understanding with regard to the different components

/ devices of a computer, utilize the Internet and the website

www.professormesser.com, view the video regarding parts of the computer.

Use the URLs below:

1. http://www.professormesser.com/free-a-plus-training/220-801/an-overview-of-

motherboard-types/

A. 1. It serves as the brain of computer. 2. Printed-circuit boards (also called

interface cards) that enable the computer to use a peripheral device

3. Also called read/write memory 4. a small, portable disk drive used primarily

for backing up files 5. The main circuit board of a computer 6. Also called diskette 7. Acts as a pointing device 8. Device that makes sounds, clips and any

audio materials be heard. 9. Component that reads and record data in

CDs and DVDs. 10. it is a visual device that displays the

information

B. a. Adapter b. CD- ROM c. CPU d. Floppy disk e. Microphone f. Monitor g. Motherboard h. Mouse i. Optical Drive j. RAM k. ROM l. Speaker m. Zip Drive

Page 62: K-12 Module in TLE - ICT Grade 9 [All Gradings]

56

After watching the videos, answer the following questions:

1. What are the different types of motherboard shown in the video? 2. What are the different sizes of a motherboard? 3. What are the different types of CPU? 4. Describe the different types of memory cited in the video.

5. What do you think is the most efficient monitor used in our

computers nowadays?

6. Give at least 5 input devices featured in the video presentation.

Role Playing

The class will be divided into 5 groups (depending on the class size),

each group will have a minimum of 5 members and maximum of 10. Each

member should have a special role pertaining to the devices of a computer

and their functions. Each group will be tasked to showcase their talents in

front of the class. Each presentation will be rated using the following criteria:

PERFORMANCE SCORE CARD

CRITERIA PERCENTAGE SCORE

Accuracy (Accurate role and function of a

device was accurately shown)

30%

Presentation (Organization or sequence

of the play, appropriate gestures was

used)

30%

Clarity (Clearly delivered each topic) 30%

Team work (cooperation of each member) 10%

Performance Rating

Page 63: K-12 Module in TLE - ICT Grade 9 [All Gradings]

57

NETWORK

A network consists of two or more computers that are linked in order to share

resources (such as printers and CD-ROMs), exchange files, or allow electronic

communications. The computers on a network may be linked through cables,

telephone lines, radio waves, satellites, or infrared light beams.

There are three basic types of networks which includes the following:

Local Area Network (LAN)

Wide Area Network (WAN)

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small

area. It is generally limited to a geographic area such as a writing lab, school, or

building. Rarely are LAN computers more than a mile apart.

In a typical LAN configuration, one computer is designated as the file server. It

stores all of the software that controls the network, as well as the software that can

be shared by the computers attached to the network. Computers connected to the

file server are called workstations. The workstations can be less powerful than the

file server, and they may have additional software on their hard drives. On most

LANs, cables are used to connect the network interface cards in each computer.

Wide Area Network

Wide Area Networks (WANs) connect larger geographic areas, such as

Florida, the United States, or the world. Dedicated transoceanic cabling or satellite

uplinks may be used to connect this type of network.

Networking Devices

Consist of, but are not limited to non-local printers, workstations, servers,

webcams, data loggers, instruments, dial-in devices, and, in general anything that

requires an Ethernet connection. These devices are supported on a best-effort basis

limited by the staffing and equipment level available.

Page 64: K-12 Module in TLE - ICT Grade 9 [All Gradings]

58

Hub is a small, simple, inexpensive device that joins

multiple computers together. Many network hubs

available today support the Ethernet standard. Other

types including USB hubs also exist, but Ethernet is

the type traditionally used in home networking.

Ethernet switch is a device that gathers the signals

from devices that are connected to it, and then

regenerates a new copy of each signal.

Bridge is a device filters data traffic at a network

boundary. Bridges reduce the amount of traffic on a LAN

by dividing it into two segments.

Routers are small physical devices that join multiple networks

together.

Network gateway is an internetworking system

capable of joining together two networks that use

different base protocols. A network gateway can be

implemented completely in software, completely in

hardware, or as a combination of both.

Modem is a contraction of the terms modulator and

demodulator. Modems perform a simple function:

They translate digital signals from a computer into

analog signals that can travel across conventional

phone lines. The modem modulates the signal at the

sending end and demodulates at the receiving end.

Page 65: K-12 Module in TLE - ICT Grade 9 [All Gradings]

59

Network interface is a device that connects a client computer, server, printer or

other component to your network. Most often, a network

interface consists of a small electronic circuit board that is

inserted into a slot inside a computer or printer. Alternatively,

some computers, printers, or other services include network

interfaces as part of their main circuit boards (motherboards).

Network firewall protects a computer network from

unauthorized access. Network firewalls may be

hardware devices, software programs, or a

combination of the two. Network firewalls guard an

internal computer network (home, school,

business intranet) against malicious access from the

outside. Network firewalls may also be configured to

limit access to the outside from internal users.

Direction: Identify what is being described in the following sentences and write your

answer on a separate sheet of paper.

1. It protects a computer network from unauthorized access. 2. Type of network that connect larger geographic areas, such as Florida, the

United States, or the world.

3. This is an internetworking system capable of joining together two networks

that use different base protocols.

4. It is consists of two or more computers that are linked in order to share

resources (such as printers and CD-ROMs), exchange files, or allow

electronic communications.

5. They translate digital signals from a computer into analog signals that can

travel across conventional phone lines.

6. It is a device that connects a client computer, server, printer or other

component to your network.

7. A device filters data traffic at a network boundary.

8. It is a device that gathers the signals from devices that are connected to it,

and then regenerates a new copy of each signal.

9. It is a small, simple, inexpensive device that joins multiple computers together.

10. Type of network that is confined to a relatively small area.

Page 66: K-12 Module in TLE - ICT Grade 9 [All Gradings]

60

Now, that you are done with the introduction of network as well as the

networking devices, to enlighten your understanding and knowledge have some

more readings about it thru books and other resources. You should consider the

following topics for research:

1. Different types of Network Topology 2. Common networking tools

After the research, you can also deepen your understanding by watching a

video presentation using the URL below:

o http://www.professormesser.com/free-a-plus-training/220-801/network-devices/

o http://www.professormesser.com/free-a-plus-training/220-801/network-

topologies-3/

After the video presentation here are your tasks:

1. List down all the network devices and their advantages cited in the video.

2. List down the different network topologies and their differences.

Page 67: K-12 Module in TLE - ICT Grade 9 [All Gradings]

61

MATERIALS, TOOLS, EQUIPMENT and TESTING DEVICES

The following tools and equipment are classified according to their functions

and uses.

Equipment and Accessories

Tools Materials

LAN Card UPS Server 24 port-hub Modem Fax machine PC Video camera USBExternalCD writer USB scanner USB printers USB Flash Drive

Screwdriver(standard) Screwdriver(Philips) Long nose pliers Mechanical pliers Allen wrench Multitester Crimping tools Soldering iron (30 watts) Wire stripper LAN Tester Anti-static wrist wrap Device drivers/installers

Software applications Network OS Software RJ 45 UTP Cat 5 cable Motherboard’s manual and installer Sound device driver installer

LAN Card – is a network interface card. This is a computer circuit board or card that is installed in a computer so that it can be connected to a network.

Server – is a part of a network. It is a special computer that users on the network can access to carry out a particular job.

Port hub /Port – is a connector on the back of a computer or other device. A port is either a serial port or a parallel port.

Modem - (Modulator-Demodulator) The modem is a device that allows a given computer to share data or otherwise a device which let computers exchange information

Page 68: K-12 Module in TLE - ICT Grade 9 [All Gradings]

62

Scanner- it is an input device that read text or illustration printed on paper, translates the information into a form that a computer can use

Flat Screw Driver – is used to drive or fasten negative slotted screws

USB – Universal Serial Bus, a hardware interface for low-speed peripherals such as the keyboard, mouse, joystick, scanner, printer and telephony devices.

Printer - is a piece of hardware that produces a paper copy (also known as ‘hardcopy’) of the information generated by the computer.

RAM – Random Access Memory, is a primary memory. This memory is used inside the computer to hold programs and data while it is running.

BIOS – Basic Input / Output System, chip that controls the most basic functions of the computer and performs a self-test every time you turn it on.

Flash drive– RAM that can retain data without electrical power. It is widely used for BIOS chips and for digital camera and digital music storage

Video Camera - camera using videotape: a camera that records onto videotape

Long nose Pliers – is used for holding, bending and stretching the lead of electronics component or connecting wire.

Soldering Iron – is used to join two or more metal conductors with the support of soldering lead melted around it.

Desoldering Tool – is used to unsolder unwanted

parts or component in the circuit with the support of soldering pencil

Page 69: K-12 Module in TLE - ICT Grade 9 [All Gradings]

63

Philips Screw Driver- is used to drive or fasten positive slotted screws

LAN Tester- for RJ11,12,45 & BNC w/ Remote Unit This ergonomic tester is designed to test most network cable wiring. You can either conduct an auto or manual test.

UTP – Unshielded Twisted Pair, is a popular type of cable used in computer networking that consists of two shielded wires twisted around each

Using Testing Tools and Equipment

A. Direction: Identify the following tools and materials, give their uses.

1.

2.

3.

4.

Page 70: K-12 Module in TLE - ICT Grade 9 [All Gradings]

64

B. Identification. Direction: Identify the appropriate term described in each sentence. Use a separate sheet for your answers.

________1. It is a connector at the black of a computer or other device.

________2. A computer circuit board installed in a computer so that it can be

connected to a network.

________3.A device that allows a given computer to share a data.

________4. An input device that read text or illustration printed on paper, translated

the information into a form that a computer that can use.

________5.The least expensive and most popular network media.

For you to deepen your knowledge and skills and understanding in planning

and preparing for installation, you need to determine the location of the devices /

systems to be used, obtain materials necessary to complete the work in accordance

with established procedures and check the materials received against job

requirements . Your task is to have a research, find as well and watch video

presentations relating and showing the following:

1. Consult appropriate technical personnel to ensure that work is coordinated

with others who are involved in the activity;

2. Proper location / storage of the devices / systems and materials;

3. Correct way of obtaining the necessary materials to complete the work;

4. Fill up job order forms, request form and report sheets; and

5. Appropriate procedures in in checking the materials received.

After doing the above tasks, make sure that you have a detailed

documentation of it. Write your reflections on your notebooks or other sheet of paper.

After reflecting on the task given to you, it’s your chance now to transfer what

you have learned from the activity by having a presentation in front of the class. You

will be grouped with 5 members during the presentation. Make use of your creativity

in presenting each topic to awaken the interest of your classmates.

Page 71: K-12 Module in TLE - ICT Grade 9 [All Gradings]

65

LESSON2. INSTALL EQUIPMENT / DEVICES and SYSTEMS

This lesson is designed to give you the proper procedures used in installing

devices and operating system of a personal computer, alongside with it is the basic

computer configuration set up. At the end of this lesson you should be able to:

a) Apply OHS procedures in installing devices, systems, networking devices, and

peripherals;

b) Comply with the requirements in installing devices,/systems, networking devices,

and peripherals;

c) Install computer systems, networking devices and peripherals in accordance with

job requirements;

d) Perform variations in installing devices and systems in accordance with

customer/client’s requirements;

e) Obtain approval from appropriate personnel before implementing contingency

procedures;

f) Respond to unplanned events or conditions in accordance to established

procedures; and

g) Check the quality of the work undertaken in accordance with the established

procedures.

SAFETY PRECAUTIONS

Personal Protective Equipment - It refers to protective clothing, helmets, goggles,

or other gear designed to protect the wearer's body or clothing from injury by

electrical hazards, heat, chemicals, and infection, for job-related occupational safety

and health purposes.

PPE can also be used to protect the working environment from pesticide

application, pollution or infection from the worker (for example in a microchipfactory).

It is important that students and teachers during their laboratory period should

be required to use personal protective equipment. Some of these are:

Page 72: K-12 Module in TLE - ICT Grade 9 [All Gradings]

66

Goggles A large spectacles, with

shields around the rims, for protecting

the eyes from dust, excessive light,

wind, etc.

Rubber Sole A special type of shoes

used to prevent electrical shock and for

waterproofing and insulating purposes.

Apron A garment worn over the front

of the body as a protection for one’s

cloth.

Face Mask A covering for the face to

prevent the inhaling or absorbing dust

and other chemicals

Gloves The covering material with a

separate sheath for each finger used

for hand protection.

Anti-Static and Safety Precautions

The little shock you experience while you are walking across a carpeted floor

or when you touched a door knob, table, counter or even another person is a result

of static electricity. Static electricity is the discharge of electricity between two

objects with different electrical potential. Humans can't feel a static shock until it is

several thousand volts strong, but it takes less than 30 volts to fry a sensitive

computer component, such as a stick of RAM or a processor.

That's why computer technicians and home computer builders have to guard

their computers against the deadly ravages of static electricity, as well as take steps

to avoid injury.

Page 73: K-12 Module in TLE - ICT Grade 9 [All Gradings]

67

Safety and Anti-Static Rules

Always use an anti-static wrist strap when working on a computer (except

when working on monitors)

Always disconnect a computer from the AC power and from any powered

peripherals while you are working on it.

Always grasp a metal part of the computer chassis with your bare hand before

you touch anything inside. Do this even if you are wearing an anti-static

wristband.

Always handle electronic components by a non-conducting (non-metallic)

edge. Don't touch the pins or other connectors.

Never plug an ATX power supply into AC power unless it is connected either

to a computer's motherboard or to a dummy test load.

Always use a UL-approved surge protector or an Uninterruptible Power

Supply that incorporates surge and spike protection.

Never eat, drink, or smoke while working on a computer.

True or False

Direction: Write TRUE if the statement is correct and FALSE otherwise.

1. Always disconnect a computer from the AC power and from any powered

peripherals while you are working on it.

2. Always grasp a metal part of the computer chassis with your bare hand before

you touch anything inside. Do this even if you are wearing an anti-static

wristband.

3. Always handle electronic components by a non-conducting (non-metallic)

edge. Don't touch the pins or other connectors.

4. Always use a UL-approved surge protector or an Uninterruptible Power

Supply that incorporates surge and spike protection.

5. Never use an anti-static wrist strap when working on a computer (except

when working on monitors)

6. Everyone is allowed to eat, drink, or smoke while working on a computer.

7. Never plug an ATX power supply into AC power unless it is connected either

to a computer's motherboard or to a dummy test load.

8. Static electricity is the discharge of electricity between two objects with

different electrical potential.

9. Apron is a garment worn over the front of the body as a protection for one’s

cloth.

10. PPE can also be used to protect the working environment from pesticide

application, pollution or infection from the worker.

Page 74: K-12 Module in TLE - ICT Grade 9 [All Gradings]

68

Directions: The class will be divided into five (5) groups. Each group has its own

respective leader. The group will perform a task regarding familiarizing the personal

protective equipment. After the activity they will be graded using the given

Performance Score Card below:

PERFORMANCE SCORE CARD

Performance Criteria Percentage Grade

1. The student clearly identified personal protective

equipment. 20%

2. The student utilized actual tools/device in performing

the actual procedures. 15%

3. The student applied safety precautions during the task. 25%

4. The task gave students more critical thinking on the

personal protective equipment. 30%

5. The student cooperatively performed the task. 10%

Performance Rating

Page 75: K-12 Module in TLE - ICT Grade 9 [All Gradings]

69

SYSTEM’S SPECIFICATION

Whenever you purchase software or hardware for your computer, you should

first make sure your computer supports the system requirements. These are the

necessary specifications your computer must have in order to use the software or

hardware. For example, a computer game may require your computer to have

Windows XP or later, a 2.0 GHz processor, 512 MB of RAM, a 64 MB graphics card,

and 500 MB or hard drive space. If your computer does not meet all of these

requirements, the game will not run very well or might not run at all.

It is just as important to check system requirements for hardware devices. For

example, if you buy a printer, it may require either Windows XP or Mac OS X 10.3 or

later. It may also require a USB port and 80 MB of available hard drive space. If your

computer does not have any USB ports, you will not be able to physically connect

the printer. If your machine does not have Windows XP or Mac OS X 10.3 or later,

the printer drivers may be incompatible with your operating system. This means your

computer will be unable to recognize the printer.

Most hardware and software products have the system requirements printed

on the side or bottom of the product packaging. When you are shopping for

computer software or hardware, it is a good idea to first find out exactly what your

system's specifications are and write them down on a piece of paper. The important

information to record includes:

1. Operating System (i.e. Windows XP, SP 2 or Mac OS X 10.3.8)

2. Processor Speed (i.e. Pentium 4, 3.2 GHz or Power PC G5, 2.0 GHz)

3. Memory, a.k.a. RAM (i.e. 512 MB)

4. Graphics Card (i.e. ATI Radeon 9800 w/ 256 MB video memory)

5. Hard Disk Space (i.e. 80 GB available)

6. I/O Ports (i.e. USB, Firewire, Serial, Parallel, SCSI, VGA, DVI ports)

By recording these specifications from your computer, you will be able to

make sure your computer supports the products you are buying. In terms of

installation, systems’ specification is a big consideration in order for a computer to

run and work properly for the most efficient way it could be.

In broad terms, the performance of a computer depends on four factors: the

speed and architecture of its processor or "central processing unit" (CPU), how much

random access memory (RAM) it has, its graphics system, and its internal hard drive

speed and capacity. Also of importance to most users will be the specification of

its Internet connection. Most computer users and in particular those working with a

lot of photographs, music files or videos should also think about the most

suitable storage devices they will need in order to keep and back-up all of their

valuable data.

Page 76: K-12 Module in TLE - ICT Grade 9 [All Gradings]

70

Processor speed and architecture

The speed of a computer's processor chip (technically known as its "clock

speed") in measured in gigahertz (GHz), with the fastest modern processors

currently running at up to 4.7GHz. However, for most computing tasks, including web

browsing, sending e-mails, word processing and spreadsheet work any processor

running at 1GHz or more remains perfectly sufficient.

For applications such as video editing, 3D graphics work and (for the majority

of "power users") playing computer games, higher processor speeds is highly

required. CPU performance is now determined by far more than raw speed alone.

Intel made this very clear when it introduced its system of processor numbers. These

provide an indication of a processor's "architecture", "cache" and "front side bus

(FSB) speed" in addition to its clock speed.

The architecture of a processor is the most important factor to determine its

performance, and refers to its basic design and complexity. Some processors are

simply more sophisticated than others, with Intel (for example) producing "basic"

processors called Celerons and Pentiums, as well as more powerful processors

under its "Core" processor family. The later include the Core 2, Core i3, Core i5 and

Core i7, with the last of these being the most powerful.

In addition to clock speed and architecture, a processor's cache and front side

bus (FSB) speed also determine a computer's overall power. Cache is a form of very

fast memory integrated into the processor chip, and used to store up instructions

(work for the processor) so that it has to slow down as little as possible between

tasks. Cache is measured in megabytes (MB), with (for example) low-end Celeron

processors having as little as 0.25MB of cache (256KB), and high-end Itaniums

having up to 24MB. The simple message is, the more cache the better- though high

levels of cache still come at a very significant price.

Front side bus (FSB) speed is a measure of how fast a microprocessor

communicates with the computer's main circuit board (or "motherboard") into which it

is physically connected. Again, the higher the measure the better for overall

performance, with FSB speeds currently ranging from 533MHz (still perfectly

sufficient for the vast majority of applications) up to 1600 MHz.

RAM

To a large extent, the more RAM a computer has the faster and more

effectively it will operate. Computers with little RAM have to keep moving data to and

from their hard disks in order to keep running. This tends to make them not just slow

in general, but more annoyingly intermittently sluggish.

Page 77: K-12 Module in TLE - ICT Grade 9 [All Gradings]

71

RAM is measured in megabytes (MB) and gigabytes (GB), as detailed on

the storage page. Just how much RAM a computer needs depends on the software it

is required to run effectively. A computer running Windows XP will usually function

quite happily with 1GB of RAM, whereas twice this amount (ie 2GB) is the realistic

minimum for computers running Windows 7.

Graphics system

A computer's graphics system determines how well it can work with visual

output. Graphics systems can either be integrated into a computer's motherboard, or

plugged into the motherboard as a separate "video card". Graphics systems

integrated into the motherboard (also known as "onboard graphics") are now quite

powerful, and sufficient for handling the requirements of most software applications

aside from games playing, 3D modeling, and some forms of video editing.

Any form of modern computer graphics system can now display high-

resolution color images on a standard-sized display screen (ie any monitor up to

about 19" in size). The more sophisticated graphics cards now determines how well

a computer can handle the playback of high definition video, as well as the speed

and quality at which 3D scenes can be rendered. Another key feature of separate

graphics cards is that most of them now allow more than one display screen to be

connected to a computer. Others also permit the recording of video.

As a basic rule, unless a computer is going to be used to handle 3D graphics

or to undertake a significant volume of video editing or recording, today there is little

point in opting for anything other than onboard graphics (not least because separate

graphics cards consume quite a lot of electricity and create quite a lot of heat and

noise). Adding a new graphics card to a computer with onboard graphics is also a

very easy upgrade if required in the future.

Hard Drive Speed and Capacity

Today 40GB is an absolute minimum hard drive size for a new computer

running Windows 7, with a far larger capacity being recommended in any situation

where more than office software is going to be installed. Where a computer will

frequently be used to edit video, a second internal hard disk dedicated only to video

storage is highly recommended for stable operation. Indeed, for professional video

editing using a program like Premiere Pro CS5, Adobe now recommend that a PC

has at least three internal hard disks (one for the operating system and programs,

one for video project files, and one for video media).

Two key factors determine the speed of traditional, spinning hard disks. The

first is the rotational velocity of the physical disk itself. This can currently be 4200,

5400, 7200, 10000 or 15000 rpm (revolutions per minute). The faster the disk spins,

Page 78: K-12 Module in TLE - ICT Grade 9 [All Gradings]

72

the quicker data can be read from or written to it, hence the faster the disk the better

(although faster disks consumer more power, make more noise, and generate more

heat). Most desktop hard disks run at either 5400 or 7200 rpm, whilst most laptop

hard disks run at 4200 or 5400.

The second key factor that determines performance of a traditional, internal

hard disk is the interface used to connect it to the computer's motherboard. Three

types of interface exist: Serial Advance Technology Attachment (SATA), which is

the most modern and now pretty much the norm on new PCs; Integrated Device

Electronics (IDE) (also known as UDMA), which is a slower and older form of

interface, and finally SCSI, which happens to be the oldest but in it most modern

variant is still the fastest disk interface standard.

Now, in order for you to better understand the topics under system’s

specification, dig deep into your mind and answer the following essential questions:

1. In your point of view, describe system specification?

2. How does it affect the performance of the computer?

3. What is the relevance of understanding system specification in computer

hardware servicing?

4. Why do you think that system specification is one of the most important

considerations during installation?

Page 79: K-12 Module in TLE - ICT Grade 9 [All Gradings]

73

INSTALLATION OF HARDWARE COMPONENTS AND OTHER PERIPHERALS

One of the basic skills that you must acquire in computer hardware servicing

is to independently assemble and disassemble a personal computer or simply setting

up a PC. After familiarizing with all the tools, devices, peripherals and safety

precautions I believe that you are now ready to gain another experience in CHS by

going through this lesson.

Personal Computer Disassembly

Before starting computer disassembly, make sure you have the tools you

need and they're all close by and handy and be sure to have a container to keep the

screws in so you have them when you want to put things back together.

Step1. Unplugging - The first thing you do is to unplug every cable that is plugged

in to your computer. That includes the cables such as Power, USB, Mouse,

Keyboard, Internet, Ethernet, Modem, AM\FM Antenna, Cable TV, etc. Just unplug

all the cables for safety purposes.

Now that your computer is fully unplugged, move your PC to a clean work

space.

Step2.Opening the Outer Shell/Case- First, unscrew the four screws at the back of

the computer. On most computer cases, there will be large knobs that you can

unscrew by hand or by screw driver on the back-right side of the computer. The left

side has small screws because on that side you can't access much on the inside.

Figure 32. Screw at the back of computer chasis

Once the screws are removed, you can remove the side panels. On most

computers, they just slide off. Start with the left side panel (the side that once had

the knobs), slide it towards the back of the computer. Now you can remove the left

panel. Just like the other side, slide it towards the back of the computer.

Page 80: K-12 Module in TLE - ICT Grade 9 [All Gradings]

74

Side

Panel

Figure 33. Removing the side panel

NOTICE:

If you are working on a carpet, about every five minutes touch something that is

grounded (Sink faucet / pipe, wire coming from the ground part of a wall outlet). This

is done so you do not shock your motherboard or other parts.

Step3. Removing the System Fan - First, unplug the fan from the motherboard.

You can find the plug by following the wire from the fan. It should be labeled

"SYS_FAN1". Next, you will have to unscrew the fan from the outside. You should

now be able to lift the fan out of the PC.

Figure 34. Removing the system fan

Step4. Removing the CPU Fan- The CPU fan is located right on top of the CPU

heat sink, which is a large piece of metal with fins on the top. The CPU fan plugs into

the motherboard in an awkward place, that is hard to access. But just follow the

wires and you should easily find it. It is labeled "CPU FAN1". To remove the fan from

the heat sink, remove the four screws securing it in place.

System Fan

Page 81: K-12 Module in TLE - ICT Grade 9 [All Gradings]

75

Figure 35. Removing the CPU fan

Step5. Power Supply - The first thing to do is unplug every wire coming from the

power supply. You must disconnect the motherboard (very large connector/plug),

CD/DVD drive(s) power, internal hard drive power and portable hard drive slot

power.

Once everything is unplugged,

unscrew the four screws holding the power

supply in place, on the back of the

computer. Next, push the power supply

from the outside, and then lift it out.

Figure36. Unscrew the power supply

Step6. CD/ DVD Drive(s)-First, unplug the ribbon from the back of the drive. Once

that is completed, pull on the tab

securing the drive in place, then

push it out from the inside.

Figure 37. Location of CD / DVD Drive

CPU Fan

CD / DVD

Drive

Page 82: K-12 Module in TLE - ICT Grade 9 [All Gradings]

76

Step7. Hard Drive - First, unplug the connector at the back of the slot, and unplug

the other end from the motherboard. Also unplug the SATA cable from the

motherboard and the hard drive. The portable hard drive slot is secured the same

way the CD/DVD drive is, with a tab. Pull on the tab, then slide the slot out.

Figure 38. Unplugging the Hard Drive connector

To remove the hard drive from the side of the slot, unscrew the four screws securing

it in place. You must be very careful not to drop the hard drive, since it is very

delicate!

Figure 39. Removing the hard drive from the side of the slot

Step8. Memory (RAM) - To remove the RAM, push down on both tabs holding the

RAM in place, which are located at both ends of the RAM.

Figure 40. Removing the Memory

Page 83: K-12 Module in TLE - ICT Grade 9 [All Gradings]

77

Step9. Motherboard - The motherboard has seven screws holding it to the frame,

which are indicated by large white circles around them. Remove them and then lift

the motherboard out of the frame.

Figure 41. Removing the Motherboard

Personal Computer Assembly

Now that you have the skills in disassembling a personal computer, Ibelieve

that you are ready to take another step of this module which is assembling a

personal computer. All you need to do is to follow the step by step procedures

provided in this module.

Step 1. Prepare your workplace

1. Take Inventory:

Before you start, take an inventory of your parts. Do not begin assembling

your computer if you don't have everything you need. Begin the step-by-step process

once you are ready with everything you need.

Figure 42. Take inventory of the Different Computer Parts

2. Make Space, Make Time:

Page 84: K-12 Module in TLE - ICT Grade 9 [All Gradings]

78

Building a PC takes up space - about a dining room table worth. So make

sure you have plenty of working room and a few hours to proceed with minimal

interruption. Work on a flat, stable table top surface, or bare floor, where you have

room to layout all of the items.

3. Prepare Grounding Protection:

Use an inexpensive antistatic wrist strap. Make sure you are wearing your

antistatic wrist strap correctly (it does you no good at all if you do not wear it!), and

you are ready to proceed. Look at Figure 43 for details.

Figure 43. Wearing the Anti- static Wrist Strap Correctly

4. Have the Drivers Ready:

Assuming you have another internet connected PC, download the latest

drivers from the vendors' websites for each component you will be

installing. Sometimes drivers are updated between the time the component was

manufactured and the time you are installing it. It is always best to have the

latest. Copy them to a CD for easy access.

Step 2. Prepare the Motherboard

1. Great care should be taken when

installing the motherboard. First, take the

board out of its packaging and put it on

top of the antistatic bag it came in (see

Figure 45). Remember, you always want

to safeguard your components from

potentially hazardous static electricity

(wear your strap).

Figure 44. Motherboard in an Antistatic Bag

2. Before you secure the motherboard onto the PC case/chassis, inspect it

carefully for any visible defects.

Page 85: K-12 Module in TLE - ICT Grade 9 [All Gradings]

79

3. Next, review the motherboard manual, to make sure you are familiar with the

motherboard layout and understand which socket is which. Manuals are

extremely helpful, usually easy to read, and include illustrations. Below you

can find instructions on how to install the processor, the heat sink and the

memory modules on the motherboard. You should not place the motherboard

in the computer case until you are told to do so.

Step 3. Install the CPU

1. Use the unlocking mechanism to

open the CPU socket which is

usually a lever.

2. Carefully line up the pins and

place the chip in its socket; it will

fit only when oriented the proper

way. An arrow or a missing pin on

one corner of the chip will show

you how to line things up.

3. Align Triangular CPU and socket

key marks as shown in Figure 46.

4. Lower the lever to lock the CPU

into place.

Figure 45. Install CPU

Step 4. Install the CPU Heat Sink

1. Follow the manufacturer's directions to install the heat sink and the fan that

will cool the processor. If you bought an OEM CPU and a separate heat sink,

you may need to spread a thin layer of the thermal grease that came with the

heat sink over the chip to ensure proper transfer of heat (some heat sinks

come with this grease already applied).

Figure 46. Install CPU Heat Sink

Page 86: K-12 Module in TLE - ICT Grade 9 [All Gradings]

80

3. Attach the clip that holds the heat sink in place keeping in mind that it may

require a fair amount of force. Again, follow the instructions that came with the

heat sink. They will show you how to fit it correctly. If you are in doubt, you

can visit the manufacturer's website for more information.

4. Plug the CPU fan's power connector into the proper connector on the

motherboard.

Step 5. Install Memory (RAM Modules)

In order to install the memory

modules, insert them into the proper

sockets (Figure 48) and push down

firmly but evenly until the clips on both

sides of the socket pop into place. If

your motherboard supports dual-

channel memory, consult the user

manual to determine which pairs of

RAM sockets you should use. The

motherboard and the CPU are the

brain and nerve center of your PC, so

selecting these components is the

most important decision you'll make.

Figure 47. Install RAM Memory

Step 6. Place the motherboard into the case

1. Some PC cases have a removable motherboard tray. If yours does, remove the

screws holding it in place and pull it out of the case (Figure 49).

Figure 48. Remove Motherboard Tray

2. Note the pattern of the holes in your motherboard (Figure 50), and screw brass

standoffs into the motherboard tray or into the PC case in the correct locations

(ALWAYS check the manual and follow their instructions to the letter).

Page 87: K-12 Module in TLE - ICT Grade 9 [All Gradings]

81

Figure 49. Screw Brass Standoffs Into the Motherboard

3. Check the layout of the sockets on the motherboard, and confirm that the ports on

your motherboard's back panel match the holes on the case's Input/Output (I/O)

shield that is installed in your case. If necessary, remove the old I/O shield by

tapping it firmly a few times with the butt-end of a screwdriver, and then replace it

with the shield that came with the new motherboard.

4. Carefully position the motherboard on top of the brass standoffs (Figure 51), line

up all the holes, and use the screws that accompanied the case to fasten down the

motherboard. If you are using a removable tray in your system, slide the tray and

motherboard back into the case and then secure the tray.

Figure 50. Case’s I /O Shield

Figure 51. Mount the Motherboard

Page 88: K-12 Module in TLE - ICT Grade 9 [All Gradings]

82

Step 7. Connect the Power Supply

Making the proper connections is crucial to successfully assembling your PC

system. Fortunately, manufacturers provide color-coded power cables and unique

connector shapes to make the job easy.

1. First, plug the large ATX power connector (Figure 53) from your power supply into

the matching port on your motherboard. Look Figure X for details.

2. Locate the smaller, square processor power connector (Figure 54) (you cannot

miss it - it is the one sprouting the yellow and black wires) and attach it to the

motherboard. Note: your connector is usually located near the processor. As

always, refer to your motherboard's manual for the exact locations.

3. Use your motherboard user manual and find the description about front-panel

connectors.

Figure 53. Large ATX Connector

Figure 52. Connect the ATX Power in the Motherboard

Figure 53. Square Processor Power Connector

Page 89: K-12 Module in TLE - ICT Grade 9 [All Gradings]

83

NOTE:

You are going to be doing work that requires attention to detail and can be quite

frustrating if you do not go into it with the right attitude.

4. Attach each of the tiny leads from the power and reset switches (Figure 56), the

hard-disk activity lights, the PC speaker, and any front-panel USB and FireWire ports

to the corresponding pin on your motherboard. The needle-nose pliers are useful for

manipulating small pieces.

Figure 54. Connect the different Leads

Step 8. Install Graphics / Video Cards

1. Begin by removing the backplane cover from the AGP or PCI Express X16

slot (the metal piece where the monitor connector will emerge) (Figure 55).

Figure 55. Remove the backplane cover

2. Install the graphics board in that slot, and then secure the card with a screw

(Figure 56).

Page 90: K-12 Module in TLE - ICT Grade 9 [All Gradings]

84

Figure 56. Install the Graphics Board

Step 9. Install Internal Drives

Now it is time to install your drives. This is an easy process, but it requires attention

to detail.

1. Make any necessary changes to jumpers on the drives before mounting them

in the case. A two-drive system (one or two SATA (Serial ATA- is a standard

hardware interface for connecting hard drives and CD/DVD drives to a

computer) hard drives, plus one parallel ATA

(Advanced Technology Attachment) optical drive, for example) is easy to set

up; the SATA drives are jumper less, and the optical drive can be set as

master on its own parallel ATA channel. Many cases have removable drive

rails or cages to house drives.

2. Use the included screws to attach your drives to the rails or cage, and slide

them into the case. For externally accessible drives such as a DVD recorder,

you can save time by installing one drive rail and sliding the drive in for a test

fitting to make sure that its front is flush with the case (Figure 57).

3. When the drives are installed, connect power and data cables to each one.

Parallel ATA drives use wide, flat data cables that can be installed only in the

correct way. Floppy drives use a similar but smaller cable; SATA drives use a

thin, 1cm-wide data cable. SATA drives use a new type of power connector

that many power supplies don't come with. Fortunately, many motherboards

ship with adapters for converting a standard four-pin power connector to a

SATA power connector (Figure 57).

Page 91: K-12 Module in TLE - ICT Grade 9 [All Gradings]

85

Figure 57. Attach your devices

Figure 58. Connect Power Connector

Step 10. Install the Add- in Cards

1. For each add-in card, you must choose a free PCI slot.

1. Remove its backplane cover to allow access from the rear of the case.

3. Carefully position the card above the slot, and press down firmly to seat the

card (Figure 59).

4. Secure the card with a screw.

Page 92: K-12 Module in TLE - ICT Grade 9 [All Gradings]

86

Keep in mind:

1. When attaching cables, never force a connection.

2. Plug in the power cable after you have connected all other

cables.

Figure 59. Add- in Cards

Many motherboards have additional sound connectors or ports housed on

small add-in boards. Some of these plug into slots on the motherboard; others screw

into the back of the case in place of slot covers. Usually the additional ports are not

essential to your PC's operation. For example, if you install a sound card, you do not

need connectors to the motherboard's built-in sound chip. Check your motherboard

manual to determine what each of these boards does.

Connecting Peripherals of a Personal Computer

When attaching hardware and peripherals of the computer, ensure that they

are connected to the correct locations or ports. For example, some mouse and

keyboard cables use the same type of PS/2 connector. So, you must know first the

different ports that can be found in the back panel of the computer.

Steps in Connecting Peripherals of a PC

Step 1.Attach the monitor cable to the video port.

Step 2.Secure the cable by tightening the screws on the connector.

Step 3.Plug the keyboard cable into the PS/2 keyboard port.

Step 4.Plug the mouse cable into the PS/2 mouse port.

Step 5.Plug the USB cable into a USB port.

Step 6.Plug the network cable into the network port.

Step 7.Plug the power cable into the power supply.

Page 93: K-12 Module in TLE - ICT Grade 9 [All Gradings]

87

Figure 60. Steps in Connecting Peripherals of a PC

After connecting all the cables into their proper places, the picture in the next

page should be the appearance of the back panel of your PC.

Figure 61. Appearance of the PC’s Back Panel

Page 94: K-12 Module in TLE - ICT Grade 9 [All Gradings]

88

Rearrange the Procedures

Direction: Rearrange the following procedures in their proper order. Use numbers to

indicate their order of precedence. The first number is done for you.

A. Personal Computer Disassembly

__7_1. Detaching the Hard Drive

____2. Detaching the power supply

____3. Opening the outer shell / case

____4. Pull Out the Motherboard

____5. Removing the CD / DVD Drives

____6. Removing the CPU fan

____7. Removing the system fan

____8. Unplugging all the cables and wires

B. Personal Computer Assembly

__7_1. Connect the Power Supply

____2. Install Graphics / Video Cards

____3. Install Internal Drives

____4. Install Memory (RAM Modules)

____5. Install the Add- in Cards

____6. Install the CPU

____7. Install the CPU Heat Sink

____8. Place the motherboard into the case

____9. Prepare the Motherboard

____10. Prepare your workplace

Page 95: K-12 Module in TLE - ICT Grade 9 [All Gradings]

89

Performance Test

Direction: Follow and perform the given procedures on Activity A, B and C. Safety

precautions must be observed when working. You will be rated in accordance with

the rubrics provided after the activity:

A. PC Disassembly

B. Personal Computer Assembly

Unplug all the cables and

wires

Open the outer shell / case

Remove the system fan

Remove the CPU Fan

Remove the power supply

Remove CD/ DVD Drives

Remove Memory Module

Remove the Motherboard

Prepare your workplace

Prepare the Motherboard

Install the CPUInstall the CPU

Heat Sink

Install Memory (RAM

Modules)

Place the motherboard into the case

Connect the Power Supply

Install Graphics /

Video Cards

Install Internal Drives

Install the Add- in Cards

Page 96: K-12 Module in TLE - ICT Grade 9 [All Gradings]

90

C. Connecting PC Peripherals

Rubrics for your performance Test

Criteria Percentage Grade

Accuracy 50 %

Adherence to the procedures 20%

Workmanship(applied safety precautions) 20%

Speed 10%

Performance Rating

1•Attach the monitor cable to the video port.

2•Secure the cable by tightening the screws on the connector

3•Plug the keyboard cable into the PS/2 keyboard port

4•Plug the mouse cable into the PS/2 mouse port.

5•Plug the USB cable into a USB port.

6•Plug the network cable into the network port.

7 •Plug the power cable into the power supply.

Page 97: K-12 Module in TLE - ICT Grade 9 [All Gradings]

91

INSTALLING OPERATINFG SYSTEM

Before the installation process undertake, a technician must be aware of the

minimum requirements of a computer hardware that is compatible with the operating

system to be installed. Following the systems’ requirements means an efficient

computer system. The list below shows the windows XP minimum requirements for

installation:

Pentium 233 Mhz or compatible processor or faster; 300MHZ or faster

recommended

64MB of RAM minimum; 128MB or more recommended

4.3GB hard hard disk space or more

CD-ROM or DVD-ROM

Super VGA (800X600) or higher-resolution monitor

Keyboard and mouse

Windows XP Installation

1. Insert the Windows XP CD-ROM and reboot the computer

If you see a message about press any key to boot the CD, do so now. Otherwise, you will see a message about Setup inspecting your system.

Figure 62. Boot from CD

Page 98: K-12 Module in TLE - ICT Grade 9 [All Gradings]

92

2. MS-DOS portion of Setup begins

In the first stage of setup; you will see a series of blue and gray MS-DOS-based screens.

In the first step, you will be asked to press F6 if you need to install any third-party or RAID drivers.

Figure 63. Windows Set-up

3. Welcome to Setup

Finally, Setup begins. In this step, you can set up XP, launch the Recovery Console (another, more complicated system recovery tool), or quit.

Press ENTER to continue Setup, and it will examine your hard drives and removable disks.

Figure 64. Welcome to Set-up

Page 99: K-12 Module in TLE - ICT Grade 9 [All Gradings]

93

4. Read the license agreement

Next, you'll have to agree to Microsoft's complex licensing agreement. Among the highlights: You don't actually own Windows XP and you can only install it on one PC.

Hit F8 to continue.

Figure 65. License and Agreement

5. Choose an installation partition

This crucial step lets you choose where to install XP.

On a clean install, you will typically install to the C: drive, but you might have other ideas, especially if you plan to dual-boot with 9x.

Setup will show you all of your available disks (in this case, just one) and let you create and delete partitions as needed. So, for example, if you have one disk, but would like to create two partitions, one for XP and one for your data, you can do that here.

Figure 66. Choose an Installation Partition

Page 100: K-12 Module in TLE - ICT Grade 9 [All Gradings]

94

6. Select the file system

If you created a new partition, or wish to change the file system of an existing partition, you can do so in the next step. NTFS (New Technology File System) file system is more secured than FAT (File Allocation System).

Regardless of which file system you choose, be sure to select one of the "quick" format options (the top two choices), if you do need to format, since these will work much more quickly than a full format.

Figure 67. Select the File System

7. Optionally format the partition

If you did choose to change or format the file system, this will occur next.

First, you'll be asked to verify the format. If you're installing XP on a system

with more than one partition, especially one that still holds your data on one of

the partitions, be sure you're formatting the correct partition.

Hit F to continue, and a yellow progress bar will indicate the status of the format. When this is complete, Setup will again examine your disks, and create a list of files to copy.

Figure 68. Optionally Format the Partition

Page 101: K-12 Module in TLE - ICT Grade 9 [All Gradings]

95

8. Setup folder copy phase and reboot

Setup will now copy system files to the system/boot partition(s) you just created. This will allow the PC to boot from the C: drive and continue Setup in GUI mode.

When the file copy is complete, Setup will initialize and save your XP configuration.

It will then reboot your PC.When the system reboots, you will probably see the "Press any key to boot from CD" message again. If this happens, do not press a key: Setup will now boot from your C: drive. In the event that you cannot prevent the CD-based Setup from reloading, eject the CD and reboot. Setup will ask for the CD when needed.

Figure 69. Setup Folder Copy Phase

9. GUI Setup begins

Once the system reboots, you will be presented with the GUI Setup phase, which is much more attractive than the DOS-mode phase. As you progress through GUI Setup, you can read promotional information on the right side of the screen about XP.

Next, your hardware devices are detected. This could take several minutes.

Figure 70. GUI Setup

Page 102: K-12 Module in TLE - ICT Grade 9 [All Gradings]

96

10. Regional and language Options

In the first interactive portion of GUI Setup, you can choose to customize the regional and language settings that will be used by XP, as well as the text input language you'd like. Users in the United States will not normally need to change anything here.

Click Next to continue.

Figure 71. Regional and Language Options

11. Personalize your software

Now, enter your name and your company.

The name you enter is not the same as your user name, incidentally, so you

should enter your real name here (i.e. Rosalie Lujero or whatever).

Click Next to continue.

Figure 72. Software Personalization

Page 103: K-12 Module in TLE - ICT Grade 9 [All Gradings]

97

12. Enter your product key

Now you must enter the 25-character product key that is located on the orange sticker found on the back of the CD holder that came with Windows XP. You cannot install XP without a valid product key. Later on, you will be asked to activate and optionally register your copy of Windows XP. A product key can be used to install XP on only one PC.

Click Next to continue.

Figure 73. Enter Product Key

13. Enter a computer name and administrator password

In the next phase of Setup, you can create a name for your computer (which is used to identify it on a network) and, optionally in Pro Edition only, a password for the system Administrator, the person who controls the PC (this will generally be you, of course).

Figure 74. Enter Computer Name and Administrator Password

Page 104: K-12 Module in TLE - ICT Grade 9 [All Gradings]

98

14. Supply your date and time settings

Next, you can supply the date and time, which are auto-set based on information in your BIOS, and the time zone, which is irritatingly set to PST, which is where Microsoft is. Change these as appropriate.

Click Next to continue.

Figure 75. Enter Date and Time Settings

15. Network setup

If you have a networking card or modem, Setup now install the networking components, which include the client for Microsoft networks, File and Print Sharing, the Quality of Service (QoS) Packet Scheduler, and the TCP/IP networking protocol by default.

Figure 76. Network Set-Up

Page 105: K-12 Module in TLE - ICT Grade 9 [All Gradings]

99

16a. Choose networking settings

In this phase, you can choose to keep the default settings (recommended) or enter custom settings.

Click Next to continue.

Figure 77. Choose Networking Settings

Windows XP Professional only:

16b. Enter workgroup or domain information

In Windows XP Professional only, you will be able to select a workgroup or domain name next. Home Edition doesn't work with Windows domains, however, and Setup will automatically supply the workgroup name MSHOME, which you can change later. The default workgroup name in XP Pro is, imaginatively, WORKGROUP.

Click Next to continue.

Figure 78. Enter Workgroup or Domain Information

Note that XP doesn't include the legacy NetBEUI protocol out of the box. If you want to use this protocol, you will need to install it later from the XP CD-ROM.

Page 106: K-12 Module in TLE - ICT Grade 9 [All Gradings]

100

17. Set-up completion

From this point on, Setup will continue to completion without any further need for interaction. Setup will now copy files, complete installation, install your Start Menu items, register system components, save settings, remove any temporary files needed by Setup, and then reboot.

Again, you will probably see the "Press any key to boot from CD" message on reboot. If this happens, do not press a key, and your new XP install will boot up. You can remove the XP Setup CD now.

Figure 79. Set- Up Completion

18. First boot

You’ll be greeted by the XP splash screen on first boot (this actually appears briefly when you rebooted into GUI Setup as well).The splash screens for XP Pro and Home are subtly different.

Figure 80. First Boot

Page 107: K-12 Module in TLE - ICT Grade 9 [All Gradings]

101

19. Change display settings

Users with CRT monitors and some LCDs (such as laptops and flat panel displays) will see a Display Settings dialog appear, which asks whether you'd like XP to automatically set the resolution. This will generally change the resolution from 800 x 600 to 1024 x 768 on a CRT monitor, or to the native resolution of an LCD display.

Click OK and let XP change the resolution. Then, accept the settings if the screen display changes and can be read. If you can't see the display, it will time out after 30 seconds and return to the sub-optimal 800 x 600 resolution.

Click OK to accept the screen resolution change.

Figure 81. Change Display Settings

20. Welcome to Microsoft Windows

Now, you are presented with XP's "Out of Box Experience," or OOBE, which presents a silly wizard to guide you through the final set up of your PC.

Click Next to continue.

Figure 82. Welcome to Microsoft Windows

Page 108: K-12 Module in TLE - ICT Grade 9 [All Gradings]

102

21. Network setup

In the opening OOBE phase, you are asked to set up your network/Internet

connection, which is required for activation and registration. If you selected

the default networking configuration during Setup and know it will work

(because you're connected directly to a cable modem, perhaps, or are on a

local area network), then select Yes (the default). Otherwise, you can select

No and then Skip.

We'll assume that your network is up and running and select Yes.

Click Next to continue.

Figure 83. Network Set- up

22. Optionally activate and register Windows

If you selected Yes in the previous step, you are asked if you'd like to activate Windows XP. This will tie your copy of XP to the current PC semi-permanently. Activation requires a connection to the Internet, but you can perform this step later if you want (and don't worry, XP will annoyingly remind you of this fact every time you boot the machine until you do so).

Figure 84. Windows Activation

Page 109: K-12 Module in TLE - ICT Grade 9 [All Gradings]

103

23. Set up users

Now, you can set up the user names of the people who will be using the PC. You will want at least one user (for you), since you shouldn't be logging on as Administrator. Curiously, each user you do create here has administrative privileges, however, and no password. You should set up your users correctly with passwords as soon as possible.

This phase lets you create up to five users. You can create more later, or manage users, using the User Accounts tool in Control Panel.

Click Finish when done creating users. At this point, OOBE ends and you're reading to go.

Click Finish again.

Figure 85. Set-up Users

24. Logon to Windows XP for the first time

Click your name, that account will logon and you'll be presented with the XP desktop. After you create passwords, however, you'll be asked to enter a password before you can logon.

Figure 86. Set-up Users

Page 110: K-12 Module in TLE - ICT Grade 9 [All Gradings]

104

Multiple Choice: Read each question carefully and choose the letter of the best

answer. Write your answer on a separate sheet of paper.

1. Which of the following is not a Windows XP minimum requirement? a. 128MB RAM or higher b. CD- ROM or DVD ROM

c. Lower resolution monitor d. 4.3 GB hard disk space or more

2. If you see a message to press any key to boot the CD and you fail to do so, what do you think will happen?

a. The computer will restart b. Set up inspecting your system will appear c. It will be prompted to BIOS setup d. It will return to boot menu

3. What key should you press if you need to install any third- party or RAID drivers?

a. F2 b. F6

c. F2 d. F12

4. After reading the license agreement, what function key will press in order to start the installation?

a. F6 b. F8

c. F9 d. F12

5. Where do we typically install the operating system? 1 a. Drive C b. DVD

c. External Drive d. Floppy Drive

6. What file system is usually used during installation? 2

a. FAT b. FAT32

c. NTFS d. NTFS32

7. Suppose that you will install Windows XP on a system with more than one 3

partition, what important process should be done? 4 a. Change the file system 5

b. Delete the data and files on the different partition 6 c. Examine the partition 7 d. Format the correct partition 8

8. When the folder copy phase is complete your system will reboot, what are you 9 going to do if see the message “Press any key to boot from CD”? 10

a. Press any key b. Do not press a key

c. Reboot the system d. Eject the CD

9. What is the next phase after the set up folder copy phase and reboot? 11

a. GUI set up b. Software

c. Username setup d. Software personalization

10. What phase will immediately follow after the first boot phase? 12 a. Welcome to Windows b. Network Setup

c. Change display setting d. Set up users

13

14

15

Page 111: K-12 Module in TLE - ICT Grade 9 [All Gradings]

105

16 For you to have a profound knowledge on the overview of what windows XP 17

is, utilize the internet and watch the following video presentations: 18

1. Overview of Windows XP 19

http://www.professormesser.com/free-a-plus-training/220-802/an-20 overview-of-windows-xp/ 21

22

2. Planning for installation 23

http://www.professormesser.com/free-a-plus-training/220-24 802/planning-a-windows-installation-2/ 25

26

3. Windows XP installation 27 http://www.professormesser.com/free-a-plus-training/220-28 802/installing-windows-xp-3/ 29

30

After watching the videos, have a documentation containing the overview of 31

Windows Xp and salient procedures in Planning for installation and Windows XP 32

installation. Use a short white bond paper and be creative for the documentation. 33

34

35

36

37

38

39

Page 112: K-12 Module in TLE - ICT Grade 9 [All Gradings]

106

40 41

Windows XP Installation 42

Equipment: 43

Computer unit with CD or DVD drive 44

AVR / UPS 45

Materials: 46

Windows XP Installer 47

Procedure: 48

1. Work in triads or quartet (depending on the no. of computer available) 49

2. Install the Operating System (OS), Windows XP. 50

3. Take turns in doing the above task. 51

52

You will be assessed using the criteria in the score card below. 53

PERFORMANCE SCORE CARD 54

Evaluation:

CRITERIA

Percentage Score

1. Operating System is installed with no errors. 40%

2. Proper disk partitioning and partition is performed.

40%

3. Proper use of equipment and materials is observed.

10%

4. Observance of Safety Precautions. 10%

Performance Criteria

55

56

57

58

59

60

61

62

63

Page 113: K-12 Module in TLE - ICT Grade 9 [All Gradings]

107

64

65

66

Windows 7 Installation 67

68

As a technician you must be able to know the variations or options in installing 69

an operating system that is compatible with the hardware requirement of a personal 70

computer. Another operating system available in the market now is the Windows 7 71

version. Now, take a tour through the procedures in installing a Windows 7 operating 72

system. I believe, the procedures will be very easy for you. 73

74

1. Turn your computer on then press Del or F2 (depend on your computer’s 75 mainboard) to enter the system BIOS. 76

2. Go to Boot menu and choose Boot from CD/DVD. 77 78

79 80

Figure 87. Boot Menu 81

82 83

3. Press F10 to save the configuration and exit BIOS then reset your computer. 84 85

86

Figure 88. Save configuration settings 87

Page 114: K-12 Module in TLE - ICT Grade 9 [All Gradings]

108

4. Insert Windows 7 DVD into your DVD drive then start up your computer, 88

Windows 7 will be loading files. 89 90

91

92

93

94

95

96

97

98

99

Figure 89. Windows 7 loading files and Start up 100

101

102

5. Select your language, time & currency format, keyboard or input method and 103 click Next. 104

105 106

Figure 90. Language, Time and Currency Set- up 107

6. Click Install now. 108

109 Figure 91. Install Now 110

Page 115: K-12 Module in TLE - ICT Grade 9 [All Gradings]

109

7. Check I accept the license terms and click Next. 111

112

113 114

Figure 92. License Terms Agreement 115

116

8. Click Upgrade if you already have a previous Windows version 117

or Custom (advanced) if you don’t have a previous Windows version or want 118

to install a fresh copy of Windows 7. 119

120

121

Figure 93. Windows 7 Options for Installation 122

123

124

125

Page 116: K-12 Module in TLE - ICT Grade 9 [All Gradings]

110

9. (Skip this step if you chose Upgrade and have only one partition) Select 126

the drive where you want to install Windows 7 and click Next. If you want to 127

make any partitions, click Drive options (advanced), make the partitions and 128

then click Next. 129

130

131

Figure 94. Drive Options 132

133

10. It will now start installing Windows 7. The first step, (i.e. Copying Windows 134

files) was already done when you booted the Windows 7 DVD so it will 135

complete instantly. 136

137

138

Figure 95. Windows 7 Starts Installation 139

140

Page 117: K-12 Module in TLE - ICT Grade 9 [All Gradings]

111

11. After completing the first step, it will expand (decompress) the files that it has 141

been copied. 142

143

Figure 96. Expanding Windows Files 144

145

12. The third and fourth step will also complete instantly like the first step. 146

147

148

Figure 97. Installing Features and Updates 149

150

151

152

Page 118: K-12 Module in TLE - ICT Grade 9 [All Gradings]

112

13. After that it will automatically restart after 15 seconds and continue the setup. 153

You can also click Restart now to restart without any delays. 154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173 Figure 98. Restart to Continue Installation 174

175

14. After restarting for the first time, it will continue the setup. This is the last step 176

so it will take the most time than the previous steps. 177

178

179

Figure 99.Completing Installation 180

Page 119: K-12 Module in TLE - ICT Grade 9 [All Gradings]

113

15. It will now automatically restart again and continue the setup. You can 181

click Restart now to restart without any delays. 182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

Figure 100.First Start Up 201

202

16. Type your desired user name in the text-box and click Next. It will 203

automatically fill up the computer name. 204 205

206

Figure 101.Software Personalization 207

208

Page 120: K-12 Module in TLE - ICT Grade 9 [All Gradings]

114

17. If you want to set a password, type it in the text-boxes and click Next. 209

210

211

Figure 102.Password Set- up 212

213

18. Type your product key in the text-box and click Next. You can also skip this 214

step and simply click Next if you want to type the product key later. Windows 215

will run only for 30 days if you do that. 216

217

218

Figure 103.Type Windows Product Key 219

220

221

Page 121: K-12 Module in TLE - ICT Grade 9 [All Gradings]

115

19. Select your desired option for Windows Updates 222

223

224

Figure 104. Windows Update 225

226

227

20. Select your time and click Next. 228

229

230

Figure 105. Time and Date Settings 231

232

Page 122: K-12 Module in TLE - ICT Grade 9 [All Gradings]

116

21. If you are connected to any network, it will ask you to set the network’s 233

location. 234

235

236

237 238 239

240

241

242

243

244

245

246

247

248

Figure 106. Windows 7 Set- up Complete 249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

Figure 107. Preparing Desktop 275

Page 123: K-12 Module in TLE - ICT Grade 9 [All Gradings]

117

276

Hands- on Activity: 277

You are tasked to reformat / install an operating system particularly Windows 278

7, however, during the process of installation a problem occurred the machine / 279

computer did not boot from CD. What do you think might be the reason for this 280

unplanned incident? Your task now is to demonstrate the correct procedures to solve 281

and respond to this unplanned event in accordance to the established procedures. 282

You will work in quartet or triads (depending on the number of computers) to 283

solve this problem. Your output will be rated according to the following criteria: 284

SKILLS SCORE CARD 285

CRITERIA PERCENTAGE SCORE

Accuracy

(Adherence to the correct procedure)

50 %

Workmanship

(Adherence to OHS policy, neatness and

organization of materials used)

30 %

Speed 20 %

PERFORMANCE RATING 100%

286

287

Before implementing any contingency procedures in any unplanned events 288

you must have a deeper understanding in obtaining approval from appropriate 289

personnel. Your task now is to do the following: 290

1. Watch video presentation on the said topic and have a proper documentation 291

of the procedures in obtaining approval from the appropriate personnel. 292

2. Interview a person in the field to acquire the knowledge (procedures) and 293

skills on the said competency. 294

295

296

297

Page 124: K-12 Module in TLE - ICT Grade 9 [All Gradings]

118

298 299

Windows 7 Installation 300

Equipment: 301

Computer unit with CD or DVD drive 302

AVR / UPS 303

Materials: 304

Windows 7 Installer 305

Procedure: 306

1. Work in triads or quartet (depending on the no. of computer available) 307

2. Install the Operating System (OS), Windows 7. 308

3. Take turns in doing the above task. 309

310

You will be assessed using the criteria in the score card below. 311

PERFORMANCE SCORE CARD 312

CRITERIA Percentage Score

1. Operating System is installed with no errors. 40%

2. Proper disk partitioning and partition is performed.

40%

3. Proper use of equipment and materials is observed.

10%

4. Observance of Safety Precautions. 10%

PERFORMANCE RATING

313

314

315

316

317

318

319

320

Page 125: K-12 Module in TLE - ICT Grade 9 [All Gradings]

119

321

322

323

324

BASIC COMPUTER CONFIGURATION SETUP 325

326

Configuration is the way a system is set up, or the assortment of 327

components that make up the system. Configuration can refer to 328

either hardware or software, or the combination of both. 329

330

Basic Input / Output System (BIOS) 331

The Basic Input Output System, usually referred to as BIOS, is software 332

stored on a small memory chip on the motherboard. 333

BIOS instruct the computer on how to perform a number of basic functions 334

such as booting and keyboard control. BIOS is also used to identify and configure 335

the hardware in a computer such as the hard drive, optical drive, CPU, memory, etc. 336

337

338

Figure 108. BIOS Set- up 339

340

The BIOS is accessed and configured through the BIOS Setup Utility. The 341

BIOS Setup Utility is, for all reasonable purposes, the BIOS itself. All available 342

options in BIOS are configurable via the BIOS Setup Utility. The BIOS Setup Utility is 343

accessed in various ways depending on your computer or motherboard make and 344

model. 345

Page 126: K-12 Module in TLE - ICT Grade 9 [All Gradings]

120

BIOS access and configuration on PC systems is independent of 346

any operating systembecause the BIOS is part of the motherboard hardware. It 347

doesn't matter if a computer is running Windows 7, Windows Vista, Windows XP, 348

Linux, Unix, or no operating system at all - BIOS functions outside of the operating 349

system environment and is no way dependent upon it. 350

BIOS contain a number of hardware configuration options that can be 351

changed through the setup utility. Saving these changes and restarting the computer 352

applies the changes to the BIOS and alters the way BIOS instructs the hardware to 353

function. The following list shows the things you can do in most BIOS systems: 354

355

Change the Boot Order Load BIOS Setup Defaults Remove a BIOS Password Create a BIOS Password Change the Date and Time Change Floppy Drive Settings Change Hard Drive Settings Change CD/DVD/BD Drive Settings View Amount of Memory Installed Change the Boot Up NumLock Status

Enable or Disable the Computer Logo Enable or Disable the Quick Power On

Self Test (POST) Enable or Disable the CPU Internal

Cache Enable or Disable the Caching of

BIOS Change CPU Settings Change Memory Settings Change System Voltages

Device Drivers 356

Now that you successfully installed the operating system, you’ll need to 357

configure the devices such as Video Cards, Network Interface Cards, Sound Cards, 358

etc by installing the device drivers of each. In many cases, if Windows recognizes 359

the device, drivers will be installed automatically. In some cases, generic drivers are 360

installed so that the devices will work properly. 361

Drivers are small software programs that help the operating system use or 362 “drive” the device. Whenever a device doesn’t work properly, ask if the proper driver 363

has been installed. 364

The procedures listed below describe how to obtain and install drivers for 365 hardware devices on a Microsoft Windows 2000-based computer. 366

Step 1: Determine the Hardware Manufacturer 367

If you do not know the manufacturer of the device for which you want to install the 368

driver, follow these steps to determine the manufacturer: 369

370

371

372

373

Page 127: K-12 Module in TLE - ICT Grade 9 [All Gradings]

121

1. On the desktop, right-click My Computer, and then click Manage. 374

375

376 377

Figure 109. Manage My Computer 378

379 2. Under System Tools, click Device Manager. 380

The devices that are installed on the computer are listed in the right pane. 381 382

383

384

385 386 387 388

389 390 391 392 393

394 395 396 397

398 399 400

401 402

Figure 110. Device Manager 403 404

Device Manager

Page 128: K-12 Module in TLE - ICT Grade 9 [All Gradings]

122

3. In the right pane, expand the category of the device that you want to configure. 405

For example, expand Display adapters. 406 407 408

409 410

411 412 413

414 415 416 417 418

419

420 421

422 423 424

425 426

Figure 111. Expanded Device Category 427 428

429 4. Right-click the device for which you want to install the driver, and then 430

click Properties. 431 432

433 434 435 436

437 438 439

440 441

442 443 444 445 446

447 448

449 450 451

Figure 112. Device Properties 452 453

Expanded

Device Category

NOTE: The device may be listed under other devices.

NOTE: The device may appear as Unknown device or as a generic device.

Page 129: K-12 Module in TLE - ICT Grade 9 [All Gradings]

123

5. Click the General tab. Make a note of the manufacturer and model of the 454

device. 455 456

457 458

Figure 113. General Tab 459

460

6. Click Cancel, and then quit Computer Management. 461 462 463

464

465

Step 2: Obtain the Driver 466

To obtain the latest driver, use the following list of possible sources for the 467

driver, in the order in which they are presented. 468

Original Computer Manufacturer 469

If the device was installed by your computer manufacturer, contact the 470

manufacturer of your computer to find out how to obtain, download, and install the 471

latest drivers for the device. 472

Device Manufacturer 473

Contact the manufacturer of the device to inquire about how to obtain, 474

download, and install the latest drivers for the device. 475

NOTE: If the device is not displayed in Device Manager, or the device is listed as an "Unknown device," contact the computer or device manufacturer to obtain more information about the device.

Page 130: K-12 Module in TLE - ICT Grade 9 [All Gradings]

124

Chipset Manufacturer 476

Contact the chipset manufacturer of the device to find out how to obtain, 477

download, and install the latest drivers for the device. It is best to first contact the 478

manufacturer of the device for the drivers before you contact the chipset 479

manufacturer. 480

481

For example, if your display adapter uses a NVIDIA chipset, first contact the 482

manufacturer of the display adapter. If you cannot contact the display adapter 483

manufacturer or if the manufacturer does not have a driver, contact NVIDIA. 484

485

Some examples of chipset manufacturers (and their Web sites) include: 486

NVIDIA (display adapters) 487

PCTEL, Inc. (modems) 488

Installation CD or Floppy Disks 489

If you have the original driver CD or floppy disks that were included with the 490

computer or device, and if no other source for the drivers is available, use the 491

original driver that is included with the computer or device. 492

493

NOTE: Whenever possible, try to first contact the Original Equipment Manufacturer 494

(OEM), device manufacturer, or chipset manufacturer to obtain the latest version of 495

the driver. 496

Step 3: Install the Driver 497

The driver files that you download from the OEM, device manufacturer, or 498

chipset manufacturer differ depending on how the driver is packaged by the 499

manufacturer. 500

If the file is an executable program, run the program to extract the files. If the 501

file is in .zip format, you can use a third-party utility such as WinZip to extract 502

the files. For more information about how to extract the driver files, see the 503

instructions that are provided by the manufacturer of the driver. 504

The driver may use a setup program. The driver package may contain raw 505

driver files, or it may contain only raw driver files. Some examples include .inf 506

files, and .sys files. To install the driver, use one of the following methods 507

as appropriate to your situation. 508 509

510

Driver with a Setup or Installation Program 511

If the driver uses a setup or installation program, run the program to install the 512

driver. For more information about how to do this, see the documentation or contact 513

the driver manufacturer. 514

515

Page 131: K-12 Module in TLE - ICT Grade 9 [All Gradings]

125

Device Is Displayed in Device Manager 516

1. On the desktop, right-click My Computer, and then click Manage. 517

2. Under System Tools, click Device Manager. 518

The devices that are installed on the computer are listed in the right pane. 519

3. Expand the category of the device that you want to configure. For example, 520

expand Modems. 521

NOTE: The device may be listed under Other devices. 522

4. Right-click the device for which you want to install the driver, and then 523

click Properties. 524

NOTE: The device may be displayed as Unknown device, or as a generic 525

device. 526

5. Click the Driver tab, and then click Update Driver. 527

The Upgrade Device Driver wizard starts. 528

6. Click Next. 529

7. Do one of the following: 530

o Click Search for a suitable driver for my device (recommended), and 531

then click Next. 532

-or- 533

o Click Display a list of the known devices for this device so that I can 534

choose a specific driver, and then clickNext. Click Have Disk, 535

click Browse, locate the .inf files that you downloaded in Step 2: Obtain 536

the Driver, click an .inf file, and then click Open. 537

538

8. Follow the wizard instructions to install the driver. 539

9. Restart the computer. 540

541 Device Is Not Displayed in Device Manager 542

543

Use the Add New Hardware wizard in Control Panel to install drivers for non-544

Plug and Play devices. You may have to use this method to install certain modems, 545

serial ports, or printer ports. 546

1. Click Start, point to Settings, and then click Control Panel. 547

2. Double-click Add/Remove Hardware. 548

3. Click Next. 549

4. Click Add/Troubleshoot a device, and then click Next. 550

5. Do one of the following: 551

o Click Yes, search for new hardware, and then click Next. 552

-or- 553

o Click No, I want to select the hardware from a list, and then click Next. 554

6. Follow the wizard instructions to install the driver. 555

7. Restart the computer. 556

557

558

559

Page 132: K-12 Module in TLE - ICT Grade 9 [All Gradings]

126

560 561

Installing Device Drivers 562

Material: Installation CD 563

Direction: Given an installation CD, perform installation of a device driver. 564

Check the quality of your work undertaken in accordance with the established 565

procedures thru the Performance Score Card below. 566

567

PERFORMANCE SCORE CARD 568

Performance Criteria Criteria Grade

1. The system is correctly started. 20%

2. The Installation CD is properly inserted. 20%

3. Handling and safekeeping of installation CD is observed. 20%

4. The instructions how to install device drivers are accurately

followed. 20%

5. The device drivers are successfully installed 20%

PERFORMANCE RATIING

569

570

571

572

573

574

575

576

577

578

579

Page 133: K-12 Module in TLE - ICT Grade 9 [All Gradings]

127

580 581

Lesson3. CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM 582

583

In the previous lesson, you were introduced with all the necessary knowledge 584

and skills on installation of computer devices and operating system. Now, after 585

executing the correct procedures I am sure that installation is a very easy task for 586

you. Those skills will be very essential for the next lesson. 587

In the next phase of your learning it will focus in conducting test on the 588

installed computer components. After reading all the required topics and performing 589

the essential skills you must be able to: 590

Follow OHS policies and procedures in conducting tests; 591

Check circuits and systems being isolated using specified testing procedures; 592

Test devices, systems and/or installation to determine its conformity with the 593

requirements; 594

Undertake final inspections on the installed devices, systems to ensure 595

conformity with the requirements; 596

Accomplish technical reports on the tests conducted; and 597

Follow procedures in forwarding documentation to appropriate personnel and/or 598

authority on the test conducted. 599

600

601

602

603

604

605

TESTING INSTALLED EQUIPMENT / DEVICES (COMPONENTS) 606

607

As computer technician you will need a good understanding of the health and 608

safety regulations from early on in your career, so that you understand the good 609

practices demanded by law. In particular, you need to: 610

report any accidents 611

take reasonable care of your own health and safety when moving 612

heavy components 613

not cause any electrical hazards 614

make sure that workstations meet safety requirements. 615

You need to adhere to health and safety regulations as they will help to protect you 616

and others and will avoid any unnecessary legal action for reckless and unsafe 617

working practices. If you identify any health and safety problems, you should tell your 618

line manager or the health and safety representative immediately. 619

620

Page 134: K-12 Module in TLE - ICT Grade 9 [All Gradings]

128

The most basic test is to switch the system on to check it starts without errors. 621

ICT professionals are also likely to use tools and utilities to check that all is well with 622

the system after an installation. 623

The Use of Diagnostic Tools in testing installed hardware components and 624 other peripherals 625

Diagnostic tools are used to test and diagnose equipment. Diagnostic tools 626

include the following: 627

Digital multimeter is a device that can take many types of measurements. It 628

tests the integrity of circuits and the quality of electricity in computer 629

components. A digital multimeter displays the information on an LCD or LED. 630

631

A loopback adapter, also called a loopback plug, tests the basic functionality 632

of computer ports. The adapter is specific to the port that you want to test. 633

634

The toner probe, is a two-part tool. The toner part is connected to a cable at 635

one end using specific adapters, such as an RJ-45, coaxial, or metal clips. 636

The toner generates a tone that travels the length of the cable. The probe part 637

traces the cable. When the probe is in near proximity to the cable to which the 638

toner is attached, the tone can be heard through a speaker in the probe. 639

640

Figure 114. Diagnostic Tools 641

Software Tools 642

Like hardware tools, there are a variety of software tools that can be used to 643 help technicians pinpoint and troubleshoot problems. Many of these tools are free 644

and several come with the Windows operating system. 645

Disk Management Tools 646

Software tools help diagnose computer and network problems and determine which 647 computer device is not functioning correctly. A technician must be able to use a 648 range of software tools to diagnose problems, maintain hardware, and protect the 649 data stored on a computer. 650

Page 135: K-12 Module in TLE - ICT Grade 9 [All Gradings]

129

You must be able to identify which software to use in different situations. Disk 651

management tools help detect and correct disk errors, prepare a disk for data 652

storage, and remove unwanted files. 653

The following are some disk management tools: 654

FDISK: A command-line tool that creates and deletes partitions on a hard 655

drive. The FDISK tool is not available in Windows XP, Vista, or 7. It has been 656

replaced with the Disk Management tool. 657

Disk Management Tool: Initializes disks, creates partitions, and formats 658

partitions. 659

Format: Prepares a hard drive to store information. 660

ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard 661

drive by scanning the file system. These tools might also check the disk 662

surface for physical errors. 663

Defrag: Optimizes space on a hard drive to allow faster access to programs 664

and data. 665

Disk Cleanup: Clears space on a hard drive by searching for files that can be 666

safely deleted. 667

System File Checker (SFC): A command-line tool that scans the operating 668

system critical files and replaces files that are corrupted. 669

Use the Windows 7 boot disk for troubleshooting and repairing corrupted files. 670

The Windows 7 boot disk repairs Windows system files, restores damaged or lost 671

files, and reinstalls the operating system. 672

Test procedures 673

674

A test procedure is a set of steps to guide you through what needs to be done 675

to thoroughly test the installation. It is designed to help you work more effectively and 676

to make sure you test everything that needs testing. 677

678

Test procedures are created in-house and could include these steps: 679

1. Gathering test information. The first step is to run the tests required by the 680

procedure and find out what happens. You should record all the results of your tests 681

in a log so that you know which pass and which fail, thereby requiring further action. 682

2. Validating the test information. The next step is to check the data you gathered 683

from the tests to make sure it is correct. This is usually done by running the tests 684

again. 685

3. Responding to test information. This step is important because you need to be 686

able to recognize when a test shows problems or is successful. For example, if ping 687

is used to test a network connection then ‘Request timed out’ shows the test was not 688

successful. 689

Page 136: K-12 Module in TLE - ICT Grade 9 [All Gradings]

130

4. Checking specification. The final step is an important end to testing. You need 690

to check the specification for the installation to make sure that it has been met. For 691

example, if a user requested an upgrade to make their display run at 1920 x 1200, 692

then the ICT professionalshould check that the graphics card and screen can do this. 693

694

External Visual Inspection 695

The external visual inspection consists of a quick inspection of the exterior of 696

the computer, the monitor, the keyboard, any peripherals, and cables. While 697

performing the visual inspection, make any necessary corrections. To perform the 698

external visual inspection, perform the following steps: 699

1. Turn off the computer, the monitor, and all peripherals. 700

2. Verify that all power cables are properly connected to the computer, the 701

monitor and peripherals, and their power sources. 702

3. Verify that the keyboard and mouse interface cables are firmly attached to the 703

proper connectors on the back of the computer. 704

For a PS/2-compatible mouse, the keyboard and mouse interface cable 705 connectors are identical except for their labels. 706

For a serial mouse, the mouse interface cable must be firmly attached 707 to one of the serial port connectors, and its captive screws must be 708 secure enough to ensure a firm connection. 709

4. Verify that network cables (if present) are properly attached. 710

5. Verify that any devices attached to the serial and parallel port connectors are 711

properly connected. 712

Each of the serial and parallel port interface cables must be firmly 713

attached to an appropriate connector on the back of the computer as 714

well as to the interface connector on the device. The captive screws 715

that secure these connectors at each end of the interface cable must 716 be secure enough to ensure a firm connection. 717

6. Verify that the video interface cable is firmly attached to the video connector 718

on the back panel or to a video expansion card, and also to the connector on 719

the back of the monitor. For proper connection of the video monitor, see the 720

documentation for the monitor. 721

7. Inspect all external monitor controls for any obvious damage or improper 722

settings. For proper settings of the video monitor controls, see the 723

documentation for the monitor. 724

8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys 725

are sticking, it may be necessary to replace the keyboard. 726

9. Inspect the exterior of the computer, including all controls and indicators, and 727

all user-accessible data storage devices for any signs of physical damage. 728

729

Does the inspection reveal any problems? 730

731

Yes. Proceed to the appropriate procedure in "Removing and Replacing 732

Parts." 733

Page 137: K-12 Module in TLE - ICT Grade 9 [All Gradings]

131

734

No. Proceed to "Observing the Boot Routine." 735

736

Observing the Boot Routine 737

After you have performed an external visual inspection as described in the 738

previous section, you should boot the system and, while the boot routine is running, 739

observe the system for any indications of problems. 740

741

742

To observe problem indications during the boot routine, perform the following steps: 743

1. If the system is off, turn on all peripherals and the computer. 744

2. Check the power supply fan. 745

Does the fan run normally? 746

o Yes. Proceed to step 3. 747

o No. Troubleshoot the system power supply. 748

749

3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the 750

upper-right corner of the keyboard. After all three indicators flash momentarily, 751

and following a long pause (approximately 30 seconds), the Num Lock 752

indicator should light up and remain on (unless the Num Lock option is set 753

to Off in the System Setup program). 754

755

Do these indicators flash on and off within approximately 10 seconds after the 756

boot routine starts? 757

o Yes. Proceed to step 4. 758

o No. Troubleshoot the system power supply. If the troubleshooting 759 procedure indicates that the system power supply is operational, 760 troubleshoot the memory. 761

4. During the boot routine, observe the system for any of the following 762

indications: 763

o Beep codes — A beep code is a series of beeps that indicates an error 764

condition. 765

o System error messages — these messages can indicate problems or 766

provide status information. 767

o Diskette-drive and hard-disk drive access indicators — These 768

indicators light up in response to data being transferred to or from the 769

drives. If either of these indicators fails to light up during the boot 770

NOTE: Most of the steps in this procedure require observation of system functions and indications, some of which can occur simultaneously. It may be necessary to reboot the system several times to complete all of these steps.

Page 138: K-12 Module in TLE - ICT Grade 9 [All Gradings]

132

NOTICE: Before you proceed with the internal visual inspection described in this

section, ensure that the user has saved all open files and exited all open

application programs if possible.

CAUTION: Before beginning to work inside the computer, disconnect the power supply from the power source and the power supply cables from the power supply.

CAUTION: The heat sink assembly can get extremely hot during system

operations. Be sure that it has had sufficient time to cool before

touching it.

CAUTION: When handling the heat sink assembly, take care to avoid

sharp edges on the heat sink.

routine, troubleshoot the diskette drive or hard-disk drive subsystem, 771

as appropriate. 772

5. Observe the monitor screen for the Diagnostics menu. 773

Internal Visual Inspection 774

A simple visual inspection of a computer’s interior hardware can often lead to 775

the source of a problem, such as a loose expansion card, cable connector, or 776

mounting screw. To perform the internal visual inspection, perform the following 777

steps: 778

1. Turn off the system, including any attached peripherals, and disconnect all the 779

AC power cables from electrical outlets. 780

781

2. Remove the computer’s right side cover. 782

3. Verify that the chips, expansion cards, and SEC cartridge and heat sink 783 assembly or assemblies are fully seated in their sockets or connectors. 784

4. To ensure that the chips are fully seated in their sockets, press firmly on the 785

top of each chip. 786

5. Verify that all jumpers are set correctly. 787

6. Check all cable connectors inside the computer to verify that they are firmly 788

attached to their appropriate connectors. 789

7. Reinstall the computer cover. 790

8. Reconnect the computer and any attached peripherals to their power sources, 791

and turn them on. 792

793

Page 139: K-12 Module in TLE - ICT Grade 9 [All Gradings]

133

794

Suppose that you are in the workshop carrying out hardware installations, the 795

owner are very impressed with you. There has been a lot of telephone time spent 796

recently explaining to customers how to test installed components of their computer 797

systems. The shop has decided to create their own video that will be uploaded to the 798

website and YouTube. You have been asked to create this video. 799

800

1. Create a video to demonstrate how to install the hardware components. 801

Make sure you include everything you need to do to work safely. 802

2. Show how to configure any device installed in the computer. 803

3. Create another video on the following: 804

a. Undertake final inspection on the assembled computer system for 805

functionality. This will be to test that the newly installed hardware 806 components work without problems; 807

b. Accomplish technical reports on the tests conducted; and 808

c. Follow procedures in forwarding documentation to appropriate 809 personnel or authority 810

811

812

813

814

815

816

817

818

819

820

821

822

823

824

Page 140: K-12 Module in TLE - ICT Grade 9 [All Gradings]

134

825

826

Test I. Identification 827

Direction: Identify the terms being described in the following sentences. 828

1. These are mobile computers that are very handy to use. 829 2. They are computers designed to provide services to client machines in a 830

computer network. 831

3. They are also called mid-range systems or workstations. 832 4. A computer with a microprocessor and its central processing unit it. 833 5. They fall in the category of laptops, but are inexpensive and relatively smaller in 834

size. 835 6. A type of computer which is intended be used on a single location. 836

7. They use digital circuits and are designed to operate on two states, namely bits 837 0 and 1. 838

8. Computers that have the capacities to host multiple operating systems and 839

operate as a number of virtual machines and can substitute for several small 840

servers. 841 9. It is a handheld computer and popularly known as a palmtop. 842

10. These computers can be worn on the body and are often used in the study of 843 behavior modeling and human health. 844

11. It is considered as the most important program that runs on a computer. 845

12. It is composed of a device that accepts data and instructions from the user or 846 from another computer system. 847

13. Any piece of computer hardware that displays results after the computer has 848 processed the input data that has been entered. 849

14. Any apparatus for recording computer data in a permanent or semi-permanent 850 form. 851

15. It protects a computer network from unauthorized access. 852 16. Type of network that connect larger geographic areas, such as Florida, the 853

United States, or the world. 854 17. This is an internetworking system capable of joining together two networks that 855

use different base protocols. 856 18. It is consists of two or more computers that are linked in order to share 857

resources (such as printers and CD-ROMs), exchange files, or allow electronic 858 communications. 859

19. It is a small, simple, inexpensive device that joins multiple computers together. 860

20. A device filters data traffic at a network boundary. 861 862 863

Test II. True or false 864

Direction: Write TRUE if the statement is correct and FALSE otherwise. 865

1. Always use an anti-static wrist strap when working on a computer (except 866

when working on monitors) 867

Page 141: K-12 Module in TLE - ICT Grade 9 [All Gradings]

135

2. Always disconnect a computer from the AC power and from any powered 868

peripherals while you are working on it. 869

3. Always grasp a metal part of the computer chassis with your bare hand before 870

you touch anything inside. Do this even if you are wearing an anti-static 871

wristband. 872

4. Always handle electronic components by a non-conducting (non-metallic) 873

edge. Don't touch the pins or other connectors. 874

5. Always use a UL-approved surge protector or an Uninterruptible Power 875 Supply that incorporates surge and spike protection 876

6. Never eat, drink, or smoke while working on a computer. 877

7. Whenever you purchase software or hardware for your computer, you should 878 first make sure your computer supports the system requirements. 879

8. The speed of a computer's processor chip (technically known as its "clock 880 speed") in measured in gigahertz (GHz). 881

9. A computer's graphics system determines how well it can work with visual 882 output. 883

10. Today 40GB is an absolute minimum hard drive size for a new computer 884 running Windows 7. 885

11. When attaching cables, never force a connection. 886 12. BIOS instruct the computer on how to perform a number of basic functions 887

such as booting and keyboard control. 888 13. The external visual inspection consists of a quick inspection of the interior of 889

the computer. 890 14. Disk management tools help detect and correct disk errors. 891

15. The most basic test is to switch the system on to check it starts without errors. 892 893

Test III. Multiple Choices 894

Direction: Read each questions carefully and write the letter of the best answer. 895

1. These are small software programs that help the operating system use the 896 device. 897 a. Application 898

b. Driver 899 2. Which of the following is software shared on a small memory chip on the 900

motherboard? 901 a. Installer b. Application

c. Driver d. BIOS

3. It is the way to set up a system or the assortment of components that make up 902 the system. 903

a. Configuration b. Set up

c. Driver d. Installation

4. Which of the following is not a Windows XP minimum requirement? a. 128MB RAM or higher b. CD- ROM or DVD ROM c. Lower resolution monitor d. 4.3 GB hard disk space or more

Page 142: K-12 Module in TLE - ICT Grade 9 [All Gradings]

136

5. If you see a message to press any key to boot the CD and you fail to do so, what do you think will happen?

a. The computer will restart b. Set up inspecting your system will appear c. It will be prompted to BIOS setup d. It will return to boot menu

6. What key should you press if you need to install any third- party or RAID drivers?

a. F2 b. F6

c. F9 d. F12

7. Where do we typically install the operating system? a. Drive C b. DVD c. External Drive d. Floppy Drive

8. Suppose that you will install Windows XP on a system with more than one partition, what important process should be done? a. Change the file system b. Delete the data and files on the different partition c. Examine the partition d. Format the correct partition

9. What file system is usually used during installation? a. FAT b. FAT32 c. NTFS d. NTFS32

10. Which of the following is a connector on the back of a computer or other device?

a. Modem b. Port hub c. Router d. Network Gateway

Page 143: K-12 Module in TLE - ICT Grade 9 [All Gradings]

137

Test IV. Matching Type

Direction: Match column A with Column B and write your answer on a separate

sheet of paper.

A. 1) It serves as the brain of computer. 2) Printed-circuit boards (also called interface

cards) that enable the computer to use a peripheral device

3) Also called read/write memory 4) Small portable disk drive usually used for

backing up files 5) Main board of a computer 6) Also called diskette 7) Acts as a pointing device 8) Device that makes sounds, clips and any

audio materials be heard. 9) Component that reads and record data in

CDs and DVDs. 10) It is a visual device that displays the

information 11) Plug- and play portable storage device 12) Prints text and illustrations in paper 13) Converts AC into DC 14) Allows more than one program to run

concurrently 15) Handheld computer

B. a) Adapter b) CD- ROM c) CPU d) Flash Drive e) Floppy disk f) Microphone g) Monitor h) Motherboard i) Mouse j) Multitasking k) Optical Discs l) PDA m) Power supply n) Printer o) RAM p) Register q) ROM r) Speaker s) Tablet t) Zip Drive

Page 144: K-12 Module in TLE - ICT Grade 9 [All Gradings]

138

SKILLS TEST Direction: Listed below are some of the most important skills that you must gain in

order to render quality service when you enter the real world of Computer Hardware

Servicing. Read the skills carefully. Write “YES” if you are familiar with the skill and “NO” if

not. Feel free to answer each skill. Write your answers in your notebook.

Skills in Computer Hardware Servicing YES NO

I can open a computer case.

I can connect the mouse.

I can connect the keyboard.

I can connect the monitor.

I can apply occupational health and safety precautions while working.

I can remove the system fan.

I can detach the power supply from the system unit.

I know how to remove the RAM from the motherboard.

I can remove the hard drive from the system unit.

I can install the power supply.

I know how to install the motherboard.

I can install the internal drives in a system unit.

I know how to attach RAM in the memory socket.

I can install CD / DVD drives.

I know how to install an operating system

I know how to configure a hardware components

I know the procedures in inspecting operating systems and software components

Page 145: K-12 Module in TLE - ICT Grade 9 [All Gradings]

139

adapters - These are printed-circuit boards that enables the computer to use a

peripheral device for which it does not have the necessary connections or circuit

boards.

Analog Computers- It uses continuous variables for mathematical operations and

utilizes mechanical or electrical energy.

Bridge is a device filters data traffic at a network boundary

Digital Computers- They use digital circuits and are designed to operate on two

states, namely bits 0 and 1

Digital multimeter is a device that can take many types of measurements. It tests

the integrity

Drivers- are small software programs that help the operating system use or “drive”

the device

Ethernet switch is a device that gathers the signals from devices that are connected

to it

hard disk drive- Is a magnetic storage device that is installed inside the computer.

hardware- These are the tangible component of a computer system.

hazard- Is a situation in the workplace that has the potential to harm the health and

safety of people or to damage plant and equipment.

Hub- is a small, simple, inexpensive device that joins multiple computers together

Hybrid Computers- a combination of both digital and analog computers

Loopback adapter- is also called a loopback plug, tests the basic functionality of

computer ports

Mainframe Computers- these are computers have the capacities to host multiple

operating systems and operate as a number of virtual machines and can substitute

for several small servers

Microcomputers- A computer with a microprocessor and its central processing unit

it is known as a microcomputer

Minicomputers- are also called mid-range systems or workstations

Page 146: K-12 Module in TLE - ICT Grade 9 [All Gradings]

140

motherboard- The main circuit board of a computer containing all the essential parts

of a PC.

Network firewall - protects a computer network from unauthorized access

Personal Digital Assistants (PDAs)- is a handheld computer and popularly known

as a palmtop

smart board - Type of display screen that has a touch sensitive transparent panel

covering the screen.

static electricity - An accumulation of electric charge on an insulated body.

Servers- They are computers designed to provide services to client machines in a

computer network

Page 147: K-12 Module in TLE - ICT Grade 9 [All Gradings]

141

ATA- Advance Technology Attachment

BIOS- Basic Input Output System

CD- Compact Disc

CHS- Computer Hardware Servicing

CRT- Cathode Ray Tube

ESD- Electro Static Discharge

DVD- Digital Versatile Disc

FAT- File Allocation Table

GB- Giga Byte

HDD- Hard Disk Drive

LAN- Local Area Networking

LCD- Liquid Crystal Display

LED- Light Emitting Diode

MB- Mega Byte

NTFS- New Technology File System

OHS- Occupational Health and Safety

OS- Operating System

PDA- Personal Digital Assistant

PPE- Personal Protective Equipment

RAM- Random Access Memory

Page 148: K-12 Module in TLE - ICT Grade 9 [All Gradings]

142

ROM- Read Only Memory

SATA- Serial Advance Technology Attachment

USB- Universal Serial Bus

WAN- Wide Area Network

VGA- Video Graphic Array

Page 149: K-12 Module in TLE - ICT Grade 9 [All Gradings]

143

Books and Articles and Printed Materials:

1. Barry Press, Marcia Press, PC Upgrade and Repair Bible,

a. Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint b. Boulevard, Indianapolis, IN 46256

2. Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475

a. Crosspoint Boulevard, Indianapolis, IN 46256

3. Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop

a. Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis,

b. IN 46256

4. K to 12 Basic Education Curriculum- Technology and Livelihood Education

a. Learning Module –Computer Hardware Serviciing- RONALDO V. RAMILO and

b. DEOVER M. PASCO 5. Technology and Livelihood Education- Information and Communications

Technology Learners Manual – Grade 7 & 8 - Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero

Electronic Resources:

1. http://www.buzzle.com/articles/computer-memory-types.html

Computer Memory Types

2. http://www.athropolis.com/popup/c-comp2.htm

Measurements for Memory & Storage

3. http://www.ustudy.in/ce/hard/u1

Fundamentals of PC repair

4. http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20-

%20With%20Oral%20Questioning_0.pdf

Occupational Health and Safety Precautions

5. http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp

Puzzles for Activities

Page 150: K-12 Module in TLE - ICT Grade 9 [All Gradings]

144

6. http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_

v40_Chapter2.pdf

Occupational Safety Precautions

7. http://www.youtube.com/watch?v=6N7bqBsFL0w-

Computer Hardware Basics

8. http://www.wikihow.com/Install-Computer-Hardware-

How to install Computer Hardware

9. http://www.directron.com/howtoupsys.html-

How to install Computer components

10. http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20

10/ProperToolSelection.pdf

Tool Selection

11. http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html

12. http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics

13. www.professormesser.com- PC Hardware, Networking ,Operating Systems and Troubleshooting

Page 151: K-12 Module in TLE - ICT Grade 9 [All Gradings]

144

K to 12 Basic Education Curriculum

Technology and Livelihood Education

Content Standard Performance Standard

The learner demonstrates understanding

of the underlying concepts and principles

on diagnosing and troubleshooting of

computer systems.

The learner independently diagnoses

and troubleshoots computer systems as

prescribed in the TESDA Training

Regulation.

MODULE 4:

DIAGNOSE AND

TROUBLESHOOT COMPUTER

SYSTEMS (DT)

Number of Sessions (Time Allotment): 60 hrs

Republic of the Philippines

DEPARTMENT OF EDUCATION

Page 152: K-12 Module in TLE - ICT Grade 9 [All Gradings]

145

Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under the Information and Communications Technology (ICT) Course. In this module you will have a great deal of diagnosing and troubleshooting computer system. At the end of this module you will be able to plan and prepare for diagnosis of computer system errors, configure, inspect and test computer system networks and errors. Those skills are essential for you to reach the door of National Certification II in Computer Hardware Servicing.

In this module, topics will be introduced progressively lesson by lesson for

easy understanding. After carefully answering the diagnostic assessment, reading all the lessons, answering all the guide questions, masterfully performing all the activities, showing evidences of learning and finally answering the summative test, then you will have a considerable knowledge and skills in diagnosing and troubleshooting computer system essential to be successful in computer hardware servicing as one of the career option in ICT.

Reminder! Just follow the instructions given in this module. Now let us start

exploring new things in this module.

Page 153: K-12 Module in TLE - ICT Grade 9 [All Gradings]

146

In this module, there will be four (4) major topics that you will encounter: (1)

be plan and prepare diagnosis of computer system errors; (2) diagnose and

configure computer systems and networks ; (3) inspect and test the configured

computer systems and networks ; and (4) test systems and networks. The four major

topics contains sub-topics which all leads to diagnose and troubleshoot computer

systems. This module contains what to KNOW, what to PROCESS, what to

REFLECT and UNDERSTAND as well as what to TRANSFER. The competencies

for this module are:

LO 1. Plan and prepare for diagnosis of computer systems errors

Follow OHS procedures in planning and preparing diagnosis of computer systems errors

Determine the computer systems errors using manual and software diagnosis LO 2. Diagnose and configure computer systems and networks

Follow OHS procedures in planning and preparing diagnosis of computer systems and network errors

Identify the diagnosed computer systems and network errors based on the job requirements

Configure computer systems and networks

LO 3. Inspect and test the configured computer systems and networks

Follow OHS procedures in inspecting and testing configured computer systems and networks

Inspect configured computer systems and networks

Replace defective components

Reinstall defective computer systems

Identify networks errors

Repair networks errors based on standard procedures

Test the configured computer systems and networks

LO 4. Test Systems and Networks

Follow OHS procedures in testing systems and networks

Test computer systems and networks in accordance with the job requirements

Accomplish technical reports on the tests conducted

In order to master the above listed competencies, you must be knowledgeable

of the topics under what to KNOW, perform activities required under what to

PROCESS, accomplish additional meaningful tasks under what to REFLECT and

UNDERSTAND and finally show some evidences of your learning by transferring

what you have learned in a different context under what to TRANSFER.

Page 154: K-12 Module in TLE - ICT Grade 9 [All Gradings]

147

You will be challenged to dig deeper into your prior knowledge and previous

experiences about computer hardware servicing.

Instruction:

Read each of the statements in the left-hand column of the chart.

Place a check on the column that indicates your answers. Knowledge

able Have a little Knowledge

No Knowledg

e at All

Plan and prepare work to ensure occupational health and safety (OHS) policies and procedures are followed

Obtain materials, tools, equipment and testing devices needed to on form with job requirements

Interpret work instructions according to job requirements

Obtain computer components/devices/systems and determines its location prior to installation

Install equipment/devices/systems in accordance with job requirements

Check/Test devices/systems and/or installations to determine the conformity to job requirements.

Check computer systems and networks for configuration in accordance with specifications and requirements

Diagnose fault or problem in the computer systems and networks in line with standard operating procedures (SOP)

Configure the identified systems and networks based on specifications and job requirements

Inspect and test configured computer systems and networks in conformity with manufacturer's instructions/manual

Correct/Adjust components or parts of computer systems and networks in accordance with job requirements

Test computer systems and networks to ensure safe operation

Perform scheduled/periodic maintenance in accordance with manufacturer's requirements

Make needed repairs/replacements in accordance with established procedures, when necessary

Document tasks undertaken in accordance with SOP

Clean and clear worksite of all surplus/excess materials in accordance with company SOP

Page 155: K-12 Module in TLE - ICT Grade 9 [All Gradings]

148

LESSON 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEMS

ERRORS

SAFETY PRECAUTIONS

Personal Protective Equipment

Proper preparation is the key to a successful work. Before you begin, make

sure that you have the tools you will need, and secure a clear well-lit workplace.

Gather all the components you’ll be using and unpack them at the same time.

Always keep in mind that personal protection is one of the traits of a good computer

technician.

Types of personal protective devices

1. Anti-static devices

2. Power surge protectors

3. Personal equipment

Anti-static devices

Devices designed to protect the computer from static electricity.

Anti – static wrist strap Anti- static mat

Page 156: K-12 Module in TLE - ICT Grade 9 [All Gradings]

149

Power surge protectors

Devices designed to protect the computer from sudden power surges from

intermittent power sources.

Examples:

1. AVR (Automatic Voltage Regulators)

2. UPS (Uninterrupted Power Supply)

Personal Equipment

Small paint brush

Anti- static bag Anti-static spray

Page 157: K-12 Module in TLE - ICT Grade 9 [All Gradings]

150

Screw drivers

Pliers and tweezers

Compressed air

Handheld vacuum

Directions: Perform the activity below.

Choose a partner

Do a simulation exercise

o One will act out the role of a computer teacher.

o The other will be the student

Situation: Computer teacher will show/demonstrate to the students the

Personal Protective Devices, what they are and how they are used.

The Student keeps on asking about the Personal Protective

Devices/Equipment and how they can be maintained in good condition of PC.

Page 158: K-12 Module in TLE - ICT Grade 9 [All Gradings]

151

Answer the following questions in your own answer/test notebook

1. For somebody who always works (do troubleshooting) with computers, what

personal protective devices do you usually use? How often do you use them?

2. Computers should be protected from static electricity to prevent component

malfunction. What anti-static devices can you utilize to avoid such

malfunction?

TYPES OF COMPUTER SYSTEM ERROR

There are several errors in a computer from the point you open it up to the point you

reach the stand by window (reaching standby windows means boot process has no

error). Here's a list of computer error.

1. No Video Output - When you open your PC, nothing shows up in your monitor and

the LED indicator of your monitor is flashing in yellow color.

2. No Video Output - Same as number one but now the LED indicator of your

monitor is in steady orange color.

3. Doesn't Boot - When you open your PC it will show the processor brand and/or the

motherboard brand but doesn't continue. Usually this error will result to system

restart over and over again.

4. Never Ending Loading of Operating system - The computer opens up then boots

but when the operating system loads it doesn't continue and it will take a lifetime if

you're going to wait for it to load.

5 Lots of pop up windows showing on standby mode - This also happens even if you

try disconnecting your computer set from the internet. This is what we called

aftershock virus which will continue to run even if internet is disconnected.

6. Lots of hardware installation windows appear - This happens even if you try

installing the hardware. When you restart your set it will happen again.

7. Safe mode doesn't work - When you try going to safe mode all you will see is a list

of files in Command prompt style.

Page 159: K-12 Module in TLE - ICT Grade 9 [All Gradings]

152

8. Keyboard and mouse system restart - This will happen only in standby mode,

when you move your mouse or type something, your system will automatically restart

and the worst part is it will delete a file at random.

9. Sound on/off error - Upon loading the operating system, you will hear a loading

sound and then the sound stops, when you try running an audio file, no sound will be

heard.

10. Application causes system to restart - Just like the mouse problem, when you

open a program that will take the whole screen like for example a game and/or a

program applications, when you close it, it will cause your system to restart.

Aside from the common computer errors, computers also can have different

Operating System (OS) errors. OS errors can be classified into various categories,

such as:

1. System errors – These are moderately dangerous types of errors among

those that can pop up on your PC. System errors are caused by

malfunctioning hardware components, corrupted operating system modules,

etc.

2. Runtime errors – Runtime errors are caused by corrupted or malfunctioning

system files or software executables. Most runtime errors cause the

application that caused it to shut down. However, more serious runtime errors

may cause the system to become unstable or unresponsive, leaving you with

no choice but to reach for the Reset button.

3. Stop errors – Stop errors are caused by corrupted hardware, especially

malfunctioning RAM modules and bad sectors on hard disks. Stop errors can

be difficult to resolve at times.

4. Device Manager Errors – These are usually caused by corrupted driver files

or malfunctioning hardware components. In case of the former cause, the

problem is usually solved simply by reinstalling or updating the drivers.

However, the latter cause can often be solved only by replacing hardware

components.

5. POST code errors – POST code errors are caused by malfunctioning

hardware components, and are characterized by short beep sounds from the

tiny internal speaker of your motherboard. POST code errors occur when you

press the power button to turn on your PC..

6. Application errors – These can be caused at any point of time. As the name

suggests, these are caused by applications while those are running. These

are usually caused by glitches in the program code itself. These are usually

resolved by updating the program to its latest version.

7. Browser Status Codes – These are caused by problems faced by browsers

when trying to access a website. These can be caused by misplaced web

pages in the server of the website itself, or due to connection problems. For

Page 160: K-12 Module in TLE - ICT Grade 9 [All Gradings]

153

instance, a 404 error would indicate that the browser is trying to access a

webpage that does not exist in the specified location.

DIAGNOSING COMPUTER SYSTEMS

PC Diagnosing

Probably the most frustrating problem computer users run into

are startup problems, where your computer won’t boot. Equally

annoying are error messages you constantly run into during your

computer’s startup process. In this module you will be given a

few tips on how you can avoid some of the most common

problems that happen right after your computer is turned on.

Here you will learn the basic troubleshooting.

Trial and error: When you find a faulty component in your computer, check it

with the other computers so that you can make sure whether the fault is in the

component or not.

Check cables: In case of any device failure, check all the cables of your

computer such as data cables, power cable, internal circuitry cables and

make sure that all these are plugged in and working fine.

Hardware settings: Check the hardware settings in the CMOS and in the

device manager of the system and make all the device drivers up to date and

all the cards are plugged in properly.

Notice changes: When you notice a software or hardware error in your

computer, determine what was changed before the problem occurred.

Event viewer: In the event viewer, you will find the error or warning

messages associated with any faulty hardware or software.

Make notes: Troubleshooting is a big learning option and we can learn a lot

when we face any kind of troubleshooting in our computer. Make notes

including the error messages and their solutions, so that you have a record on

how a certain problem occurred and how did you solve it.

Common PC Problems and solutions

You are working away at your computer when suddenly, up comes an error

message – or worse, your computer comes to a screeching halt. Here are the

common computer problems and solutions that can help you.

Page 161: K-12 Module in TLE - ICT Grade 9 [All Gradings]

154

Steps

1. Check the POST. POST stands for Power On Self-Test. This is generally the first

or second thing that appears on a computer after turning on the power. This appears

before the operating system begins to load. The POST will display any problems

found with hardware that makes the computer unable to boot, POST may also

display problems with hardware that allow the computer to boot, but not operate at

its full capacity during operation.

2. Notice the load time of the OS (operating system). A longer than usual load

time may indicate errors in the hard drive.

3. Notice any graphics problems once the OS has loaded. Reduced graphics

may indicate driver failures or hardware failures with graphic cards.

4. Perform an auditory test. An auditory test is an unorthodox, but still effective way

of judging how a computer is working. With the computer on and running, play any

decent length audio file (usually above 30 sec). If the audio is choppy or slow, it

usually means that the processor is working at an elevated level, or there is not

enough RAM to run all programs loading. Changing the startup sound is a great way

to apply this test. Another issue associated with choppy sounds is PIO (Programmed

Input/Output) Mode. This affects how the hard drive reads and writes data from a

drive. Switching to Direct Memory Access (DMA) allows for faster reads and writes,

and can sometimes repair choppy audio.

5. Check any newly installed hardware. Many operating systems, especially

Windows, can conflict with new drivers. The driver may be badly written, or it may

conflict with another process. Windows will usually notify you about devices that are

causing a problem, or have a problem. To check this use the Device Manager, this

can be accessed by entering the Control Panel, clicking the System icon, clicking

the Hardware tab, and clicking on Device Manager. Use this to check and arrange

the properties of hardware.

6. Check any newly installed software. Software may require more resources than

the system can provide. Chances are that if a problem begins after software starts,

the software is causing it. If the problem appears directly upon startup, it may be

caused by software that starts automatically on boot.

7. Check RAM and CPU consumption. A common problem is a choppy or sluggish

system. If a system is choppy it is good practice to see if a program is consuming

more resources than the computer can provide. An easy way to check this is

to use the Task Manager, right click on the taskbar select Task Manager, and click

the Processes tab. The CPU column contains a number that indicates the

Page 162: K-12 Module in TLE - ICT Grade 9 [All Gradings]

155

Network

HUB

Network

cable

Network

card

percentage of CPU the process is consuming. The Memory Usage column indicates

how much memory a process is consuming.

8. Listen to the computer, if the hard drive is scratching or making loud noises,

shut off the computer and have a professional diagnose the hard drive. Listen

to the CPU fan, this comes on a high speed when the CPU is working hard, and can

tell you when the computer is working beyond its capacity.

9. Run a virus and malware scan. Performance problems can be caused by

malware on the computer. Running a virus scan can unearth any problems. Use a

commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus)

10. Check for the problem in safe mode. To enter safe mode, tap F8 repeatedly

during POST (this works on most systems). If the problem persists in safe mode, it is

a fair bet that the operating system itself is to blame.

Common Trouble shooting for Computer Units

1. Double check the power connections.

2. Voltage Regulator and power supply could

cause power failure in the computer unit.

3. Check the power cords and cable connectors

in your computer unit.

4. Unseated card. Loose cards could cause

malfunction.

5. Check the boot sequence configuration in the advance BIOS (Basic Input

/Output Unit) setup.

Diagnosing Network Connection

Things to look for if a PC is connected to the internet or network:

First check the cable connecting to the

network card into the network hub.

Check the back of the computer to see if

the network card light is on

Check the network cable ( use cable

tester)

Check the network HUB

(use multi-tester)

Page 163: K-12 Module in TLE - ICT Grade 9 [All Gradings]

156

Identify the following:

1. Moderately dangerous types of errors among those that can pop up on your

PC.

2. Caused by malfunctioning hardware components, and are characterized by

short beep sounds from the tiny internal speaker of your motherboard.

3. Caused at any point of time. As the name suggests, these are caused by

applications while those are running.

4. Usually caused by corrupted driver files or malfunctioning hardware

components.

5. Caused by corrupted or malfunctioning system files or software executables.

6. Caused by corrupted hardware, especially malfunctioning RAM modules and

bad sectors on hard disks.

7. Caused by problems faced by browsers when trying to access a website.

Task: Develop a Sample Diagnostic Plan

List down all possible components to be checked based on the symptoms.

Symptoms: Dead Computer Monitor

Good Defective Remedy

AC outlet

AVR

AVR fuse

Monitor Power Cable

Monitor Switch

Power Supply

Page 164: K-12 Module in TLE - ICT Grade 9 [All Gradings]

157

Diagnosing a Computer Power Supply

Create a diagnostic plan for troubleshooting a power supply with the use of

the following tools, materials and equipment.

You will be assessed using the following criteria

CRITERIA Passed Failed

1. Sequence of steps in diagnosing is followed.

2. Safety precaution is observed.

3. Appropriate tools are used in diagnosing.

4. Diagnostic plan for troubleshooting is created.

PERFORMANCE RATING

Page 165: K-12 Module in TLE - ICT Grade 9 [All Gradings]

158

LESSON 2. DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND

NETWORKS

SAFETY PRECAUTIONS

Occupational Health and Safety (OHS) refers to the legislation, policies,

procedures and activities that aim to protect the health, safety and welfare of all

people at the workplace.

Every worker has a right to healthy and safe work and to a work environment

that enables them to live a socially and economically productive life. Safety practices

should be learned early and always adhered when working with any electrical device

including personal computers and peripherals.

Personal safety while working with PC’s

The following statements are some safety precautions to take before working with

any computer devices:

Before doing anything, listen to your teacher’s instruction to prevent accidents

or any unwanted events that may occur on your workplace.

Do not work on computer when you are wet because you might get

electrocuted.

Do not remove internal devices of the computer when it is turned on.

Avoid playing or running while inside the room.

Always wear personal protective equipments (PPE) like coverall, shoes with

rubber sole, anti-static wrist strap, etc.

Ask for assistance from your teacher when it comes on dealing with computer

devices.

Applying safety measure when handling tools and equipment are necessary

to avoid certain damages.

The student is further expected to maintain good health, to be neat in personal

appearance and to practice safe working procedures at all time with appropriate

equipment.

Page 166: K-12 Module in TLE - ICT Grade 9 [All Gradings]

159

Basic Concepts of Electricity

This lesson will introduce us to the fundamental knowledge of electricity. It will

enable student to be equip with the basic knowledge in electricity.

Basic Electrical Terms

Electricity is define as the flow of electron or electric current. It

is an invisible form of energy that can be transform

into other form of energy like heat light and

mechanical.

Electron is the negatively charge component of an atom. It

has the ability to flow.

Proton is the positively charge component of an atom. It

had the ability to attract electron.

Matter is anything that occupy space and has mass. It can

be a solid, liquid or gas in state.

Atom Basic component of matter. It composes of a

nucleus which is the central part, the protons and

electrons.

Current Same as electricity or flow of electron. The amount

of current flowing in a circuit can be measured in

ampere (I).

Voltage the amount of pulling force that makes the electron

flow. Also known as potential difference or

EMF(electromotive force). The amount of voltage

can be measured in volt (V).

Resistance define as the opposition to the flow of current. The

amount of resistance can be measure in ohms (Ω).

Page 167: K-12 Module in TLE - ICT Grade 9 [All Gradings]

160

Conductors and Insulators

Conductors are materials that easily allow the flow of current, or it has a low

resistance to current flow.

Examples; aluminum, gold, silver, copper, iron

Insulators are materials that do not easily allow the flow of current, or it has a

high resistance to current flow.

Examples; rubber, plastic, paper

Types of Current

1. Direct Current

In direct current (DC), the flow of electric charge is only in one direction. This

is the type of electricity is produced by batteries, static, and lightning. A voltage is

created, and maybe stored, until it is consumed. When the current flows directly, in

one direction. In the circuit, the current flows at a specific, constant voltage (this is

oversimplified somewhat but good enough for our needs.) When you use a flashlight,

pocket radio, portable CD player or virtually any other type of portable or battery-

powered device, you are using direct current.

Most DC circuits are relatively low in voltage; for example, your car's battery is

approximately 12V, and that's about as high a DC voltage as most people ever use.

Figure 1. Direct Current

An ideal 12 V DC current. The voltage is considered positive because its potential is

measured relative to ground or the zero-potential default state of the earth.

Direct currents flow in one direction only, and are constant in time. Their

appearance is that of a straight line which does not vary. They are produced from

power sources such as batteries, power supplies and DC generators. Photovoltaic

devices such as solar cells also generate DC power.

2. AC Alternating Current

Page 168: K-12 Module in TLE - ICT Grade 9 [All Gradings]

161

In alternating current (AC, also ac) the movement of electric charge

periodically reverses direction. This type of electricity is produced or generated by

AC generators commonly from a hydro electric plant. It is the commercial power that

we use in homes and offices. Delivered through a power transmission lines. AC

current can be reduced through the use of power transformer to suite for its

application. It can also be converted to DC for a specific purpose. In the Philippines

AC is rated as 220V AC at 60 Hz.

Alternating currents change direction, flowing first one way and then the other.

They are sinusoidal waves, so that they change in time. They are produced from

sources such as power supplies and AC generators. In North America, AC is 120

volts and 60 hertz or cycles per second. This means it changes direction 60 times

per second. In Europe, it is generally 50 hertz with 220 to 240 volts.

Figure2. Alternating Current

Why does standard electricity come only in the form of alternating current?

There are a number of reasons, but one of the most important is that a characteristic

of AC is that it is relatively easy to change voltages from one level to another using a

transformer, while transformers do not work for DC. This capability allows the

companies that generate and distribute electricity to do it in a more efficient manner,

by transmitting it at high voltage for long lengths, which reduces energy loss due to

the resistance in the transmission wires. Another reason is that it may be easier to

mechanically generate alternating current electricity than direct current.

PC’s use only direct current, which means that the alternating current

provided by your utility must be converted to direct current before use. This is

the primary function of your power supply.

Page 169: K-12 Module in TLE - ICT Grade 9 [All Gradings]

162

Figure 3. Simplified block diagram of a PC power supply

Electric Circuit

Electric circuit - is the pathways for electricity to flow.

Components of Circuit

Load - commonly represented by a bulb or any electrical component that

consumes electricity.

Supply - Commonly represented by a cell or a battery

Switch - an electrical device that opens or closed a circuit.

Figure4. A simple circuit

Types of Circuit

1. Open Circuit - a type of circuit that has an open path for current to flow. It means

that current cannot flow in open circuit.

AC POWER

PC’s PSU DC POWER

MOTHERBOARD

DRIVES

COOLING FANS

Load

Switch

Supply

Page 170: K-12 Module in TLE - ICT Grade 9 [All Gradings]

163

Figure5. An open circuit

The switch is said to be “OPEN” the current can’t flow into the circuit and the

bulb is “OFF”

2. Closed Circuit - a type of circuit that has a closed path for current to flow. It

means that current can flow in a closed circuit.

Figure 6. A closed circuit

The switch is said to be “CLOSED” the current can’t flow into the circuit and

the bulb is “ON”

Load

Switch

Supply

- +

Load

Switch

Supply

- +

Page 171: K-12 Module in TLE - ICT Grade 9 [All Gradings]

164

I. Identification:

Direction: Identify the following statement.

_________1. Define as the flow of electron or electric current. It is an invisible form of

energy that can be transform into other form of energy like heat light and

mechanical.

_________2. The negatively charge component of an atom. It has the ability to flow.

_________3. Define as the opposition to the flow of current. The amount of resistance

can be measure in ohms (Ω).

_________4. The positively charge component of an atom. It has the ability to attract

electron.

_________5. Anything that occupy space and has mass. It can be a solid, liquid or gas

in state.

_________6. Basic component of matter. It composes of a nucleus which is the central

part, the protons and electrons.

_________7. Same as electricity or flow of electron. The amount of current flowing in a

circuit can be measured in ampere (I).

_________8. The amount of pulling force that makes the electron flow. Also known as

potential difference or EMF (electromotive force). The amount of voltage

can be measured in volt (V).

_________9. Materials that easily allow the flow of current, or it has a low resistance to

current flow.

_________10. Materials that do not easily allow the flow of current, or it has a high

resistance to current flow.

_________11. A computer power supply converts AC to ___________________.

_________12. Define as the pathways for electricity to flow.

Page 172: K-12 Module in TLE - ICT Grade 9 [All Gradings]

165

_________13. A component of a circuit that is commonly represented by a bulb or any

electrical component that consumes electricity.

_________14. A component of a circuit that is commonly represented by a cell or a

battery.

_________15. An electrical device that opens or closed a circuit.

_________16. A type of circuit that has a closed path for current to flow. It means that

current can flow in this circuit.

_________17. A type of circuit that has an open path for current to flow. It means that

current cannot flow in this circuit.

_________18. A circuit connection has only one path of current flow. In this circuit

connection the current remain constant.

_________19. A circuit connection that has 2 or more path of current. In this circuit the

voltage remains constant.

_________20. An invisible form of energy.

Techniques for diagnosing computer systems

Computer Diagnosis

Sometimes when the problem with a system is not totally apparent and the

problem may be intermittent, using a basic common diagnostic procedure may help

determine what is wrong. This procedure has a number of steps that, if followed

each time, can be of help.

Rules in Diagnosing Computer System

1. Know the facts

Educate oneself on all aspects and operation of computer parts.

Continuous learning on computer technology. 2. Use your common sense 3. Focus on Field Replaceable Units

Page 173: K-12 Module in TLE - ICT Grade 9 [All Gradings]

166

Identify the different types of FRU that can be used for replacement or sub assembly.

4. Proper assembly and disassembly 5. Factors Causing Computer Failures and Defects

People ware

Untrained personnel would probably damage programs in PC. Firmware

Programs or software burnt in chips may be corrupted. Software

Corrupted operating systems would cause the system to fail. Hardware

Defective hardware components would lead to computer malfunction.

Hardware conflicts and viruses can hinder your computers performance.

ESD (Electro Static Discharge)

Electro static discharge can easily damage sensitive components in your computer. Electricity

Incoming supply from AC outlet must be regulated; power surges can damage

computer units.

Problem Isolation

Problem isolation is a detective work in which you need to determine what is

out of the ordinary by making detailed observation of what is not working normally

and record any information as you proceed. The information you will be able to

gather will help diagnose your computer. You need to observe wisely. Look for any

abnormalities in the unit, any change in smell or foreign smell, listen to all the

sounds, and error codes.

Component Isolation

This section will aid in determining components in your system which are

failing. First, most systems have 3 major components; monitor, system unit, and

printers. Some have multiple external devices. To troubleshoot, you need to isolate

major components which are failing to operate.

Diagnostics Procedure for ATX Power Supply Failure

1. Determine whether or not the power comes on.

Page 174: K-12 Module in TLE - ICT Grade 9 [All Gradings]

167

2. Check the switch operation with a Digital Volt Meter on the continuity or resistance setting.

3. Check the pins if the corresponding voltage are properly regulated to the motherboard.

4. Replace the power supply unit if defective.

ATX Version 1.2 - 20 wire motherboard connector

Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8 Pin 9 Pin 10

3.3V 3.3V Gnd 5V Gnd 5V Gnd P_OK 5VSB 12V

Oran Oran Blk Red Blk Red Blk Gray Purp Yell

Oran Blue Blk Green Blk Blk Blk White Red Red

3.3V -12V Gnd P_ON Gnd Gnd Gnd -5V 5V 5V

Pin 11 Pin 12 Pin 13 Pin 14 Pin 15 Pin 16 Pin 17 Pin 18 Pin 19 Pin 20

Page 175: K-12 Module in TLE - ICT Grade 9 [All Gradings]

168

Flowchart for ATX Power Supply Repair

Warning! You must unplug your ATX power supply from the wall before working inside the case.

ATX Diagnostic chart

Page 176: K-12 Module in TLE - ICT Grade 9 [All Gradings]

169

Things to Consider

There are many devices, parts, cords, and connections on a computer, which

means that there are many possible problems that could arise. In addition, your

computer uses a variety of software, which can also cause problems. However, no

matter what the problem is, you can use the following tips to help you find a

solution:

Always check the cables: Many computer problems are related to an issue in

the cables and connections. The easiest first step you can take to troubleshoot

most problems is to check all related cables and connections.

Isolate the problem: If possible, try to isolate the problem. For example, if you

can't get the cursor to move on the screen, try to determine if the issue is with the

mouse. If you have an extra mouse, you can alternate devices to see if the one

plugged in is the issue, or use the arrow keys on the keyboard to help determine

if the mouse is the source of the problem. When trying to isolate the problem,

only make one change at a time.

Figure 7. An error message

Take notes about error messages: If your computer gives you error

messages, be sure to write down as much information as possible. If the basic

troubleshooting steps don't work, you may need the information.

Remember the steps you've taken, or write them down: Once you start

troubleshooting, you will want to remember what you have done, so you don't

repeat yourself. If you can't remember it, then write it down. If you end up asking

someone for help, it will be much easier if they know exactly which steps you've

taken.

Simple Solutions to Common Problems

Most of the time, problems can be fixed by using simple troubleshooting

techniques, such as closing and re-opening the program. It's important to try these

simple solutions before resorting to more extreme measures. If the problem still isn't

fixed, you can then try other troubleshooting techniques, such as reinstalling the

software.

Page 177: K-12 Module in TLE - ICT Grade 9 [All Gradings]

170

Program Runs Slowly or Isn't Working Right

If a program is running slowly or otherwise isn't working right, the first thing you

should try is closing the program and re-opening it.

You can also shut down your computer, wait a few seconds, and boot it up

again. Some minor problems will work themselves out when you do this.

Check with the company for any known problems or updates to the software.

Figure 8. Checking for updates

Program is Completely Unresponsive

If a program has become completely unresponsive, you can press (and hold)

Control+Alt+Delete on your keyboard to open the Task Manager. You can then

select the program that isn't working and click End Task. If you are using a Mac,

you can press Option+Command+Esc to open a similar dialog box.

Figure 8. The Task Manager

Page 178: K-12 Module in TLE - ICT Grade 9 [All Gradings]

171

Problems Starting or Shutting Down the Computer

Power Button Will Not Start Computer

Figure 9. Resetting a surge protector

If your computer does not start, begin by checking the power cord to confirm

that it is plugged securely into the back of the computer case and the power

outlet.

If it is plugged into an outlet, make sure it is a working outlet. Often, this will

require you to plug a lamp or other electrical device into the outlet to make sure it

is receiving power.

If the computer is plugged into a surge protector, verify that it is turned on. You

may have to reset the surge protector by turning it off and then back on. You can

also plug a lamp or other device into the surge protector to verify that it is on.

If you are using a laptop, the battery may not be charged. Plug the AC adapter

into the wall and then try to turn on the laptop. If it still doesn't start up, you may

need to wait a few minutes and then try again.

"Non-System Disk or Disk Error" Message

If you get this message when you boot up your computer, it usually means

there is a CD, DVD, USB flash drive, or floppy disk in your computer, which is

interfering with your computer's booting process. Remove the disk from the drive

and restart the computer.

Figure 10. The Non-System Disk or Disk Error Message

Page 179: K-12 Module in TLE - ICT Grade 9 [All Gradings]

172

Windows Shutting Down Message Will Not Disappear

Sometimes Windows will freeze during the shutdown process. If this

happens, the Windows is Shutting Down message screen will stay active on

your screen. To finish shutting down the computer, press and hold the power

button for about 10 seconds, or until the computer turns off.

Figure 11. The Windows shutdown screen

Computer Begins Randomly Rebooting or Crashing

Check for overheating. Make sure the vents in the case are not blocked. Confirm

that there is good air flow around the computer.

Update your antivirus software and scan for viruses.

Figure 12. Virus Scanning

Page 180: K-12 Module in TLE - ICT Grade 9 [All Gradings]

173

Problems with the Monitor and Speakers

No Picture on the Monitor

Confirm the computer is turned on.

Check the brightness control, located on your monitor or your keyboard, and

make sure it is not set too low.

Check the connections for the monitor and surge protector, and make sure the

surge protector is turned on.

Figure 13. Cable plugged into monitor

Monitor Goes Blank Periodically

You may have the screensaver enabled.

If the screen saver is enabled, just move

your mouse back and forth and your

original screen will appear. You can

change the screensaver settings by

going to your Control Panel (or your

System Preferences if you're using a

Mac).

Figure 14. Opening the Control Panel

Page 181: K-12 Module in TLE - ICT Grade 9 [All Gradings]

174

No Sound

Figure 15. Adjusting the sound volume on a Mac

Check the volume control on your computer. In Windows, the sound icon will

usually be on the taskbar, and you can also access the sound options in the

Control Panel. On Macs, the sound options are found at the top of the screen or

in System Preferences.

Most media programs (such as iTunes or Windows Media Player) have a

volume control, which will need to be turned up.

Make sure the speakers are turned on, if using external speakers.

Make sure external speakers are connected to the correct audio port or a USB

port. If your computer has color-coded ports, the audio output will usually be

green.

Connect headphones to the correct audio port and determine if sound is audible

from the headphones.

Searching the web for a solution

If you still haven't found a solution to your problem, you may need to ask

someone else for help. Try searching the web for the problem that you're having, as

other people may have had similar problems. Also, if you have a friend or family

member who knows a lot about computers, they may be able to help you.

Keep in mind that most computer problems have simple solutions, although it

may take some time to find them. For very difficult problems, a more drastic

solution may be required, such as reformatting your hard drive, reinstalling

programs, or reinstalling your operating system. If you're not a computer expert, it's

possible that you could make the situation worse, so it's best to consult a

professional if you think a drastic solution is needed.

Page 182: K-12 Module in TLE - ICT Grade 9 [All Gradings]

175

Task. Examining the Motherboard in Detail

1. Look at the back of your computer. Without opening the case, list the ports that

you believe come directly from the motherboard.

2. Remove the cover of the case. List the different expansion cards in the expansion

slots. Was your guess correct about which ports come from the motherboard?

3. To expose the motherboard so you can identify its parts, remove all the

expansion cards.

4. Draw a diagram of the motherboard and label these parts: Processor (Include the

prominent label on the processor housing.)

a) RAM (each DIMM slot)

b) CMOS battery

c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe x16,

and AGP.) Each port coming directly from the motherboard Power supply

connections, SATA or IDE drive connectors and floppy drive connector

5. Draw a rectangle on the diagram to represent each bank of jumpers on the

board.

6. What is the brand and model of the motherboard?

7. Locate the manufacturer’s Web site. If you can find the motherboard manual on

the site, download it.

8. You can complete the following activity only if you have the documentation for the

motherboard:

What do you do if a program on a PC is completely unresponsive? What about

a program on a Mac?

What should you do if you've tried everything and the problem still isn't fixed?

Diagnosing Power Supply Failure

Page 183: K-12 Module in TLE - ICT Grade 9 [All Gradings]

176

Directions: Divide the class into five (5) groups. Choose a leader for each group.

The group will prepares a chart and perform the tasks required by the Diagnostics

Procedure of ATX Power Supply Failure. After the activity they will be graded

through the given Performance Score Card below:

PERFORMANCE SCORE CARD

Performance Criteria Passed Failed

1. The students clearly identified the problem and applied the

possible solution correctly.

2. The students utilized actual tools/device in performing the actual

usage of each tools and OHS was observed.

3. The students applied safety precautions during the Activity.

4. The activity gave students more critical thinking on the personal

protective equipment.

5. The students cooperatively performed the activity.

Page 184: K-12 Module in TLE - ICT Grade 9 [All Gradings]

177

Tools for Testing Computer System

Tools and equipment play vital roles in troubleshooting. They help the user

determine the errors found in their computer hardware and network.

Tools used to test hardware problems:

1. Screw drivers - are used for installing and removing screws in the computer unit.

Figure 16. Screw Drivers

2. Pliers and tweezers - are used for picking small parts in the computer unit.

Figure17. Pliers and Tweezers

3. Soldering iron- is primarily used for connecting terminals in the power supply and circuit board with the use of a soldering lead.

Page 185: K-12 Module in TLE - ICT Grade 9 [All Gradings]

178

Figure18. Soldering iron

4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic

discharge in the work area.

Figure19. Anti- static wrist strap, mat and spray

5. Lens cleaner – a device used for cleaning optical media, such as DVD-ROMS and

CD-writers.

Figure20. Lens Cleaner

6. Thermal paste-is a paste used for heat dissipation of the processor.

Figure21. Thermal Paste

Page 186: K-12 Module in TLE - ICT Grade 9 [All Gradings]

179

Network Troubleshooting Tools

1. LAN Tester – is a device used for testing the network connection.

Figure22. LAN Tester

2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP cable.

Figure23. Crimping Tool

Direction: Answer the following question. Write your answers on your notebook.

.

Enumerate the six tools used for

troubleshooting.

1.

2.

3.

4.

5.

6.

2. Enumerate the two network

troubleshooting tools.

a.

b.

Page 187: K-12 Module in TLE - ICT Grade 9 [All Gradings]

180

Troubleshooting computer system network

Causes of Network Trouble

If a computer is unable to connect to a network or see other computers on a

network, it may be necessary to troubleshoot the network. A network may not work

because of any of the reasons below.

1. Network card not properly connected.

2. Bad network card drivers or software settings.

3. Firewall preventing computers from seeing each other.

4. Connection related issues.

5. Bad network hardware.

Solution

Because of the large variety of network configurations, operating systems,

setup, etc... Not all of the below information may apply to your network or operating

system. If your computer is connected to a company or large network, or you are not

the administrator of the network, it is recommended that if you are unable to resolve

your issues after following the below recommendations that you contact the network

administrator or company representative.

Verify connections / LEDs

Verify that the network cable is properly connected to the back of the

computer. In addition, when checking the connection of the network cable, ensure

that the LEDs on the network are properly illuminated. For example, a network card

with a solid green LED or light usually indicates that the card is either connected or

receiving a signal.

If, however, the card does not have any lights or has orange or red lights, it is

possible that either the card is bad, the card is not connected properly, or that the

card is not receiving a signal from the network.

If you are on a small or local network and have the capability of checking a

hub or switch, verify that the cables are properly connected and that the hub or

switch has power.

Page 188: K-12 Module in TLE - ICT Grade 9 [All Gradings]

181

Adapter resources

Ensure that if this is a new network card being installed into the computer that

the card's resources are properly set and not conflicting with any hardware in the

computer.

Adapter functionality

Verify that the network card is capable of detecting or seeing itself by using

the ping command. Windows / MS-DOS users ping the computer from a MS-DOS

prompt. Unix / Linux variant users ping the computer from the shell.

To ping the card or the local host, type either ping 127.0.0.1 or ping local host

This should show a listing of replies from the network card. If you receive an

error or if the transmission failed, it is likely that either the network card is not

physically installed into the computer correctly, or that the card is bad.

Protocol

Verify that the correct protocols are installed on the computer. Most networks

today will utilize TCP/IP, but may also utilize or require IPX/SPX and NetBEUI.

When the TCP/IP protocol is installed, unless a DNS server or other computer

assigns the IPX address, the user must specify an IP address as well as a Subnet

Mask. To do this, follow the instructions below.

1. Click Start / Settings / Control Panel

2. Double-click the Network icon

3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do

not click on the PPP or Dial-Up adapter, click on the network card adapter.

4. In the TCP/IP properties click the IP address tab

5. Select the option to specify an IP address

6. Enter the IP address and Subnet Mask address, an example of such an

address could be:

IP Address: 102.55.92.1

Subnet Mask: 255.255.255.192

7. When specifying these values, the computers on the network must all have

the same Subnet Mask and have a different IP Address. For example, when using

the above values on one computer you would want to use an IP address of

102.55.92.2 on another computer and then specify the same Subnet Mask.

Firewall

If your computer network utilizes a firewall, ensure that all ports required are

open. If possible, close the firewall software program or disconnect the computer

from the firewall to ensure it is not causing the problem.

Page 189: K-12 Module in TLE - ICT Grade 9 [All Gradings]

182

Additional time

In some cases it may take a computer some additional time to detect or see

the network. If after booting the computer you are unable to see the network, give

the computer 2-3 minutes to detect the network. Windows users may also want to try

pressing the F5 (refresh) key when in Network Neighborhood to refresh the network

connections and possibly detect the network

Additional troubleshooting

If after following or verifying the above recommendations you are still unable to

connect or see the network, attempt one or more of the below recommendations.

If you have installed or are using TCP/IP as your protocol you can ping another

computer's IP address to verify if the computer is able to send and receive data. To

do this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant

users must open or be at a shell.

Once at the prompt assuming, that the address of the computer you wish to

ping is 102.55.92.2, you would type:

ping 102.55.92.2

If you receive a response back from this address (and it is a different

computer), this demonstrates that the computer is communicating over the network.

If you are still unable to connect or see the network, it is possible that other issues

may be present.

Another method of determining network issues is to use the tracert command

if you are a MS-DOS or Windows user or the trace route command if you are a Linux

/ Unix variant user. To use this command you must be at the command prompt or

shell. Or trace route 102.55.92.2

This should begin listing the hops between the computer and network

devices. When the connection fails, determine what device is causing the issue by

reviewing the trace route listing.

Networking with DHCP

Task: Setting up a local area network with a Dynamic Host Control Protocol

(DHCP) server is easy! The DHCP server provides all the information your computer

needs to get up and running on the network. Once connected, you will check

network connectivity with the router and at least one other peer on the network.

Page 190: K-12 Module in TLE - ICT Grade 9 [All Gradings]

183

Procedure

Getting connected

1. Before connecting your PC to the network, be sure the Windows XP operating

system is running on your computer. You will use Windows XP sp2 throughout this

activity.

2. Next, open a terminal window on your computer by clicking on Applications-

>Accessories->Terminal.

3. In the terminal window, type ipconfig and press Enter.

a. How many network devices are listed in the output? Record their names in your

worksheet.

b. Is there an IPv4 address listed for any of the network devices? If so, record your

IP address (es) in your worksheet.

4. Connect your computer to a network switch using a patch cable. Did you get a

light on the switch? Record the port number you connected to in your worksheet.

5. Draw a diagram of the entire local area network in the space below, including the

router, any switches or hubs, and all connected PCs.

6. Run ifconfig again. Do you see an IP address? If so, record it in your worksheet.

7. In the terminal window, type dhclient eth1 and press Enter. Describe what

happens.

Checking your connection

1. Check connectivity with the router with the ping command. Type ping -c4 10.0.1.1

and press Enter. Record the times listed in the last column of the output. What was

the average round trip time (rtt) from your computer to the router and back?

2. Ask another group for their IP address. Check connectivity with that group's

computer with ping. Run ping as shown above, substituting the new IP address for

the one listed in the previous item. Record the times listed in the last column below.

What was the average round trip time (rtt)?

3. When you have completed the activity, shut down your computer and return to

your seat.

Page 191: K-12 Module in TLE - ICT Grade 9 [All Gradings]

184

Title: Networking with Static IPs

Purpose: While setting up a network with a Dynamic Host Control Protocol

(DHCP) server is very convenient, it is sometimes preferable to use static IP

addresses. In this activity, you will join the network using an IP address and netmask

provided by your instructor. Once connected, you will check network connectivity

with at least one other peer on the network.

Procedure

Getting connected

1. Before connecting your PC to the network, be sure the windows Operating

system is running on your computer.

2. When the boot process is completed, connect your computer to the network

switch using a patch cable. Did you get a light? What port number did you connect

to on the switch?

3. Draw a diagram of the entire network in the space below.

4. To configure your network settings, click System->Administration->Network.

5. In the Network settings window, make sure the Connections tab is selected.

6. Click on Wired connection, and then click the Properties button.

7. In the Interface properties window, change the Configuration setting to Static IP

address.

8. Enter the IP address provided by your instructor in the IP address field.

9. Enter 10.0.1.0 in the Gateway address field.

10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to close the

Interface

properties window.

11. Click OK to close the Network settings window.

Checking your connection

1. Open a terminal window on your computer, if one is not already open, by clicking

Applications->Accessories->Terminal.

2. Type ipconfig and press Enter. Are your network setting correct? If not, repeat the

steps 4–11 in the previous section

Page 192: K-12 Module in TLE - ICT Grade 9 [All Gradings]

185

3. Ask another group for their IP address. Check connectivity with that group's

computer with ping. For example, ping -c4 10.0.1.200. Record the times listed in the

last column below. What was the average round trip time?

4. Ask a second group for their IP address. Check connectivity to that group's

computer with ping. Record the times listed in the last column below. What was the

average round trip time?

CRITERIA

Evaluation:

Passed Failed

1. Sequence of steps in diagnosing is followed.

2. Safety precaution are observed.

3. Appropriate tools are used in diagnosing.

4. Diagnostic plan for troubleshooting is created.

Remarks

Page 193: K-12 Module in TLE - ICT Grade 9 [All Gradings]

186

Computer System and Network Configurations

Computer Networks

Networks are collections of computers, software, and hardware that are all

connected to help their users work together. A network connects computers by

means of cabling systems, specialized software, and devices that manage data

traffic. A network enables users to share files and resources, such as printers, as

well as send messages electronically (e-mail) to each other.

The most common networks are Local Area Networks or LANs for short. A

LAN connects computers within a single geographical location, such as one office

building, office suite, or home. By contrast, Wide Area Networks (WANs) span

different cities or even countries, using phone lines or satellite links.

Network System Configuration

All networks go through roughly the same steps in terms of design, rollout,

configuration, and management.

Designing Your Network

Plan on the design phase to take anywhere from one to three working days,

depending on how much help you have ad how big your network is.

Here are the key tasks:

Settle on a peer-to-peer network or a client/server network.

Pick you network system software.

Pick a network language.

Figure out what hardware you need.

Decide on what degree of information security you need.

Choose software and hardware solutions to handle day-to-day management

chores.

Rolling Out Your Network

Rolling out your network requires the following steps:

Run and test network cables.

Page 194: K-12 Module in TLE - ICT Grade 9 [All Gradings]

187

Install the server or servers if you’re setting up a client/server network. (If you are

setting up a peer-to-peer network, you typically don’t have to worry about any

dedicated servers.)

Set up the workstation hardware.

Plug in and cable the Network Interface Cards (NICs – these connect the network

to the LAN).

Install the hub or hubs (if you are using twisted-pair cable).

Install printers.

Load up the server software (the NOS, or Network Operating System) if your

network is a client/server type.

Install the workstation software.

Install modem hardware for remote dial-up (if you want the users to be able to

dial into the network).

Install the programs you want to run (application software).

Configuring Your Network

Network configuration means customizing the network for your own use.

Creating network accounts for your users (names, passwords, and groups).

Creating areas on shared disk drives for users to share data files.

Creating areas on shared disk drives for users to share programs (unless

everyone runs programs from their own computer).

Setting up print queues (the software that lets users share networked printers).

Installing network support on user workstations, so they can "talk" to your

network.

Managing Your Network

The work you do right after your LAN is up and running and configured can save you

huge amounts of time in the coming months.

Mapping your network for easier management and troubleshooting.

Setting up appropriate security measures to protect against accidental and

intentional harm.

Tuning up your LAN so that you get the best possible speed from it.

Creating company standards for adding hardware and software, so you don’t

have nagging compatibility problems later.

Putting backup systems in place so that you have copies of data and programs if

your hardware fails.

Installing some monitoring and diagnostic software so that you can check on your

network’s health and get an early warning of impleading problems.

Figuring out how you plan to handle troubleshooting – educating your LAN

administrator, setting up a support contract with a software vendor, and so on.

Page 195: K-12 Module in TLE - ICT Grade 9 [All Gradings]

188

Smooth Setup

One key advantage of a peer-to-peer network is that it’s easy to setup. With

the simplest sort of peer-to-peer network, you just use the built-in networking that

comes with your operating system (Windows 98, Windows XP, Windows 7,

Windows 8 and so on) and you have very little software to set up – even less if you

have computers that have the operating system preinstalled, as most computers do

these days.

For Windows XP and Windows 7, the basic steps to setting up a peer-to-peer

network are as follows:

(Review for Cabling) UTP Cable

A UTP cable (category 5) is one of the most popular LAN cables. This cable

consists of 4 twisted pairs of metal wires (that means there are 8 wires in the cable).

Adding RJ45 connectors at both ends of the UTP cable it becomes a LAN cable they

usually use.

Preparation

You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Figure24. Materials for Cabling

Making Cable

Follow the steps below.

Page 196: K-12 Module in TLE - ICT Grade 9 [All Gradings]

189

1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this

side A-side).

2. Arrange the metal wires in parallel (refer the each section's wire arrangement

table). Don't remove the shield of each metal line.

3. Insert the metal wires into RJ45 connector on keeping the metal wire

arrangement.

4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.

5. Make the other side of the cable (we call this side B-side) in the same way.

6. After you made it, you don't need to take care of the direction of the cable. (Any

cable in this page is directionless --- that means you can set either end of the

cable to either device.)

How to see the wire arrangement

Take the UTP cable with your left hand and a RJ45 connector with your right

hand. Hold the RJ45 connector in the way you can see the contact metal face of the

RJ45 connector.

The tables below are for the case where the UTP cable consists of

green/green-white, orange/orange-white, blue/blue-white, brown/brown-white twisted

pairs.

10 Base T / 100 Base T Straight

10BaseT and 100BaseT are most common mode of LAN. You can use UTP

category-5 cable for both modes. (You can use UTP category-3 cable for 10BaseT,

in which there are only 3 wires inside the cable.)

A straight cable is used to connect a computer to a hub. You can use it to

connect 2 hubs in the case one of the hubs has an uplink port (and you use normal

port on the other hub).

Page 197: K-12 Module in TLE - ICT Grade 9 [All Gradings]

190

10 Base T / 100 Base T Cross

A cross cable for 10BaseT and 100BaseT is used to connect 2 computers

directly (with ONLY the UTP cable). It is also used when you connect 2 hubs with a

normal port on both hubs. (In other words, the cross cable is used relatively in a rare

case.)

Pin ID side A side B

1 orange-white green-white

2 orange green

3 green-white orange-white

4 blue blue

5 blue-white blue-white

6 green orange

7 brown-white brown-white

8 brown brown

To create a peer network, you must have the following components:

Pin ID side A side B

1 orange-white orange-white

2 orange orange

3 green-white green-white

4 blue blue

5 blue-white blue-white

6 green green

7 brown-white brown-white

8 brown brown

Page 198: K-12 Module in TLE - ICT Grade 9 [All Gradings]

191

• A network interface or Local Area Network (LAN) adapter for each computer. The

same manufacturer and model of network card is preferred.

• Cabling that is supported by the network cards.

• Windows XP or 7 drivers for the network cards.

• A common network protocol.

• A unique computer name for each computer.

Task. Creating Peer to Peer Network

To create a peer network, follow these steps for each computer connected to the

network:

1. Shut down the computer and install the network card and appropriate cabling for

each computer.

2. Start Windows and install the network drivers. Windows may detect your network

card and install the drivers when you start the computer. If the network card drivers

are not included with Windows, follow the manufacturer's instructions about how to

install the network drivers.

3. Choose a client and a common protocol for each computer. To do this, follow

these steps:

a. Click Start, point to Settings, click Control Panel, and then double-click

Network.

b. Click Add, click Client, and then click Add.

c. In the Manufacturers box, click the appropriate manufacturer, click the

appropriate client in the Network Clients box, and then click OK.

d. Click Add, click Protocol, and then click Add.

NOTE: For information about how to configure your network adapters and physically

connect your computers, consult the documentation included with your network adapters

or contact the manufacturer(s) of your network adapters.

Page 199: K-12 Module in TLE - ICT Grade 9 [All Gradings]

192

e. In the Manufacturers box, click the appropriate manufacturer, click the

appropriate protocol in the Network Protocol box, and then click OK.

4. Configure a peer server. Each computer that is configured for File and Printer

Sharing can act as a server. To configure a computer for File and Printer Sharing,

use the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click

Network.

b. Click File and Print Sharing, click one or both options to share files and printers,

click OK, and then click OK again.

c. Click Yes when you are prompted to restart your computer.

1. Give each computer a unique computer name. To do this, use the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click

Network.

b. On the Identification tab, type a unique name in the Computer name box.

c. Click OK, and then click Yes when you are prompted to restart your computer.

:

Task. Setting Windows Network Connection

Equipment, Tools and Materials Required:

- UTP cables

- 4 Computer units

- 1 hub

NOTE: The computer name must be unique for each computer on the network and

should be no more than 15 characters in length. In small networks, the workgroup

name should be the same for each computer so that all computers are visible in the

same workgroup when browsing. You should not use spaces or the following

characters in computer and workgroup names

Page 200: K-12 Module in TLE - ICT Grade 9 [All Gradings]

193

Given the following materials, set-up a network connection on four computers.

Task 2. Using the Internet for Research

In this project, you will learn how useful the Internet can be for a PC support

technician.

1. Using your own or a lab computer pretend that the motherboard manual is not

available and you need to replace a faulty processor. Identify the manufacturer and

model of the mother board by looking for the manufacturer name and model number

stamped on the board. Research the Web site for that manufacturer. Print the list of

processors the board can support.

2 .Research the Web site for your motherboard and print the instructions for flashing

BIOS.

3.Research the Abit Web site (www.abit.com.tw) and print a photograph of a

motherboard that has a riser slot. Also print the photograph of the riser card that fits

this slot. What is the function of the riser card?

More Security for Remote Desktop

Task. Analyze the situations below and answer the questions that follows.

When Jacob travels on company business, he finds it’s a great help to be able to

access his office computer from anywhere on the road using Remote Desktop.

However, he wants to make sure his office computer as well as the entire corporate

network is as safe as possible. One way you can help Jacob add more security is to

CRITERIA 1 2 3 4 5

Safety Precautions are observed.

All the UTP are properly connected to the computer and

hub.

Computers are properly connected and seen in the

network.

Proper boot-up and shutdown of the computer is

observed.

Total:

Page 201: K-12 Module in TLE - ICT Grade 9 [All Gradings]

194

change the port that Remote Desktop uses. Knowledgeable hackers know that

Remote Desktop uses port 3389, but if you change this port to a secret port, hackers

are less likely to find the open port. Search the Microsoft Knowledge Base articles

(support.microsoft.com) for a way to change the port that Remote Desktop uses.

Practice implementing this change by doing the following:

1. Set up Remote Desktop on a computer to be the host computer. Use another computer (the client computer) to create a Remote Desktop session to the host computer. Verify the session works by transferring files in both directions.

2. Next, change the port that Remote Desktop uses on the host computer to a secret port. Print a screen shot showing how you made the change. Use the client computer to create a Remote Desktop session to the host computer using the secret port. Print a screen shot showing how you made the connection using the secret port. Verify the session works by transferring files in both directions.

3. What secret port did you use?

Page 202: K-12 Module in TLE - ICT Grade 9 [All Gradings]

195

Lesson 3. INSPECT AND TEST THE CONFIGURED COMPUTER SYSTEMS AND

NETWORKS

General Safety Tips and Reminders

Observe good housekeeping in the area of the machines during and after

maintenance.

Place removed covers and other parts in a safe place, away from all personnel,

while you are servicing the machine.

Dress for the Job

Keep your tool case away from walk areas so that other people will not trip over

it.

Do not wear loose clothing that can be trapped in the moving parts of a machine.

Ensure that your sleeves are fastened or rolled up above your elbows. If your hair

is long, use hair net or hair cap.

Insert the ends of your necktie or scarf inside clothing or fasten it with a

nonconductive clip, approximately three (3) inches from the end.

Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.

After service, reinstall all safety shields, guards, labels, and ground wires.

Replace any safety device that is worn out or defective.

Finally, reinstall all covers correctly before returning the unit to the customers.

Electrical safety

Electric current from power, telephone, and communication cables can be

hazardous. To avoid personal injury or equipment damage, disconnect the attached

power cords, telecommunications systems, networks and modems before you open

Remember: Metal objects are good conductors

Page 203: K-12 Module in TLE - ICT Grade 9 [All Gradings]

196

the server/workstation covers, unless instructed otherwise in the installation and

configuration procedure.

Precautions

Disconnect all power before:

Performing a mechanical inspection

Working near power supplies

Removing or installing main units

Before starting work on the machine, unplug the power cord.

Never assume that power has been disconnected from a circuit. First, check that

it has been powered-off.

Always look carefully for possible hazards in your work

Moist floors

Non-grounded power extension cables

Power surges.

If an electrical accident occurs:

Switch off power

Send another person to get medical aid

Safety Inspection Guide

1. These steps will help you identify potentially unsafe conditions on electrical

products:

Check exterior covers for damage (loose, broken, or sharp edges)

Power-off computer. Disconnect the power cord.

The power cord should be the appropriate type.

Insulation on the power cord must not be frayed or worn out.

Remove the cover.

Check for any obvious alteration. Use good judgment as to the safety of

any alterations.

Check for worn out, frayed or pinched cables.

Check that the power-supply cover fasteners (screws or rivets) have not

been removed or tampered with.

Accident Reporting Policy and Procedure

There must be a process put in place to report accidents, incidents or near misses

for immediate action and to help track causes. The organization needs to identify what

needs to be reported, to whom it is to be reported, and how to report it, then put this

process into a written procedure.

For example:

Any accident, incident, or "near miss," no matter how slight the injury or damage, must be

reported to the department supervisor immediately for appropriate action.

Page 204: K-12 Module in TLE - ICT Grade 9 [All Gradings]

197

The supervisor is responsible for taking appropriate follow-up action, including getting

medical attention for the injured, completing an investigation report and recommending or

implementing appropriate corrective actions.

The primary purpose of the accident investigation is to identify the cause(s) of the

accident, incident or "near miss" and take action to prevent a similar occurrence in the

future. In some instances, an employee's or volunteer's failure to follow recognized safety

procedures requires disciplinary action to protect co-workers.

Remember: One person's actions can jeopardize the safety of others in the workplace.

Accident Reporting Policy

Sample

Approved by

Chairman:

Date:

1. Purpose [complies with legislation, ensure the necessary action to prevent any

recurrence and to enable the organization to maintain proper records.

2. Scope [accident, incident, near-miss; employee, volunteer, anyone on site or

involved in organization-sponsored activities]

3. Definitions [of terms]

4. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) •\ OSHA,

NIOSH?]

5. Absence resulting from an accident [who to report to, Return-to work]

6. Accident Investigation [who investigates, what to do with resulting

recommendations]

7. Forms [Names, where to find them]

8. Reportable Diseases [communicable diseases listed where?]

Accident Investigation Procedures

The senior staff member available at the accident scene or the first member notified

should complete the appropriate investigation reporting form (accident, incident, near

miss). The completed form should be given to the organization's safety committee,

which will forward a copy of the report to the safety coordinator for review.

When an employee or volunteer is injured:

1. Get the person professional medical attention.

2. Protect others.

3. Minimize property damage.

4. Stabilize the situation.

Page 205: K-12 Module in TLE - ICT Grade 9 [All Gradings]

198

5. Conduct an investigation.

General guidelines for investigating accidents:

Go to the scene of the accident while the facts are fresh.

Inspect and record any changed physical characteristics or conditions of the

accident site

Preserve any physical evidence, such as potentially defective equipment.

Take photos to help preserve the scene (i.e., puddles on the floor, overturned

storage shelves and spilled contents).

Talk to the injured person, if possible.

Talk to any eyewitnesses.

Ask simple open-ended questions, one question at a time, and attempt to have

events related chronologically to ensure thorough coverage.

Distinguish a person's actual knowledge from hearsay.

Ask when, where, who, how, and what was said or done.

Avoid opinions, judgments or conclusions and be as objective as possible. Avoid

commenting on the information gathered except to confirm your understanding or

to clarify.

Stress getting the facts.

Do not comment on liability or fault during the investigation. Listen for clues in the

conversation around you.

Unsolicited comments often have merit.

Review and finalize any notes immediately upon completion of your inspection

and any interview or other communication with those involved.

Fill out the appropriate accident, incident or near-miss form, giving an accurate

account of the facts.

Send the form to the safety coordinator and safety committee for their review.

Accident reports

Forms are used to give specific details with regards to the accidents

happened in the laboratory during experiments.

Accident reports contain the following details:

Name of the person injured

Date and time of the accident

Type of injury

First aid given

Action taken to prevent further accidents

Page 206: K-12 Module in TLE - ICT Grade 9 [All Gradings]

199

Task. Accomplish the sample Accident report sample form

Form No:

Accident Report Form

Date:

Rm. No:

Name: Yr/Sec:

Type of Injury

Cause of Injury

Remedy

Page 207: K-12 Module in TLE - ICT Grade 9 [All Gradings]

200

Replacing different Components

Computer Parts Replacement

When replacing computer parts and peripherals, you need to consider the

following factors:

1. Compatibility of the component or part

2. Consider the component specification

3. Components form factor

Compatibility of the Component

When replacing computer parts you should check if it is compatible with your

unit. Double check on your computer manual if the component you are replacing is

compatible or not with the unit because this may lead to system crash.

Component Specification

This focuses on the specification of the component. Check if the voltage

rating, current rating, memory size and frequency matches your computer unit.

Form factor

The components’ manufacturer should be considered. Check if the unit you

are trying to repair or upgrade is generic or branded units. Branded units have their

own set of components compatible only to their units, while genetic types can be

used only to generic type of units.

List of Components Commonly Replaced in a Computer System

Note: Please refer to the Video for Proper Replacement of the components or parts

of the computer.

Memory-is technically any form of electronic

storage; it is used most often to identify fast,

temporary forms of storage. It is commonly

called RAM (Random Access Memory).

Figure25. Memory

Page 208: K-12 Module in TLE - ICT Grade 9 [All Gradings]

201

Video Cards-also referred to as a graphics

accelerator, is an item of personal computer

hardware whose function is to generate and

output images to a display.

Figure26. Video Card

Network Interface Card – is also known as LAN

card. A PC interface to network cabling. It is a

piece of computer hardware designed to allow

computers to communicate over a computer

network

Figure27. LAN Card

Hard disk drive – is a fixed computer storage

medium

Figure27. LAN Card

Motherboard – is also known as the mainboard. It

contains circuits that perform various functions.

Figure28. Motherboard

Processor – is also known as CPU or the Central

Processing unit

Figure28. CPU

Page 209: K-12 Module in TLE - ICT Grade 9 [All Gradings]

202

CMOS Battery-Refers to a small memory on PC motherboards

that is used to store BIOS settings.

Figure29. CMOS Battery

CD/DVD Drive- A DVD is an optical disc storage media

format, invented and developed

by Philips, Sony, Toshiba and Panasonic in 1995

Figure30. CD/DVD

Sound card - is an internal computer expansion card that facilitates

the input and output of audio signals

Figure31. Sound Card

Directions: Write your answer on your notebook

1. Give the functions of each component.

1. Memory

2. Video card

3. NIC

4. Motherboard

5. HDD

2. Factors to consider when replacing a component.

1._____________________

2._____________________

3._____________________

Page 210: K-12 Module in TLE - ICT Grade 9 [All Gradings]

203

Upgrading Your Computer Components

To upgrade means to change some parts with faster and better performing ones.

These parts may even cost less and more powerful.

Commonly Upgraded Computer Parts

1. Monitors- replace old CRT monitors to new LCD or LED monitors.

2. Optical drives- old CD-ROMs drives are commonly replaced with DVD-ROM and

DVD writers.

Page 211: K-12 Module in TLE - ICT Grade 9 [All Gradings]

204

Hard Drives- small capacity hard drives are replaced with faster and high capacity

hard drives.

Keyboards and mouse- keyboards and mouse are commonly replaced with optical

mouse and wireless keyboards.

RAM (Random Access Memory)- upgrading the computer’s memory or RAM

speeds up the performance of the computer

Page 212: K-12 Module in TLE - ICT Grade 9 [All Gradings]

205

Video cards- upgrade computer’s graphics card to improve the computer

performance in terms of graphics and games.

Processors- replacing the processors increase the data processing speed.

Modem- installing a modem enables your computer to connect to the internet.

Page 213: K-12 Module in TLE - ICT Grade 9 [All Gradings]

206

How to Speed up the Computer

1. Defragmenter utility: Automatically analyzes the empty disk space on the hard

disk and defrag all scattered files.

Figure31. Defragmenter Utility

2. Shutdown Unnecessary programs: Close all unwanted programs at the Windows start up and this will automatically increase the windows loading time and speed of the computer will also be increased.

3. Increased memory: Increasing the memory in the system will result to

exceptional speed of your computer.

Figure32. Increasing the memory

Page 214: K-12 Module in TLE - ICT Grade 9 [All Gradings]

207

4. Disk Cleanup: You can delete unwanted programs and files from your computer

and this will be helpful in increasing the speed.

Figure33. Disk Cleanup

5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you

will get the space of C drive for reusability.

Figure34. Emptying the recycle bin

Memory Upgrade

To make your computer faster, you can upgrade its memory. Here are the

steps in upgrading your computer’s memory

1. Remove the memory modules from the slot.

Figure34. Removing memory module from the slot

Page 215: K-12 Module in TLE - ICT Grade 9 [All Gradings]

208

2. In Fig 35 the notches we have marked as A are

used for the ejector clip on the DIMM slot.

The notches we have marked as B are used to align

the memory module with the DIMM slot key C as

shown in Figure 36.

In Figure 36 you can see the ejector clips (D), using

your finger, push these into the down position as

shown in Figure 36 this allows the memory to be

inserted.

Figure 35. Notch A

Figure 36. DIMM Slot

3. Now you are ready to install the module,

ensuring the notches line up with the keys gently

but firmly push the memory into the slot until it is

seated fully(see Fig 37 the ejector clips should rise

to the vertical position as shown in Fig 38).

4. Now your memory is installed. Be sure you have

not loosened any cables while working and also

ensure that the memory module is fully seated and

the ejector clips are in the vertical position.

Figure 37. Ejector clips

Figure 38. Ejector clips in vertical

position

Video card Upgrade

Installing the video card

Next, take the video card (hold it by the edges) and line it up with the slot

paying careful attention to the alignment notch. When it is aligned correctly, press

gently but firmly until the card is seated fully and evenly into the slot (see fig 39).

Page 216: K-12 Module in TLE - ICT Grade 9 [All Gradings]

209

Figure39. Video card seated fully and evenly on a slot

When you are happy that the card is firmly in place, insert the fixing screw (fig

40) and check to make sure you have not loosened anything during installation.

Replace the case cover and reconnect the mains power.

Figure40. Inserting fixing screw

When you reboot your machine Windows (or other OS) should find the card

automatically, it may then ask you to insert the disk/CD that came with your video

card, insert the CD and follow the on-screen instructions to install the video card

driver.

Hard Drive Upgrade

The first thing to do (after removing the case covers) is to locate the drive bay

where the hard drive will go (see fig 41 below).

Figure41. Locate the drive bay

Page 217: K-12 Module in TLE - ICT Grade 9 [All Gradings]

210

The next step is to attach the IDE and power cables.

In figure 42 below you can see a standard IDE Cable, note there are three (3)

connections (notice the difference in distance between the connectors). Connection

A plugs into the motherboard and then the slave and master connections are used

for IDE devices such as hard drives, if you are only installing one drive or the new

drive is to be the master then use the master connector, if the drive is to be the slave

then use the slave connector.

The IDE cable will be marked down one side with a red or black strip, this

denotes Pin 1, match this with the Pin 1 indicator on the back of the hard drive.

The power cable you will find in your case is attached to your power supply;

you can see an example below in figure 43.

Figure42. Standard IDE Cable Figure43. Power Cable

Page 218: K-12 Module in TLE - ICT Grade 9 [All Gradings]

211

Basic Network Errors

If your network connection is not configured properly or suffers a technical

failure, you will often see some error message generated and displayed on your

screen. These messages give helpful clues to the nature of the issue. Use this list of

the common network-related error messages to help troubleshoot and fix networking

problems.

Network Problem error Messages

Network problem error message 1

Read the message in the box.

Box running software 14.8 and

above:

No network adapter. (N01)

Please make sure that your network

adapter is securely plugged into a USB

port on the back of the box.

Box running software 14.7 and below:

A network adapter was not

detected. (N01)

Please make sure that your network

adapter is securely plugged into a USB

port on the back of the box.

Possible solution for error message 1

Quick

Steps

1. If you have a TiVo Wireless G or N Adapter: Remove the adapter

from the TiVo box for 15 – 60 seconds and reconnect. Then force a

connection to the TiVo service.

2. Try another USB port (when applicable).

3. If these steps have not resolved your issue, see Detailed Steps

below for additional assistance.

Page 219: K-12 Module in TLE - ICT Grade 9 [All Gradings]

212

Network problem error message 2

Read the message in the box.

Box running software 14.8 and above:

Problem with router. (N03)

It might be temporarily out of IP

addresses. Wait a few minutes, and then

try connecting again. If the DHCP server

is part of your home network, try

increasing the number of IP addresses it

can assign.

Box running software 14.7 and below:

The DHCP server was unable to

supply an IP address.(N03)

It might be temporarily out of IP

addresses. Wait a few minutes, and then

try connecting again. If the DHCP server

is part of your home network, try

increasing the number of IP addresses it

can assign.

Possible solution for error message 2

Qu

ick

Ste

ps

1. Power cycle your network, then force a connection to the TiVo

service.

2. Renew the DHCP lease on your router.

NOTE: Please contact your router manufacturer if you are

unsure how to do this.

3. If these steps have not resolved your issue, see Detailed Steps

below for additional assistance.

Network problem error message 3

Read the message in the box:

Box running software 14.8 and above:

Problem with network settings. (N05)

Change your network settings to use a

different (and unused) IP address.

Box running software 14.7 and below:

The specified IP address (<IP Address>) is

already in use by another device on the

network. (N05)

Change your network settings to use a

different (and unused) IP address.

Page 220: K-12 Module in TLE - ICT Grade 9 [All Gradings]

213

Possible solution for error message 3

Network problem error message 4

Read the message in the box:

Box running software 14.8 and above:

Wireless Network Not Found. (N06)

Box running software 14.7 and below:

Could not connect to the wireless network

(<Network Name>). (N06)

Possible solution for error message 4

Qu

ick

Ste

ps

1. Verify your TiVo box has the latest software version to support the

encryption used by your router.

2. Make sure your wireless network is operational and you have

sufficient signal strength where the box is located. See How to

configure network settings on your TiVo box for instructions.

3. Verify you entered the correct the correct name of your network

and/or the correct encryption key or password.

4. Check for possible interference sources nearby, such as

microwave ovens, cordless phones, etc.

5. Power cycle your network devices, then force a connection to the

TiVo service.

6. Move your wireless adapter to improve signal strength.

7. Contact your router manufacturer to determine whether you need

to update your router firmware.

8. If these steps have not resolved your issue, see Detailed Steps

below for additional assistance.

Qu

ick

Ste

ps

1. If the box is using a static IP address, then it will need to be

changed. See How to configure network settings on your TiVo

box for instructions.

2. Power cycle your network devices, then force a connection to the

TiVo service.

3. Renew the DHCP lease on your router.

NOTE: Please contact your router manufacturer if you are

unsure how to do this.

Page 221: K-12 Module in TLE - ICT Grade 9 [All Gradings]

214

Network problem error message 8

Read the message in the box:

Box running software 14.8 and above:

Adapter not set up. (N08)

Select Change network settings to begin

setting up your network adapter.

Box running software 14.7 and below:

Your network adapter has not been set up

for use with the box. (N08)

Select Change network settings to begin

setting up your network adapter.

Possible solution for error message 8

Qu

ick

Ste

ps

1. TiVo Wireless N adapter: Verify that your adapter has been set up

properly. Please see TiVo Wireless N Adapter Setup for instructions.

2. Verify you entered the correct name of your network and/or the

correct encryption key or password.

3. Verify your wireless adapter is compatible with your TiVo box.

4. Try another USB port (when applicable).

5. If these steps have not resolved your issue, see Detailed Steps

below for additional assistance.

Common Network Errors and Solutions

Network Errors Possible Solutions

Network problem is not accessible

Message: "....is not accessible. You may not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. The semaphore timeout period has expired."

1. Make sure no any firewall running. 2. Make sure you have created the same

workgroup, and the same username for logging on a remote computer.

3. Check user's rights. 4. You may want to enable guest account on

windows. 5. if you are using simple file sharing, you may try

to disable it and re-share the drive manually. 6. If it is mixed OS network, enable NetBIOS over

TCP/IP. 7. Make sure the Computer Browser service is

started if all computers are w2k/xp. 8. Stop Computer Browser service on wwin9x, ME

and NT if this is a mixed OS network. 9. Cache credential by using net

use \\computername\share /user:username command (it is better to have the username logon shared computer).

10. If you have tried enabling netbios over tcp/ip but doesn't work, you may try to load netbeui (loading netbeui may slow your network).

11. Make sure the server service is running.

Page 222: K-12 Module in TLE - ICT Grade 9 [All Gradings]

215

12. Still need help, contact consultant at http://hidev.com/contactus.asp for the tech support.

Network problem not available. The server is not configured for transactions"

1. Type command "net share" on the shared computer. If there is not a share named "IPC$" in the share list, use the command "net share ipc$" to create it.

An extended error has occurred" or "Access Denied" Symptoms: When mapping a network drive using net use or using the net view command to view a different computer in the domain, you may receive: "An extended error has occurred" or "Access Denied" error messages.

1. This issue may occur if the workstation doesn't synchronize the time with the server. After verifying that basic network connectivity exists, you can force time synchronization on the client computer manually. To do this, run net time /domain /set command.

2. Make sure you have granted enough licenses for clients accessing.

“Computer name is not accessible. No permission to access the resources"

1. Are you sure the logon user has permission to the shared folder?

2. Have you tried to logon using the same user name and password of the accessed computer?

3. The last and risky one, if you enable guest account in computer, can you access now?

"Multiple connections to the server or shared resource are not allowed"

Symptom: when attempting to join a domain, you may receive "Multiple connections to the server or shared resource are not allowed. Please disconnect all previous connections to the server or shared resource and try again."

1. Try using net use /d from a command to clear all your mapped connections before joining the domain. You can also disconnect the mapped drive in Windows Explorer by right-click the mapped drive and select disconnection.

Page 223: K-12 Module in TLE - ICT Grade 9 [All Gradings]

216

"Network path not found" in a domain network 1

SYMPTOMS: When trying to join a domain by using he NetBIOS domain name, you are successful but not the FQDN and you may receive one of the following error messages: 1) The following error occurred attempting to join domain "example.com": The network location cannot be reached. For information about network troubleshooting, see Windows Help. 2) Network path not found.

1. This issue may occur if the TCP/IP NetBIOS Helper Service is not running on the client computer. To start the TCP/IP NetBIOS Helper Service, go to MMS>Services, double-click TCP/IP NetBIOS Helper Service.

"Network path not found" in a domain network 2

1. You can find some computer browser errors on the DNS server. Disable one of two NICs will work. More resolutions can be found in browser Issue page.

"Network path not found" in a workgroup network - error 53

1. Make sure that File and Printer Sharing is enabled on the shared computer. Make sure that shared machine has something shared.

2. Make sure that you have created the same workgroup and logon the same username Make sure that you have enabled NetBIOS over TCP/IP if this is a mixed OS network.

"Not accessible. You may not have permission to use this network resource"

Symptom: Your peer-to-peer network, may receive the following

1. Enable NetBIOS over TCP/IP on one or more computers in the workgroup. To do that, go to properties of Local Area Connection>properties of Internet Protocol (TCP/IP)>General> Advanced>WINS, check Enable NetBIOS over TCP/IP (If you have a DHCP-assigned IP address, select Use NetBIOS setting from the DHCP server ).

Page 224: K-12 Module in TLE - ICT Grade 9 [All Gradings]

217

error when you double-click My Network Places/Computers Near Me: <Workgroup Name> is not accessible. You may not have permission to use this network resource.

2. Make sure the Computer Browser service is started.

"Not enough server storage is available to process this command." error.

SYMPTOMS: When accessing shares on a server from a client, you may receive "Not enough server storage is available to process this command." error. You may receive this message and Event ID: 2011 after you install Norton Antivirus for Windows.

1. The registry value IRPstackSize may be not explicitly present. To increase the value of the parameter, go to the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ LanmanServer\Parameters. If the key is not present, choose Add Value in the Registry Editor. The Value Name should be IRPStackSize and the Data Type is REG_DWORD.

2. Remove any unnecessary entries from this value in the registry, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionPipes.

3. Disable Norton antivirus to see if that will fix the problem.

"No logon server available"

Symptoms: you can ping the server by ip and name but can't map the shared drive by using net use \\ip or \\servername. If you try, you may receive the "No logon server available".

This sounds like cache credential issue.

1. Make sure the computers in the same network, the same workgroup/domain and have created the same username.

2. Use net use \\servername\sharename password /user: username to cache the credential.

Still need help, contact consultant at http://hidev.com/contactus.asp for the tech support.

1. Disable ICF if you don't need it. 2. Open port # (UDP and TCP) from 135 through 139

and/or 445. to do this, go to the properties of the connection>Advanced>ICF>Settings>Services. For Microsoft file sharing SMB: add (UDP and TCP)

Page 225: K-12 Module in TLE - ICT Grade 9 [All Gradings]

218

"System error 6118 has occurred. The list of servers for this workgroup is not currently available." Symptoms: When using the net view \\computername command, you receive the following error message: System error 6118 has occurred. The list of servers for this workgroup is not currently available.

ports from 135 through 139. For direct-hosted SMB traffic without network basic input/output system (NetBIOS) uses port (TCP and UDP) 445. Note: the external and internal port numbers should be identical.

"The password is incorrect. Try again"

1. You need to setup every user that needs access to the shared folder on every computer they have to connect to. Then give the proper user proper permission to the shared folder.

2. Logon the same user and password. 3. As always, you can try to enable a guest account

on the accessed machine.

"There are no entries on the list"

Symptom: when using net view \\remotecomputer command, you may receive "There are no entries on the list". And you may have a problem to access the remote computer.

1. If there are no file or print shares on the computer, the net view command displays a "There are no entries in the list" message. So, make sure there are file or print shares on the computer. Or to use net share command to check sharing status.

2. Make sure no firewall running because the firewall may block sharing.

"Unable to access Computers near Me" or "Workgroup is not accessible" errors

1. NetBIOS over TCP/IP. To do that, go to the properties of TCP/IP>Advanced>WINS. If you are using a static Internet Protocol (IP) address, click

2. Enable NetBIOS over TCP/IP. If you have a DHCP-assigned IP address, click Use NetBIOS setting from the DHCP server. No Master Browser or too many browsers may cause this issue. Check Browser issue.

Page 226: K-12 Module in TLE - ICT Grade 9 [All Gradings]

219

"Unable to Browse Network"

Symptom: When you attempt to browse your network by opening Entire Network in My Network Places/Network Neighborhood, you may receive the following error message: Unable to Browse Network.

1. Have you loaded the NIC or is it working? 2. Have you loaded common protocol, TCP/IP? 3. Does the Computer browser work? 4. Have you enable file and printer sharing in the

accessed computer? 5. Is the workstation service running?

Page 227: K-12 Module in TLE - ICT Grade 9 [All Gradings]

220

Award BIOS / CMOS Setup

This is the BIOS setup for Award BIOS v6.00PG. If you have a different

version of the Award BIOS there would be a lot of similarities. If your BIOS are AMI

or Phoenix then the common BIOS features would have some similarities. Whatever

BIOS you have, this setup guide should give you an idea about how to setup BIOS.

Please note that setting up BIOS incorrectly could cause system malfunction,

therefore it is recommended that you also follow the BIOS guide provided on your

motherboard manual. If you decide to make changes to certain options it is safer to

make a note of what you have changed. Then restart the system to see how it

performs. If the system behaves abnormally or becomes unstable you can revert

back to your previous settings.

Soft menu III

Soft menu III is where you can setup up the CPU without setting jumpers on

the motherboard. You can setup the CPU simply by selecting the speed i.e. Pentium

III 750 from the list. This ensures that the CPU bus, multiplier, voltage etc, is

correctly set for that particular CPU. However you can manually setup each feature if

required. Once you have finished with the setup press ESC to return the previous

menu.

Figure44. BIOS CMOS Setup Utility

Page 228: K-12 Module in TLE - ICT Grade 9 [All Gradings]

221

Standard CMOS Features

Here you can setup the basic BIOS features such as date, time, type of floppy

etc. Use the arrow keys to move around and press enter to select the required

option. You can specify what IDE devices you have such as Hard drive, CD-ROM,

ZIP drive etc. The easiest way to setup the IDE devices is by leaving it set to auto.

This allows the BIOS to detect the devices automatically so you don't have to do it

manually. At the bottom, it also displays the total memory in your system.

Figure45. Standard CMOS Feature

Advanced BIOS Features

As you can see from figure 3, there are numerous advance settings which you

can select if required. For most cases leaving the default setting should be adequate.

As you can see the first boot device is set to floppy. This ensures that the floppy disk

is read first when the system boots, and therefore can boot from windows boot disk.

The second boot device is the Hard disk and third is set to LS120. If you want to boot

from a bootable CD then you can set the third boot device to CD/DVD-ROM.

Page 229: K-12 Module in TLE - ICT Grade 9 [All Gradings]

222

Advanced Chipset Features

Here you can setup the contents of the chipset buffers. It is closely related to

the hardware and is therefore recommended that you leave the default setting unless

you know what you are doing. Having an incorrect setting can make your system

unstable. If you know that your SDRAM can handle CAS 2, then making changes

can speed up the memory timing. If you have 128MB SDRAM then the maximum

amount of memory the AGP card can use is 128MB.

Figure47. Advance Bios Chipset

Figure46. Advance Bios Feature

Page 230: K-12 Module in TLE - ICT Grade 9 [All Gradings]

223

Integrated Peripherals

This menu allows you to change the various I/O devices such as IDE

controllers, serial ports, parallel port, keyboard etc. You can make changes as

necessary.

Figure48. Integrated Peripherals

Power Management Setup

The power management allows you to setup various power saving features,

when the PC is in standby or suspend mode.

Figure49. Power Management setup

Page 231: K-12 Module in TLE - ICT Grade 9 [All Gradings]

224

PnP/PCI Configurations

This menu allows you to configure your PCI slots. You can assign IRQ's for

various PCI slots. It is recommended that you leave the default settings as it can get

a bit complicated messing around with IRQ's

Figure50. Pnp /PCI Configurations

PC Health Status

This menu displays the current CPU temperature, the fan speeds, voltages

etc. You can set the warning temperature which will trigger an alarm if the CPU

exceeds the specified temperature.

Figure51. PC Health Status

Page 232: K-12 Module in TLE - ICT Grade 9 [All Gradings]

225

Load Fail-Safe Defaults

If you made changes to the BIOS and your system becomes unstable as a

result, you can change it back to default. However if you made many changes and

don't know which one is causing the problem, your best bet is to choose the option

"Load Fail Safe Mode Defaults" from the BIOS menu. This uses a minimal

performance setting, but the system would run in a stable way. From the dialog box

Choose "Y" followed by enter to load Fail-Safe Defaults.

Figure52. Load fail-safe defaults

Load Optimized Defaults

Like the Fail-Safe mode above, this option loads the BIOS default settings,

but runs the system at optimal performance. From the dialog box Choose "Y"

followed by enter to load Optimized Defaults.

Figure53. Load optimized

Set Password

To password protect your BIOS you can specify a password. Make sure you

don't forget the password or you cannot access the BIOS. The only way you can

access the BIOS is by resetting it using the reset jumper on the motherboard.

Figure54. Load optimized

Page 233: K-12 Module in TLE - ICT Grade 9 [All Gradings]

226

Save and Exit Setup

To save any changes you made to the BIOS you must choose this option.

From the dialog box choose "Y".

Figure55. Save to CMOS and EXIT

Exit without Saving

If you don't want to save changes made to the BIOS, choose "N" from the

dialog box.

Figure56. Quit Without Saving

Page 234: K-12 Module in TLE - ICT Grade 9 [All Gradings]

227

Task 1. The BIOS settings in the CMOS memory have become corrupted or

damaged

Task: Check the CMOS battery and replace if needed.

Procedure:

1. Power on your desktop pc and wait for the POST

2. Read the Power on self-test report and do the necessary procedure to solve the

problem.

3. Boot up your pc into BIOS setup.

4. Look for incorrect or changing time settings. A noticeable symptom is an invalid

time showing within the operating system. This symptom is confirmed if time sets

after the computer system is restarted. Under these circumstances, the CMOS

battery should be replaced.

Procedure: On how to replace the CMOS Battery.

1. Locate your CMOS battery

2. Obtain battery information

3. Removing the battery

4. Insert the new battery

5. Enter CMOS values

You will be assessed using the following criteria

CRITERIA Evaluation

Passed Failed

1. Sequence of steps in CMOS diagnosing procedure is

followed.

2. Sequence of steps for replacing CMOS battery is

followed carefully.

3. Safety precaution is observed.

Remarks

Page 235: K-12 Module in TLE - ICT Grade 9 [All Gradings]

228

Practicing TCP/IP Networking Skills

While connected to the Internet or another TCP/IP network, answer these

questions:

1. What is your current IP address?

2. Release and renew your IP address. Now what is your IP address?

3. Are you using dynamic or static IP addressing? How do you know?

4. What is your adapter address for this connection?

5. What is your default gateway IP address?

6. What response do you get when you ping the default gateway?

Task 2. Investigating Verizon FiOS

Verizon (www.verizon.com) is currently offering an alternative to DSL and

cable modem for broadband Internet access. FiOS is a fiber-optic Internet service

that uses fiber-optic cable all the way to your house for both your residential

telephone service and Internet access. Search the Web for answers to these

questions about FiOS:

1. Give a brief description of FiOS and how it is used for Internet access.

2. What downstream and upstream speeds can FiOS support?

3. When using FiOS, does your telephone voice communication share the fiber-optic

cable with Internet data?

4. What does Verizon say about FiOS cabling used for television?

5.Is FiOS available in your area?

Page 236: K-12 Module in TLE - ICT Grade 9 [All Gradings]

229

Hardware Upgrade

Tool, Materials, and Equipment

Tools

Philip Screw Deriver

Anti-static wrist strap

Anti-static mat

Equipment

Network Card

Network Card Upgrade

Given the tools and materials, upgrade your computer by installing a network

card.

You will be assessed using the following criteria

CRITERIA Evaluation

Passed Failed

1. Safety precautions are observed.

2. Appropriate tools are used in upgrading

3. Necessary improvement and adjustment are done in

terms up upgrading.

Remarks

Page 237: K-12 Module in TLE - ICT Grade 9 [All Gradings]

230

LESSON 4: TEST SYSTEMS AND NETWORKS

Testing Computer System

Is your PC healthy? Don't be too sure. Think back to when you heard a

kerklunk sound coming from the hard drive. Or maybe you remember the last time

your Internet connection was down.

The best way to find out what's wrong is to take a proactive approach: Check

under your PC's hood with the following mostly free diagnostic tools, and see if

anything is amiss--before disaster strikes.

Three Major Components of Computer System:

Hardware

Software

Firmware

Test Your Hardware

Checking your computer hardware and its peripherals

1. Computer Monitor and its peripherals

Monitor and interface cables

Video card

Monitor power cable

Interface cables

Page 238: K-12 Module in TLE - ICT Grade 9 [All Gradings]

231

2. Keyboard and Mouse

Keyboard connector

Mouse Connector

3. I/O port and devices

Connection between the I/O port and the peripheral device

A faulty cable between the I/O port and the peripheral device

A faulty peripheral device

Incorrect settings in the System Setup program

Incorrect settings in the system's configuration files

Faulty I/O port logic on the system board

Video cards

Monitor power

cable

Mouse connector

Keyboard connecter

Page 239: K-12 Module in TLE - ICT Grade 9 [All Gradings]

232

4. Power supply

Power cord

Fuse

Serial ports

I/O circuit board

Parallell ports

Power supply

Fuse

Power cord

Power plug

Page 240: K-12 Module in TLE - ICT Grade 9 [All Gradings]

233

Testing Your Software

Check the different software installed in the computer.

1. Operating system

Run live updates for your operating systems to get the latest patches

and protection for your OS.

Run registry scanners to check the OS registry configuration

2. Application Software

Check for live updates

Page 241: K-12 Module in TLE - ICT Grade 9 [All Gradings]

234

3. Anti-virus software

Run anti-virus program

Check for virus signature updates

Check for spyware updates

Test Your Firmware

Firmware- is a combination of hardware and software integrated on a chip.

To test the firmware

Check for the correct configuration can accomplish this by configuring the

BIOS in the computer

Page 242: K-12 Module in TLE - ICT Grade 9 [All Gradings]

235

Sample Accomplishment Report Form

Task to be accomplished

Status

Hardware component testing Working

properly

Not working

properly

Software testing

Status

Working

properly

Not working

properly

Page 243: K-12 Module in TLE - ICT Grade 9 [All Gradings]

236

Error Beep codes

When a PC is first switched on or reset it performs a special diagnostic test

called a POST (Power-On Self Test), to check all components in the PC, the POST

program sends out a signal to each device initializing each device's built-in self test

procedure.

The POST test is a two stage process:

1. First, it will check all the basic components including among other things the

system clock, the processor, RAM, the keyboard

controller and the Video

2. After the video has been tested the BIOS will then

indicate any errors encountered by displaying either a

numeric code or a text message on the screen.

When a device fails the first part of the POST, the BIOS will send a series of

beeps from the PC's speaker (internal) to inform the PC user that there is a problem

these beeps are coded allowing the user to diagnose the troublesome component.

When the POST has been completed successfully, the PC will make a short beep to

let the user know everything is as it should be.

Three (3) major brands of BIOS chip

1. AWARD BIOS

2. Phoenix BIOS

3. AMI BIOS

Page 244: K-12 Module in TLE - ICT Grade 9 [All Gradings]

237

Each type of BIOS chip has it own error code

AMI BIOS ERROR BEEP CODES

Indicator Error message Solution

1 Beep

2 Beeps

3 Beeps

4Beeps

5Beeps

6 Beeps

7 Beeps

8 Beeps

9 Beeps

10 Beeps

Memory refresh failure

Memory parity error

Memory read/write error

Motherboard timer not

functioning

Processor error

Gate A20/keyboard

controller failure

Processor exception

interrupt

Display memory

read/write failure

ROM checksum error

CMOS shutdown

read/write error

Bad cache memory

Check memory

Check memory

Check memory

Replace motherboard

Replace processor

Replace motherboard

Replace processor

Replace video card

Replace BIOS

chip/Motherboard

Replace BIOS

chip/Motherboard

Replace cache memory

Page 245: K-12 Module in TLE - ICT Grade 9 [All Gradings]

238

Phoenix BIOS ERROR BEEP CODES

Phoenix BIOS beep codes are a series of beeps separated by a pause, for

example:

beep --- beep beep --- beep --- beep beep would be 1-2-1-2

Indicator Error message Solution

1-1-4-1

1-2-2-3

1-3-1-1

1-3-1-3

1-3-4-1

1-3-4-3

1-4-1-1

2-1-2-3

Cache error

BIOS ROM Checksum

DRAM test rate

Keyboard controller

test

RAM failure

RAM failure data bits

of low memory bus

RAM failure data bits

of high memory bus

ROM copyright notice

Test for unexpected

interrupt

Check cache memory

Check BIOS ROM

Check DRAM

Check keyboard

controller

Check memory

Check memory

Check memory

Check ROM

Page 246: K-12 Module in TLE - ICT Grade 9 [All Gradings]

239

AWARD BIOS ERROR BEEP CODES

Indicator Error message Solution

One long beep and

two short beeps

Two short beeps

Video error

Non-fatal error

Replace video card

Reset RAM, Check

other components.

Directions: Answer the following questions and place your answers on your

answer sheet.

1. What does the acronym POST stand for?

2. What are the Three Major Brand of BIOS chips

3. Identify the following error codes:

1-2-2-3

1-3-4-1

2-1-2-3

1-1-4-1

1-3-1-1

Page 248: K-12 Module in TLE - ICT Grade 9 [All Gradings]

241

Directions:

Test II. List down at list Five (5) common problem and solution. Use a separate

sheet of paper if needed.

Task 1.Understanding Hardware Documentation

Obtain the manual for the motherboard for your PC. (If you cannot find the manual,

trydownloading it from the motherboard manufacturer’s Web site.) Answer these

questions:

1.What processors does the board support?

2.What type of RAM does the board support?

3.What is the maximum RAM the board can hold?

4.If the board has a PCIe slot, what version of PCIe does the board use?

5.What chipset does the board use?

Task 2. Teaching Yourself About Windows Meeting Space

Using the Windows Help and Support window, Search for information on

Windows Meeting Space. Describe the tool. When would you want to use it? What

can you do with Windows Meeting Space? Set up and test the tool with a friend on a

network connection.

Page 249: K-12 Module in TLE - ICT Grade 9 [All Gradings]

242

Task 1. Testing a Computer Unit

Equipment, Tools, and Materials:

Tools

Multi-tester

Screw driver

Equipment

Computer unit

Monitor

Keyboard and mouse

Power cables

Materials

Bond paper

Ruler and Pencil

Hardware Testing and Documentation

Directions: Test the following computer peripherals and equipment with the use of

the tools provider. Document your testing with the use of an accomplishment form.

Assigned Task

Condition

Hardware component testing Working

properly

Not working

properly

Computer monitor

Power supply

Page 250: K-12 Module in TLE - ICT Grade 9 [All Gradings]

243

Keyboard

Mouse

You will be assessed using the following criteria

CRITERIA

Rating

1. Sequence of steps in testing is followed. 20%

2. Safety precautions are observed. 20%

3. Appropriate tools are used in testing. 30%

4. An accomplishment report is created. 30%

Total

100%

Task 2.Identify Error codes

Equipment, Tools, and Materials:

Tools

Screw drivers

Anti-static wrist strap

Equipment

Computer unit

Memory Error Codes

Page 251: K-12 Module in TLE - ICT Grade 9 [All Gradings]

244

Given the tools and equipment, identify the memory error code by removing the

module in the computer unit

You will be assessed using the following criteria

Evaluation:

CRITERIA

Rating

1. Observance of safety precautions. 30%

2. Appropriate tools are used in testing.

30%

3. Identifying the error code. 40%

Total 100%

Page 252: K-12 Module in TLE - ICT Grade 9 [All Gradings]

245

POST ASSESSMENT

Do the Activity on More Security for Remote Desktop

When Enzo travels on company business, he finds it’s a great help to be able

to access his office computer from anywhere on the road using Remote Desktop.

However, he wants to make sure his office computer as well as the entire corporate

network is as safe as possible.

One way you can help Enzo add more security is to change the port that

Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses

port 3389, but if you change this port to a secret port, hackers are less likely to find

the open port. Search the Microsoft Knowledge Base articles

(support.microsoft.com) for a way to change the port that Remote Desktop uses.

Practice implementing this change by doing the following:

1. Set up Remote Desktop on a computer to be the host computer. Use another

computer (the client computer) to create a Remote Desktop session to the host

computer. Verify the session works by transferring files in both directions.

2. Next, change the port that Remote Desktop uses on the host computer to a secret

port. Print a screen shot showing how you made the change. Use the client

computer to create a Remote Desktop session to the host computer using the secret

port. Print a screen shot showing how you made the connection using the secret

port. Verify the session works by transferring files in both directions.

3. What secret port did you use?

Page 253: K-12 Module in TLE - ICT Grade 9 [All Gradings]

246

Instruction:

Read each of the questions in the left-hand column of the chart.

Place a check on the column that indicate your answers

I Can YES NO

Plan and prepare work to ensure occupational health and safety (OHS) policies and procedures are followed

Obtain materials, tools, equipment and testing devices needed to on form with job requirements

Interpret work instructions according to job requirements

Obtain computer components/devices/systems and determines its location prior to installation

Install equipment/devices/systems in accordance with job requirements

Check/Test devices/systems and/or installations to determine the conformity to job requirements.

Check computer systems and networks for configuration in accordance with specifications and requirements

Diagnose fault or problem in the computer systems and networks in line with standard operating procedures (SOP)

Configure the identified systems and networks based on specifications and job requirements

Inspect and test configured computer systems and networks in conformity with manufacturer's instructions/manual

Correct/Adjust components or parts of computer systems and networks in accordance with job requirements

Test computer systems and networks to ensure safe operation

Perform scheduled/periodic maintenance in accordance with manufacturer's requirements

Make needed repairs/replacements in accordance with established procedures, when necessary

Document tasks undertaken in accordance with SOP

Clean and clear worksite of all surplus/excess materials in accordance with company SOP

Page 254: K-12 Module in TLE - ICT Grade 9 [All Gradings]

247

Summative Test

I. Identify what computer error is illustrated on the following situations.

__________1. The LED indicator of your monitor is in steady orange color.

_________ 2. When you open your PC, nothing shows up in your monitor and the

LED indicator of your monitor is flashing in yellow color.

__________3. When you open your PC it will show the processor brand and/or the

motherboard brand but doesn't continue. Usually this error will result to system

restart over and over again.

__________4.This also happens even if you try disconnecting your computer set

from the internet. This is what we called aftershock virus which will continue to run

even if internet is disconnected.

__________5. The computer opens up then boots but when the operating system

loads it doesn't continue and it will take a lifetime if you're going to wait for it to load.

__________6. This happens even if you try installing the hardware. When you

restart your set it will happen again.

__________7. When you try going to safe mode all you will see is a list of files in

Command prompt style.

__________8. Upon loading he operating system, you will hear a loading sound and

then the sound stops, when you try running an audio file, no sound will be heard

__________9.This will happen only in standby mode, when you move your mouse or

type something, your system will automatically restart and the worst part is it will

delete a file at random.

__________10. Just like the mouse problem, when you open a program that will

take the whole screen like for example a game and/or a program applications, when

you close it, it will cause your system to restart.

Page 255: K-12 Module in TLE - ICT Grade 9 [All Gradings]

248

II. Choose the letter of the best answer:

1) These are moderately dangerous types of errors among those that can pop

up on your PC. System errors are caused by malfunctioning hardware

components, corrupted operating system modules, etc.

a. System error C. Stop errors

b. Runtime errors D. Device managers errors

2) These are caused by corrupted or malfunctioning system files or software

executables. Most runtime errors cause the application that caused it to shut

down. However, more serious runtime errors may cause the system to

become unstable or unresponsive, leaving you with no choice but to reach for

the Reset button.

a. System error C. Stop errors

b. Runtime errors D. Device managers errors

3) These are caused by corrupted hardware, especially malfunctioning RAM

modules and bad sectors on hard disks. Stop errors can be difficult to resolve

at times.

a. System error C. Stop errors

b. A Runtime errors D. Device managers errors

4) These are usually caused by corrupted driver files or malfunctioning hardware

components. In case of the former cause, the problem is usually solved

simply by reinstalling or updating the drivers. However, the latter cause can

often be solved only by replacing hardware components.

a. System error C. Stop errors

b. B. Runtime errors D. Device managers errors

5) These are caused by malfunctioning hardware components, and are

characterized by short beep sounds from the tiny internal speaker of your

motherboard. POST code errors occur when you press the power button to

turn on your PC..

a. System error C. Application errors

b. B. Runtime errors D. Post Code errors

6) These can be caused at any point of time. As the name suggests, these are

caused by applications while those are running. These are usually caused by

glitches in the program code itself. These are usually resolved by updating the

program to its latest version.

a. System error C. Application errors

b. Browser status errors D. Post Code errors

7) These are caused by problems faced by browsers when trying to access a

website. These can be caused by misplaced web pages in the server of the

Page 256: K-12 Module in TLE - ICT Grade 9 [All Gradings]

249

website itself, or due to connection problems. For instance, a 404 error would

indicate that the browser is trying to access a webpage that does not exist in

the specified location.

a. System error C. Application errors

b. Browser status errors D. Post Code errors

8) is define as the flow of electron or electric current. It is an invisible form of

energy that can be transform into other form of energy like heat light and

mechanical.

a. electricity C. Proton

b. atom D. Post Code errors

9) the amount of pulling force that makes the electron flow. Also known as

potential difference or EMF(electromotive force).

a. electricity C. Current

b. resistance D. Voltage

10) a type of circuit that has an open path for current to flow. It means that current

cannot flow in open circuit.

a. Open circuit C. Current circuit

b. resistance D. close circuit

III. Match Column A with Column B

Column A Column B

1. Used for installing and removing screws in the computer unit.

A. Screw drivers

2. Used for picking small parts in the computer unit.

B. Pliers and tweezers

3. Used for eliminating electrostatic discharge in the work area.

C. Soldering iron

4. Primarily used for connecting terminals in the power supply and circuit board with the use of a soldering lead.

D. Lens cleaner

5. It is a paste used for heat dissipation of the processor.

E. Anti-static wrist strap, mat and spray

6. A device used for cleaning optical media, such as DVD-ROMS and CD-writers.

F. Thermal paste

7. A device used to crimp the RJ45 connector to the UTP cable

G. LAN Tester

8. A device used for testing the network connection

H. Crimping tool

I. Systems Tool Box

Page 257: K-12 Module in TLE - ICT Grade 9 [All Gradings]

250

IV. Arrange the following steps in verifying the correct protocols are installed

on the computer.

_____Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not click on the PPP or Dial-Up adapter, click on the network card adapter. _____Select the option to specify an IP address _____Click Start / Settings / Control Panel _____Double-click the Network icon _____In the TCP/IP properties click the IP address tab _____When specifying these values, the computers on the network must all have the same Subnet Mask and have a different IP Address. For example, when using the above values on one computer you would want to use an IP address of 102.55.92.2 on another computer and then specify the same Subnet Mask.

_____Enter the IP address and Subnet Mask address, an example of such an address could be: IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192

V. List down at list Five (5) common computer problems and solutions.

Common Computer Problems Solutions

1.

2.

3.

4.

5.

Page 258: K-12 Module in TLE - ICT Grade 9 [All Gradings]

251

KEY TO CORRECTIONS

Test I

1. No Video Output

2. No Video Output

3. Doesn't Boot

4. Lots of pop up windows showing on standby mode

5. Never Ending Loading of Operating system

6. Lots of hardware installation windows appear

7. Safe mode doesn't work

8. Sound on/off error

9. Keyboard and mouse system restart

10. Application causes system to restart

Test II

1. A

2. B

3. C

4. D

5. D

6. C

7. B

8. A

9. C

10. A

Test III

1. A

2. B

3. E

4. C

5. F

6. D

7. H

8. G

Test IV

3, 5, 1, 2, 4, 7, 6

Test V

Answers may vary

Page 259: K-12 Module in TLE - ICT Grade 9 [All Gradings]

252

GLOSSARY OF TERMS

Computer System - The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes. Configuration - The makeup of a system. To "configure" is to choose options in order to create a custom system. "Configurability" is a system's ability to be changed or customized. Connector - Any plug and socket that links two devices together. Although taken for granted and rarely in the limelight, connectors are a huge industry, and the quality of these components is more critical than most people would imagine. When not designed or constructed properly, they often become the weakest element in an electronic system.

Display Adapter - A plug-in card in a desktop computer that converts the images created in the computer to the electronic signals required by the monitor. It determines the maximum resolution, refresh rate and number of colors that can be displayed, which the monitor must also be able to support. On many PC motherboards, the display adapter circuits are built into the chipset, and an AGP or PCI card is not required. ESD (Electro Static Discharge)- A small amount of static electricity that can destroy small parts of your computer.

Expansion Board - A printed circuit board that plugs into an expansion slot and extends the computer's capability to control a peripheral device. All the boards (cards) that plug into a computer's bus are expansion boards, such as display adapters, disk controllers, network adapters and sound cards.

Expansion Bus - An input/output bus typically comprised of a series of slots on the motherboard. Expansion boards (cards) are plugged into the bus. ISA and PCI are the common expansion buses in a PC. Graphical User Interface - A graphics-based user interface that incorporates movable windows, icons and a mouse. The ability to resize application windows and change style and size of fonts are the significant advantages of a GUI vs. a character-based interface. GUIs have become the standard way users interact with a computer, and the major GUIs are the Windows and Mac interfaces along with Motif for Unix and the GNOME and KDE interfaces for Linux. Motherboard - Also called the "system board," it is the main printed circuit board in an electronic device, which contains sockets that accept additional boards. In a desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP slot, memory sockets and controller circuits for the keyboard, mouse, disks and printer. It may also have built-in controllers for modem, sound, display and network,

Page 260: K-12 Module in TLE - ICT Grade 9 [All Gradings]

253

obviating the need to plug in a card. A laptop motherboard typically has all peripheral controllers built in. Operating System - The master control program that runs the computer. The first program loaded when the computer is turned on, its main part, the "kernel," resides in memory at all times. The operating system sets the standards for all application programs that run in the computer. The applications "talk to" the operating system for all user interface and file management operations. Also called an "executive" or "supervisor," an operating system performs the following functions. Peripheral -Any hardware device connected to a computer, such as a monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse Server - A computer system in a network that is shared by multiple users. Servers come in all sizes from x86-based PCs to IBM mainframes. A server may have a keyboard, monitor and mouse directly attached, or one keyboard, monitor and mouse may connect to any number of servers via a KVM switch. Servers may be also be accessed only through a network connection as well.

Sound Card - Also called a "sound board" or "audio adapter," it is a computer expansion board that records and plays back sound, providing inputs from a microphone or other sound source and outputs to speakers or an external amplifier. The de facto standard for sound card compatibility in PCs is Creative Labs' Sound Blaster. User Interface - All graphics based today, the user interface includes the windows, menus and method of interaction between you and the computer. Prior to the Mac, Windows and Motif (Unix) interfaces, all interaction was based on commands entered by the user. Operating systems may support optional interfaces and allow a new shell, or skin, to be used instead.

Virus - Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.

Page 261: K-12 Module in TLE - ICT Grade 9 [All Gradings]

254

REFERENCES

Books and Articles and Printed Materials:

Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, IN 46256 Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, IN 46256

Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis, IN 46256 Ronaldo V. Ramilo and Deover M. Pasco , K to 12 Basic Education Curriculum- Technology and Livelihood Education Learning Module –Computer Hardware Servicing Jethro Campos , et.al , Competency – Based Learning Materials for Strengthening Technical Vocational Education Program

Electronic Resources:

http://www.buzzle.com/articles/computer-memory-types.html Computer Memory Types

http://www.athropolis.com/popup/c-comp2.htm Measurements for Memory & Storage

http://www.ustudy.in/ce/hard/u1 Fundamentals of PC repair

http://danreb.com/sites/default/files/CHS-NC2%20Reviewer%20-%20With%20Oral%20Questioning_0.pdf Occupational Health and Safety Precautions

http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp Puzzles for Activities

http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_v40_Chapter2.pdf Occupational Safety Precautions

http://www.youtube.com/watch?v=tfKe8PPI2zs&feature=related Conversion of Decimal N umber to Binary

http://www.youtube.com/watch?v=s7M6_VeDhJE&feature=related http://www.youtube.com/watch?v=6N7bqBsFL0w-

Page 262: K-12 Module in TLE - ICT Grade 9 [All Gradings]

255

Computer Hardware Basics

http://www.wikihow.com/Install-Computer-Hardware- How to install Computer Hardware

http://www.directron.com/howtoupsys.html- How to install Computer components

en.wikipedia.org http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20 10/ProperToolSelection.pdf Tool Selection

http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics