Sei sulla pagina 1di 97

COMPETENCY BASED LEARNING MATERIAL

Sector: ELECTRONICS
Qualification Title: C o mp u t e r Systems Servicing N C II
Un it of C o mp e t e n c y : Install a n d Con f i gu re C o m p u t e r S ys t e ms

Module Title: Installing a n d Con fi gu rin g C o mp u t e r S yste ms

D e p a r t me n t o f Ed u c at io n
DIFFUN HIGH SCHOOL
Diffun, Quirino
HOW TO USE THIS MODULE
Welcome to the Module “Installing and Configuring Computer Systems”.
This module contains training materials and activities for you to complete.

The unit of competency “Install and Configure Computer Systems”


contains knowledge, skills and attitudes required for a Computer System Servicing
NC II course.

You are required to go through a series of learning activities in order to


complete each of the learning outcomes of the module. In each learning outcome
there are Information Sheets, Job Sheets, Operation Sheets, and Activity
Sheets. Follow these activities on your own and answer the Self-Check at the end of
each learning activity.

If you have questions, don’t hesitate to ask your facilitator for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module
because you have:
o been wor ki ng for so me t i me
o al r eady h a ve c o m p l e t e d training i n this area.

If you can demonstrate to your teacher that you are competent in a particular
skill or skills, talk to him/her about having them formally recognized so you don’t
have to do the same training again. If you have a qualification or Certificate of
Competency from previous trainings show it to your teacher. If the skills you acquired
are still current and relevant to this module, they may become part of the evidence
you can present for RPL. If you are not sure about the currency of your skills, discuss
it with your teacher.

After completing this module ask your teacher to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 1 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
COMPUTER SYSTEMS SERVICING
COMPETENCY-BASED LEARNING MATERIALS

List of C o mp e t e n c i e s

No. Un i t of C o mp e t e n c y Module Title Code


Install a n d Installing an d
1. Configure Co mp u t e r Configuring C o m p u t e r ELC724331
Systems Systems
S e t -u p C o m p u t e r S et t i ng-u p C o m p u t e r
2. ELC 72 4332
Networks Networks
S e t -u p C o m p u t e r S et t i ng-u p C o m p u t e r
3. ELC 72 4333
Servers Servers
Maint ai n and Repai r Maintaining and
4. C o m p u t e r S ys t e m s R epai ri ng C o m p u t e r ELC 72 4334
and Networks S yst em s and Net works

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 2 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
MODULE CONTENT

UNIT OF COMPETENCY: Install and Configure Computer Systems


MODULETITLE: Installing and Configuring Computer Systems

MODULE DESCRIPTOR:
This module covers the outcomes required in installing and configuring
desktop and workstation computers systems. It consists of competencies to
assemble computer hardware, install operating system and drivers for
peripherals/devices, and install application software as well as to conduct
testing and documentation

NOMINAL DURATION: 10 hours

LEARNING OUTCOME NO. 1

ASSEMBLE COMPUTER HARDWARE


Contents:
1. OH&S policies and procedures
2. Tools, equipment and testing devices
3. Computer hardware
4. Operating system
5. Established installation procedures
6. Peripherals/devices
7. Application software
8. Stress test

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 3 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Assessment Criteria
1. Unit assembly is planned and prepared to ensure Occupational Health
and Safety policies and procedures are followed, the work is
appropriately sequenced in accordance with requirements

2. Appropriate personnel are consulted to ensure the work is coordinated


effectively with others involved on the work site

3. Devices/systems are obtained in accordance with established


procedures and to comply with requirements

4. Location in which devices / systems are to be installed is determined


from job requirements

5. Materials necessary to complete the work are obtained in accordance


with established procedures and checked against job requirements

6. Tools, equipment and testing devices needed to carry out the


installation work are obtained in accordance with established
procedures and checked for correct operation and safety

7. Preparatory work is checked to ensure no unnecessary damage has


occurred and complies with requirements

Conditions
The students/trainees must be provided with the following:

 P C or workst ations

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 4 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
 Instructional M a n u a l s s u c h as: O c cu pat i on al H e a l t h a n d S afet y
policies a n d pro c ed u r e m a n u a l , devi ce m a n u a l a n d h a r d w a r e
d i a g r a m s a n d chart s .

 Tools, equi pm en t ’s a n d test i nst rum ent s s u c h as: prot ective e ye w e a r ,


digital multi-meter, cri mping tools, pliers, screw drivers.

 S up pl i es a n d m a t erials s u c h as: app r opri at e ope rat i n g s y s t e m ,driver


software, soft ware applications a n d program s.

As s es s men t M e t h o d :
1. H a n d s -o n
2. Direct observation
3. Practical dem ons t r at i o n
4. Oral Questi oning

LEARNING OUTCOME NO. 3

INSTALL OPERATING SYSTEM AND DRIVERS FOR PERIPHERALS /DEVICES

Con ten ts :
1. O p e r a t i n g s y s t e m ( O S ) is installed in a c co rd a nc e wi t h e stab l i sh ed
install ati on p r o c e d u r e s a n d to c o m p l y w i t h e n d -user r eq ui r em ent s
2. Pe ri p h e ra l s/ d ev i c es dri ve rs are inst alled a n d c on fi gu r ed i n a c c o r d a n c e
w i t h m a n u f a c t u r e r ’ s i nst ruct ions a n d / o r O S installation pr oc ed ur e s.
3. O S a n d dri ve rs u p d a t e s / p a t c h e s a r e a c c e s s e d a n d install ed i n a c c o r d a n c e
wi t h m anu fact ur er’s r e c o m m e n d a t i o n s a n d requi rem ent s
4. O n -goi n g ch e c ks of the qualit y o f the w o r k are unde rt ake n i n a c co rd a nc e
wi t h established pr o c edu r es

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 5 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
As s es s men t Criteri a
1 . Ins t all at ion p l a n n e d a n d p r e p a r e d t o e n s u r e t hat sa f et y m e a s u r e s ,
policies a n d procedures followed, a n d that w o r k is appropriatel y
s e q u e n c e d i n a c c o r d a n c e w i t h t h e i ndust r y s t a n d a r d s

2. T e ch ni ca l p e r s o n n e l co nsu l t ed t o e ns ur e t hat t he w o r k coor di n at ed


effectively with others involved on the worksite

3. C o m p u t e r s ys t e m s a n d n e t w o r k devi c es obt ai ned i n a c co r da nc e w i t h t he


established p r oc e du r es a n d to c o m p l y w i t h r equi rem ent s

4. Lo cat i on w h e r e devi ces a n d s yst em s t o b e installed is det e rm i ned f r o m


j ob requi rem ents

5. M at eri als necessar y to co m pl et e t he w o r k obt ai ned in acco rdance w i t h


es t abli shed proc e du r es a n d c h e c k e d a gai nst j ob req ui r em ent s

6. Tools, e q u i p m e n t a n d testing de vi c es n e e d e d t o carr y out t he installation


w o r k obt ai ned in ac co rd a nc e wi t h est abl ished p ro c ed u re s a n d c h e c k e d
for correct operation a n d safet y

7. P r e pa r at or y w o rk c h e c k e d t o e n s u r e t hat n o u n n e c e s s a r y d a m a g e h a s
occurr ed a n d that w o r k com p l i es w i t h re qui rem ent s

8. O H & S policies a n d procedures for installing devices/s yst ems are fol l owed

9. D e v i c e s / s ys t e m s a r e installed i n a c c o r d a n c e w i t h r equ i r em ent s, wi t ho ut


d a m a g e or distortion t o t he surroundi ng e nvi ro nm ent o r servi ces

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 6 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
1 0 .Vari at i on to devices / s ys t e m s installation is carri ed o u t i n ac co rd a nc e t o
cu s t om e r/ cl i e nt r e q u i r e m e n t s

1 1 .D e v i c e s / s ys t e m s are t erm i nat ed a n d c o n n e c t e d i n a c c o r d a n c e w i t h


r e q u i r em ent s

1 2 .U n p l a n n e d events or condi ti ons are res pon d ed t o in ac co r da nc e wi t h


es t abli shed p r o c e d ur e s

13.A pp ro va l is obt ained in accordance wi t h established procedures f r o m


appropri ate personnel before a n y contingenci es are i m pl em e nt e d

14.O n -goi n g c h e cks of the qualit y of the w ork are unde rt aken in accordanc e
wi t h established pr o c edu r es

15.O H & S policies and procedures are followed

1 6 .Circuits a n d s ys t em s ar e c h e c k e d a s bei n g isolat ed w h e r e necessa r y


us i ng specifi ed testi ng p r o c e d u r e s

1 7 .Parts or connect i ons of t he installation o r s ervice that are r e m o v e d in


order t o c o n d u c t t h e test ar e st ored t o prot ect agai nst l oss or d a m a g e a n d
in acc o rd an c e w i t h established pr o c edu r e s

1 8 .U n p l a n n e d event s or condi tions are r es pon d ed t o in ac co r da nc e wi t h


es t abli shed p r o c e d ur e s

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 7 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
19.A pp ro va l is obtai ned in ac cordan ce wi th established procedures f r o m
appropri ate personnel before a n y contingenci es are i m pl em e nt e d

2 0 . D e v i c e s / s ys t e m s a n d / o r installation i s t est ed t o d e t e r m i n e w h e t h e r it
co nf o rm s t o requirem ent s

2 1 .Parts, and/ or c on ne ct i on s r e m o v e d fo r t he p u rpos e o f test ing are


ret urned t o pr e -test condi t i ons in a c c o r d a n c e wi t h est abli shed
p ro c edu r es

22. F i n al i ns pe ct i on s a r e u n d e r t a k e n t o e n s u r e t h e i nst al led de v i c e s /


s ys t em s c o n f o r m s to requi rem ent s

2 3 .D o c um e n t a t i o n i n relation t o t he test is f or w a rd ed t o ap pr opriat e


pe rs on ne l a n d / o r aut hori t y i n a c c o r d a n c e w i t h r e q u i r e m e n t s

Con d i ti on s
T h e students/trainees m u s t b e provi ded wi t h t he foll owi ng:

1. C om put er Hardware: Optical disc drives, M e m o r y m odul es


P o w e r suppl y, C abl es an d cords, Mot herboard, H a r d disk, V i d eo card
S o u n d car d
2. Operating systems: Windows, M A C O S X, Linux
3. Utility softwares and C D / D V D -R O M s
4. Books/m anuals/m agaz ines
5. T ool s a n d test equi pm ent :
5.1. Slotted h e a d screwdriver

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 8 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
5.2. Philips h ead screwdriver
5.3. Lo n g nosed pliers
5.4. Allen bit wrench
As s es s men t M e t h o d :
1. H a n d s -o n
2. Direct observation
3. Practical dem ons t r at i o n
4. Oral a n d written e x a m

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 9 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Learning Experience
L earni ng O u t c o me No. 1
ASSEMBLE COMPUTER HARDWARE

L earni ng Activities Sp ecial In stru cti on

1. R e a d Inform ati on S heet 1.1 -1 o n


Occupational Health & Safety (OHS )
Policies a n d Procedures.

2. An s w e r Self-C heck 1.1-1 Co mp are Answers to Answer ke y 1.1-


1
3. R e a d Inform at ion S heet 1.1 -2 on
basic requi rem ent s for a well pl anned
project b ased Installation Service.
4. An s w er Self-C h ec k 1.1-2. Co mp are Answers to Answer ke y 1.1-
2.

7. R e a d Inform ation S h ee t 1.1-3 o n


the fundamentals structures an d
types of Operating S ys t em

8. A n s w e r Self-C heck 1.1-3. Co mp are Answers to Answer ke y 1.1-


3
9. G u i d e d b y Inform ation S heet 1.1- O b serve safety in the workplace.
4, proceed to the tool r o o m a n d d o Trainee/trainer evaluates
Tas k Sheet 1.1-5 o n identifying performance/output using
computer components and pe r fo rm an c e checkli st 1.1 -4 a n d
periph erals m a k e s reco m m e n d a t i o n s .

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 10 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
11. R e a d Inform at ion S he et 1 .1-5 o n
the t ypes an d functions of different
tools a n d equi pm ent .

12. A n s w e r Self-C heck 1.1-5 Co mp are Answers to Answer key 1.1-


5

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 11 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
INFORMATION SHEET NO. 1.1-1
OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES

LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing,
installing and testing of computer hardware and software.

2. Determine the effects of computers to the people, health risk, and to the
environment.

During installation and initial test, careful planning and preparation are
to be done. To avoid personal injury and damages to wiring due to sharp pins on
connectors and printed circuit assemblies, rough chassis edges and corners, and
hot components.
Adhere to warnings and limitations regarding accessibility into areas
designated only for authorized technical personnel.
CONCEPT DEVELOPMENT:
SOME BASIC PRECAUTIONS AND PROCEDURES:
  B e f o r e st art i n g t h e i nst al l at i on, r e a d c a r e f u l l y t h e d o c u m e n t a t i o n a n d
procedures on any hardware and software settings that may be required.
  Failure to d o the proper jumper setting m a y cause da m a ge to your C P U .
  Without an effective cooling fan, the C P U can overheat and cause dam age
to both CPU and the motherboard.
  Each bank must have the sam e size and type of m e m o r y installed in pairs.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 12 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
  Before adding and removing an y other system components, m ake sure that
yo u unplug your po wer suppl y. Failure to do so m a y cause d a m a ge to your
m o t h e r b o a r d a n d i n t he s ys t e m c o m p o n e n t .
  T e s t t h e c o m p u t e r , i n s u r i n g t h a t it m e e t s t h e n e c e s s a r y s y s t e m
requi rem ents before booti ng up.
  If t he c o m p u t e r d o e s not p ass a n y of t he p o w e r o n self-test ( P O S T ) , t he
c o m p u t e r will recei ve a n irregular p o w e r o n self-test. A n irregular P O S T
is a b e e p c o d e w h i c h is different f r o m t he st andard b e e p w h i c h ca n either
b e n o beeps at all or a com binat ion o f different beeps.

EFFECTS OF COMPUTERS
S o m e effects of comput ers relating to the violation of privacy, the i m pact o n
t he l abor force, he al t h risks, a n d t he i m p a c t o n t he envi ro nm ent .

1. Vi ol ati on of Pr i v a c y
Ne a rl y eve r y life ev ent is stored i n a c o m p u t e r s o m e w h e r e --in m edi ca l records,
credit reports, tax records, etc. It is crucial that personal a n d confidential records
b e protected properly. In m a n y instances, w h er e these records w e r e not properl y
protected, individuals h a v e fo und their privac y viol ated an d identities stolen.
2. I mp a c t o n L a b o r Fo r ce
A l t h o u g h c o m p u t e r s h a v e i m p r o v e d productivit y i n m a n y w a ys a n d c re at ed a n
entire industr y wi t h hundreds o f t housands of n e w jobs, t he skills of millions o f
wo rk e rs a n d m a n a ge r s hav e b e e n repl aced b y com put ers. Thu s, it is crucial that
workers k e ep their educati on u p -to-date. A separate i m p a ct on the labor force is
that s om e com pani es are outsourcing jobs to foreign countries instead of keeping
their hom el and labor force em plo yed.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 13 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of
the hands, wrists, elbows, eyes, necks, and back. Computer users can protect
themselves from these health risks through proper workplace design, good
posture while at the computer, and appropriately spaced work breaks. Another
health risk, called computer addiction, occurs when someone becomes obsessed
with using the computer. Once recognized, computer addiction is a treatable
disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information.
Some of these unsuspecting, innocent computer users have fallen victim to
crimes committed by dangerous strangers. Protect yourself and your dependents
from these criminals by being cautious. For example, do not share information
that would allow others to identify or locate you.
5. Impact on Environment
Computer manufacturing processes and computer waste are depleting
natural resources and polluting the environment. The amount of resources
required to manufacture a personal computer equals that of a mid-sized
car. When computers are discarded in landfills, they release toxic materials and
potentially dangerous levels of lead, mercury, and flame retardants. Strategies
that can help protect the environment include recycling, regulating
manufacturing processes, extending the life of computers, and immediately
donating replaced computers

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 14 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
SELF-CHECK NO. 1.1-1
A. IDENTFICATION
Direction: Identify the Precautions a n d Procedures write T R U E if the
statem ent is correct a n d F A L S E if the statem ent is wron g.

1. Fail ure t o d o t he pr op e r j u m p e r setting m a y c a u s e d a m a g e t o yo u r


CPU.
2. Aft er add i n g a n d r e m o v i n g a n y other s ys t e m c om pon e nt s , m a k e
sure that yo u u n p l u g yo u r p o w e r suppl y.
3 . T e s t t h e c o m p u t e r , i n s u r i n g t hat it m e e t s t h e n e c e s s a r y s ys t e m
requi rem ents before booti ng up.
4. W i t h an effective cooling fan, the C P U c an overheat a n d cause
d a m a g e to bot h C P U a n d t he m ot herboard.
5. Aft er starting t he installation, rea d car efull y t he d o c u m e n t a t i o n
a n d pro ce du r es o n a n y h a r d w a r e a n d so f t w ar e s ettings that m a y
be required.

B. MATCHING TYPE

Direction: Select yo u r answer o n the choi ces b el ow that will correspond o n


the stat ement. W r i t e t he letter of yo u r a n s w e r o n the spa c e provided.

A. Violation of Privacy
B . Im p a c t o n the Env i r o n m e n t
C. Public S afet y
D. Health R i sk
E. Im pa ct o n Labo r Forc e

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 15 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
1. C o m p u t e r m a n u f a c t u r i n g p r o c e s s e s a n d c o m p u t e r w a s t e ar e depl et i n g
nat ural reso ur c es a n d pol luti ng t h e e n v i ro n m e n t .
2. Al t hou gh co m pu t e rs h av e i m p r o v e d productivit y i n m a n y w a ys a n d
creat ed a n entire i nd ust r y w i t h h u n dre ds of t h o u s a n d s of n e w jobs,
the skills of millions of workers a n d m anagers h a v e be en repl aced b y
c o m p u t e r s.
3. It is cruci al that pe rso n al a n d confi denti al rec or ds b e prot ect ed
properl y.
4. Adul t s, t een, a n d chi l dren a r o u n d t he w o r l d are u s i n g c o m p u t e r s t o
share publi cl y their phot os, videos, journals, m u s i c , a n d ot her
personal inform ation.
5. P r ol o n ge d or i m pr o p e r c o m p u t e r u s e c a n l ead to injuries or di sorders
o f the hands, wrists, el b ow s, e ye s, necks, a n d back.

C o m p a r e y o u r an s w er s w i th th e A n s w e r K ey o n the n ext p age. If y o u


get 8 0 % a n d a b ov e , t h e n y o u m a y p r o c e e d to t h e n e x t acti vi ty b u t if
n ot, m a s t e r t h e l ess on a n d t a k e t h e S el f -C h e c k agai n .

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 16 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
ANSWER KEY 1.1-1

A. IDENTIFICATION

1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. FALSE

B. MULTIPLE CHOICE

1. B
2. E
3. A
4. C
5. D

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 17 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
INFORMATION SHEET NO. 1.1-2
BASIC REQUIREMENTS FOR A PLANNED INSTALLATION

LEARNING OBJECTIVES:
After reading this Information Sheet, you should be able to:
1. Prepare the required documents or forms before you do a well-planned
installation

2. Identify the qualifications to be a certified hardware professional so that


you could be allowed and authorized to do a well-planned installation

Are you the person everyone calls when they have a computer problem? Have
you considered getting paid for fixing near-fatal errors and turning your PC
prowess into a business? According a recent report, sales of computer services
are expected to exceed $47 billion this year in the U.S. alone, with PC repair
leading the way. But there are some requirements that you need to know before
joining the bandwagon of Computer Hardware Servicing trade, like
document/forms (e.g. Job Orders, Request Forms, and Report Sheets) and
qualifications for personnel in repairing computers.

REQUIRED DOCUMENTS/FORMS:
A. Job Order
A Job order (known as works order outside of the United States because
the work is produced in a manufacturing area known as the works) or job
order (sometimes job ticket or work ticket, as it often has some type of ticket
attached) is an order received by an organization from a customer or client, or
an order created internally within the organization. A work order may be for
products or services.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 18 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
In a manufacturing environment, a work order is converted from a sales
order to show that work is about to be begin on the manufacture, building or
engineering of the products requested by the customer. In a service environment,
a work order can be equivalent to a service order where the WO records the
location, date and time the service is carried out and the nature of work that is
done. The type of personnel (e.g. job position) may also be listed on the WO. A
rate (e.g. $/hr, $/week) and also the total amount of hours worked and total
value is also shown on the work order.
A work order may be a maintenance or repair request from students,
faculty or staff in a university.
Orders received from outside an organization are
often dispatched (reviewed and scheduled) before being executed. Work orders
may be for preventive maintenance.
Contractors may use a single job work order and invoice form that contains
the customer information, describes the work performed, lists charges for
material and labor, and can be given to the customer as an invoice.
A job order is an internal document extensively used by projects-based,
manufacturing, building and fabrication businesses. A job order may be for
products and/or services. In a manufacturing environment, a job order is used
to signal the start of a manufacturing process and will most probably be linked
to a bill of material. Hence, the job order will probably state:
1. the quantity of the product to be manufactured, built or fabricated
2. the amount of raw material to be used, its price and amount
3. the types of labor required, rate (per hour or per unit) and amount
4. the machine utilization for each machine during the routing process, its
rate and amount
In a service environment, a job order can be the equivalent to a work or service
order where the job order records the location, date and time the service is
carried out and the nature of service that was carried out. The type of personnel
(e.g. job position) may also be listed on the job order. A rate (e.g. $/hr, $/week)
and also the total amount of hours worked and total value is also shown.
Sample Job Order Form

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 19 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Computer Repair Job Order Fo r m

Teacher Client’s N a m e School Diffun Hi gh School


D a t e M a r c h 2, 2 0 1 6 C o mp u t e r # 001
S ervi ce T a g # 0 0 1 Mod el Intel i3
Serial # 47 3 7 Z
Co mp u ter Prob l em: (Brief Description of the Problem)

***Blue Screen Error***


___________________________________________________________________________

For T echni cal D ep art men t U s e d O n l y


F a x N o . (0 2) 92 2 -5 5 6 6
Co mp u te r Fi xed B y: Donal d B. Man da c
Date Sent Back to School: ________________
M e m o r y Transcend 2 G H z Processor P ent ium Dual -C ore 2 G H z
H a r d Drive S p ace Hitachi Sata 80 Gi g Wind ows Wi ndows 7 Ultimate

B . R eq u e s t F o r m a n d R e p o r t S h e e t
C o m p u t e r H a r d w a r e S ervi cing m ai ntenanc e, w h i c h i ncl udes pl anned
installation, m a i n objective is to kee p a n d i m pr ov e producti on facilities, to ke e p
and i m prove production facilities stable a nd efficient at the lowest life c ycle cost
wi th the active participation of all m e m b e r s in the c o m p a n y. A R equest F o r m is

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 20 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
u s e d t o p ut this obj e ct i ve i nt o acti on. A n d t h e R e p o r t S h e e t a n d R e q u e s t F o r m
bring t o life this m ai nt enance ’s purposes w h i c h are:

 T o i ncrease producti vi t y t h r o u gh m a x i m u m utilization a n d i m p r o v e m e n t


of all equi pm ent

T o develop m ai ntenance syst em to reduce life c ycle cost of m achi nery and
equipm ent t hrough the i nvolvem ent o f ever ybod y i n the organization

 T o devel op the operator’s capability t o be com pet ent in m ai nt enance


activities t h rou gh ed ucati on, training a n d m oti vati on.

 T o e n h a n c e c a p a b i l i t y f o r a d v a n c e d a n d s o p h i s t i c a t e d t e c h n o l o g y t h a t
would reinforce competitive p o wer.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 21 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
S a mp l e R eq u est F o r m

UNIT NO. 5-2


Description: Ac er Aspire 4736Z Laptop C omput er

O b s e r va ti on/ s:

***Corrupted Operating System*** Da t e Rep ort ed :


M a r c h 05, 2 0 1 6

Rep o rt ed b y :
Donald B. Mand ac

Activity: R eform at Laptop

Da t e Co mp l e ted : M a r c h 06, 2016

Sign:

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 22 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
S a mp l e R e p o r t S h eet

Rep ai r Rep or t S h eet


Area/Section: D H S Comp u te r Laboratory

Facility T y p e N a t u r e of Recommendation
Breakdown

Lapt op N o Viral Corruption


Op e ra t i n g S ys t e m
Error
Refer to the
Technical
D e p a r t m e n t for
Reformatting of
the Operating
S yst em

R e p o r t e d b y: J uan De l a C r uz

Date: M a r c h 15, 2 0 1 6

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 23 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
REQUIRED QUALIFICATION FOR A COMPUTER HARDWARE PERSONNEL:
What Qualifications Do You Need to Become a PC Repair Technician?

Education
Employers prefer applicants who have completed formal electronics
training in a vocational school, community college or similar setting, reports the
Bureau of Labor Statistics. Training programs may last from 6 months to two
years. Some employers require at least a high school diploma or GED.

Certifications
Trainees can take the TESDA NC II Computer System Servicing
assessment to demonstrate their competency for entry-level jobs to employers.
The Technical Education and Skills Development Authority or TESDA offers a
variety of certification programs. In addition, technicians can achieve
certifications even for trainership.

Physical and Personal Traits


PC technicians must be able to squat, bend and reach to access the
computer equipment requiring repair. They should be physically able to lift at
least 50 pounds of computer components. Employers look for technicians who
can stand for long periods of time and have the ability to perceive a variety of
colors. Employers want technicians who think analytically, are organized and
pay attention to detail. They should feel comfortable working under tight
deadlines, and companies may expect them to work overtime or on weekends.

Knowledge and Skills


Applicants should know how to use a variety of standard office software, and
some jobs also require knowledge of networking. Companies prefer candidates
with previous PC repair experience, and they may look for candidates with
experience repairing specific brands of computers. Technicians need strong oral
communication skills and should be able to explain their findings to customers
using common terms.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 24 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
SELF-CHECK NO. 1.1-2
A. IDENTIFICATION
Direction: t he Precautions a n d P rocedures write T R U E if the stat ement is
correct and F A L S E if the statement is wron g.
_________ 1. An yo n e can perform a planned installation as long as he knows it.
_________ 2. The Department of Education facilitates the
c o m p e t e n c y a ss e ssm ent for c o m p u t e r t e c h nicians.
__________3. Computer Technicians are given the TES DA N C II Computer
S yst em Servicing b y T E S D A after successfully taking the
Ass es sm ent .
_________ 4. Computer Technicians need not to have strong oral
com m un i c a t i o n skills for the y onl y repai r comput ers.
__________5. Companies prefer candidates with previous P C repair experience,
and they m a y look for candidates wit h experience repairing specific
br an ds o f co m pu t e rs .
__________6. A job order is an external docum ent b y a project based
Business.
__________7. A job order can be the equivalent to a work or service order
w h e r e t he j ob order reco rds t he location, dat e a n d t i m e t he
servi ce is carri ed ou t a n d t he nature o f servi ce that w a s carri ed
o ut .

C o m p a r e y o u r an s w er s w i th th e A n s w e r K e y o n th e n ext p age. If y ou
get 8 0 % a n d a b ov e , t h e n y o u m a y p r o c e e d to t h e n e x t acti vi ty b u t if
n ot, m a s t e r t h e l ess on a n d t a k e t h e S el f -C h e c k agai n .

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 25 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
ANSWER KEY 1.1-2

IDENTIFICATION

1. FALSE
2. FALSE
3. FALSE
4. FALSE
5. FALSE
6. FALSE
7. TRUE

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 26 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
INFORMATION SHEET 1.1-3
FUNDAMENTALS OF OPERATING SYSTEM

LEARNING OBJECTIVES:

After readi ng this Inform ation S heet , yo u should be abl e to:


1. Identif y f un da m e nt a l s o f operat ing s ys t e m s
2. D et e rm i ne t he different t ypes of operat ing s yst em s

A n O p e r a t i n g S y s t e m (O S ) is a set of p r o gr a m s that m a n a g e c o m p u t e r
ha rd w a re resources a n d provi de c o m m o n servi ces for application soft ware . T h e
o p e r a t i n g s y s t e m is a vi t al c o m p o n e n t o f t h e s y s t e m s o f t w a r e i n a c o m p u t e r
s ys t e m . A p p l i c a t i o n p r o g r a m s r e q u i r e a n o p e r a t i n g s ys t e m w h i c h a r e u s u a l l y
s eparat e p r o gr a m s , but c a n b e c o m b i n e d i n si m pl e s ys t em s .

T i m e -s h a r i n g op e r at i n g s ys t e m s s c h e d u l e t asks fo r effi cient u s e of t h e s ys t e m


an d m a y also include accounting for cost allocation of processor time, m as s
s torage, printing, a n d ot her r esourc es.

For hardware functions su ch as input a n d output and m e m o r y allocation, the


operating s ys t e m act s as a n interm edi a r y b e t w e e n appli cation p r o gr a m s a n d the
c o m p u t e r h a r d w a r e , a l t h o u gh t he appl i cat i on c o d e is usual l y e x e c u t e d di rectl y
b y the h ar dw a r e a n d will frequentl y m a k e a s ys t e m call to a n O S function o r b e
interrupted b y it. Operat i n g s ys t e m s are f o u n d o n al m ost a n y devi ce that
c o n t a i n s a c o m p u t e r f r o m cell ul ar p h o n e s a n d v i d e o g a m e c o n s o l e s t o
s u p e r c o m p u t e r s a n d w e b serv er s .

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 27 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
TYPES OF OPERATING SYSTEMS:
Real-time

A real-time operating system is a multitasking operating system that aims


at executing real-time applications. Real-time operating systems often use
specialized scheduling algorithms so that they can achieve a deterministic
nature of behavior. The main objective of real-time operating systems is their
quick and predictable response to events. They have an event-driven or time-
sharing design and often aspects of both. An event-driven system switches
between tasks based on their priorities or external events while time-sharing
operating systems switch tasks based on clock interrupts.

Multi-user

A multi-user operating system allows multiple users to access a computer


system concurrently. Time-sharing system can be classified as multi-user
systems as they enable a multiple user access to a computer through the sharing
of time. Single-user operating systems, as opposed to a multi-user operating
system, are usable by a single user at a time. Being able to use multiple accounts
on a Windows operating system does not make it a multi-user system. Rather,
only the network administrator is the real user. But for a Unix-like operating
system, it is possible for two users to login at a time and this capability of the
OS makes it a multi-user operating system.

Multi-tasking vs. Single-tasking

When only a single program is allowed to run at a time, the system is


grouped under a single-tasking system. However, when the operating system
allows the execution of multiple tasks at one time, it is classified as a multi-
tasking operating system. Multi-tasking can be of two types: pre-emptive or co-

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 28 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
operative. In pre-emptive multitasking, the operating system slices the CPU time
and dedicates one slot to each of the programs. Unix-like operating systems such
as Solaris and Linux support pre-emptive multitasking, as does Amiga OS.
Cooperative multitasking is achieved by relying on each process to give time to
the other processes in a defined manner. 16-bit versions of Microsoft Windows
used cooperative multi-tasking. 32-bit versions, both Windows NT and Win9x,
used pre-emptive multi-tasking. Mac OS prior to OS X used to support
cooperative multitasking.

Distributed

A distributed operating system manages a group of independent


computers and makes them appear to be a single computer. The development of
networked computers that could be linked and communicate with each other
gave rise to distributed computing. Distributed computations are carried out on
more than one machine. When computers in a group work in cooperation, they
make a distributed system.

Embedded

Embedded operating systems are designed to be used in embedded


computer systems. They are designed to operate on small machines like PDAs
with less autonomy. They are able to operate with a limited number of resources.
They are very compact and extremely efficient by design. Windows CE and Minix
3 are some examples of embedded operating systems.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 29 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
EXAMPLES OF OPERATING SYSTEMS:
Unix and Unix-like operating systems

Ken Thompson wrote B, mainly


based on BCPL, which he used to write
Unix, based on his experience in
the MULTICS project. B was replaced by C,
and Unix developed into a large, complex
family of inter-related operating systems
which have been influential in every
modern operating system (see History).
The Unix-like family is a diverse group of operating systems, with several major
sub-categories including System V, BSD, and GNU/Linux. The name "UNIX" is
a trademark of the Open Group which licenses it for use with any operating
system that has been shown to conform to their definitions. "Unix-like" is
commonly used to refer to the large set of operating systems which resemble the
original Unix.
Unix-like systems run on a wide variety of computer architectures. They are used
heavily for servers in business, as well as workstations in academic and
engineering environments. Free Unix variants, such as GNU/Linux and BSD,
are popular in these areas.
Four operating systems are certified by the The Open Group (holder of the Unix
trademark) as Unix. HP's HP-UX and IBM's AIX are both descendants of the
original System V Unix and are designed to run only on their respective vendor's
hardware. In contrast, Sun Microsystems's Solaris Operating System can run on
multiple types of hardware, including x86 and Sparc servers, and PCs.
Apple's Mac OS X, a replacement for Apple's earlier (non-Unix) Mac OS, is
a hybrid kernel-based BSD variant derived from NeXTSTEP, Mach, and
FreeBSD.
Unix interoperability was sought by establishing the POSIX standard. The POSIX
standard can be applied to any operating system, although it was originally
created for various Unix variants.
BSD and its descendants

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 30 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
A subgroup of the Unix family is the Berkeley Software
Distribution family, which includes
FreeBSD, NetBSD, and OpenBSD, PC-BSD. These
operating systems are most commonly found on web
servers, although they can also function as a personal
computer OS. The Internet owes much of its existence
to BSD, as many of the protocols now commonly used
by computers to connect, send and receive data over
a network were widely implemented and refined in
BSD. The world wide web was also first demonstrated
on a number of computers running an OS based on
BSD called NextStep.
BSD has its roots in Unix. In 1974, University of California, Berkeley installed
its first Unix system. Over time, students and staff in the computer science
department there began adding new programs to make things easier, such as
text editors. When Berkely received new VAX computers in 1978 with Unix
installed, the school's undergraduates modified Unix even more in order to take
advantage of the computer's hardware possibilities. The Defense Advanced
Research Projects Agency of the US Department of Defense took interest, and
decided to fund the project. Many schools, corporations, and government
organizations took notice and started to use Berkeley's version of Unix instead
of the official one distributed by AT&T.
Steve Jobs, upon leaving Apple Inc. in 1985, formed NeXT Inc., a company that
manufactured high-end computers running on a variation of BSD
called NeXTSTEP. One of these computers was used by Tim Berners-Lee as the
first web server to create the World Wide Web.
Developers like Keith Bostic encouraged the project to replace any non-free code
that originated with Bell Labs. Once this was done, however, AT&T sued.
Eventually, after two years of legal disputes, the BSD project came out ahead
and spawned a number of free derivatives, such as FreeBSD and NetBSD.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 31 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Mac OS X

Mac OS X is a line of open


core graphical operating systems
developed, marketed, and sold by Apple
Inc., the latest of which is pre-loaded on all
currently shipping Macintosh computers.
Mac OS X is the successor to the
original Mac OS, which had been Apple's
primary operating system since 1984.
Unlike its predecessor, Mac OS X is
a UNIX operating system built on
technology that had been developed at NeXT through the second half of the
1980s and up until Apple purchased the company in early 1997.
The operating system was first released in 1999 as Mac OS X Server 1.0, with a
desktop-oriented version (Mac OS X v10.0 "Cheetah") following in March 2001.
Since then, six more distinct "client" and "server" editions of Mac OS X have been
released, the most recent being OS X 10.8 "Mountain Lion", which was first made
available on February 16, 2012 for developers, and to be released to the public
late summer 2012. Releases of Mac OS X are named after big cats.
The server edition, Mac OS X Server, is architecturally identical to its desktop
counterpart but usually runs on Apple's line of Macintosh server hardware. Mac
OS X Server includes work group management and administration software tools
that provide simplified access to key network services, including a mail transfer
agent, a Samba server, an LDAP server, a domain name server, and others.
In Mac OS X v10.7 Lion, all server aspects of Mac OS X Server have been
integrated into the client version.
Linux and GNU

Linux (or GNU/Linux) is a Unix-like operating system that was


developed without any actual Unix code, unlike BSD and its variants. Linux can

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 32 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
be used on a wide range of devices from supercomputers to wristwatches.
The Linux kernel is released under an
open source license, so anyone can read
and modify its code. It has been modified
to run on a large variety of electronics.
Although estimates suggest that Linux is
used on 1.82% of all personal computers,
it has been widely adopted for use in
servers and embedded systems (such as cell phones). Linux has superseded
Unix in most places, and is used on the 10 most powerful supercomputers in
the world. The Linux kernel is used in some popular distributions, such as Red
Hat, Debian, Ubuntu, Linux Mint and Google's Android.
The GNU project is a mass collaboration of
programmers who seek to create a completely free and
open operating system that was similar to Unix but
with completely original code. It was started in 1983
by Richard Stallman, and is responsible for many of
the parts of most Linux variants. Thousands of pieces
of software for virtually every operating system are
licensed under the GNU General Public License.
Meanwhile, the Linux kernel began as a side project
of Linus Torvalds, a university student from Finland.
In 1991, Torvalds began work on it, and posted
information about his project on a newsgroup for
computer students and programmers. He received a
wave of support and volunteers who ended up creating
a full-fledged kernel. Programmers from GNU took notice, and members of both
projects worked to integrate the finished GNU parts with the Linux kernel in
order to create a full-fledged operating system.
Microsoft Windows
Microsoft Windows is a family of proprietary operating systems designed
by Microsoft Corporation and primarily targeted to Intel architecture based
computers, with an estimated 88.9 percent total usage share on Web connected
computers. The newest version is Windows 7 for workstations and Windows
Server 2008 R2 for servers. Windows 7 recently overtook Windows XP as most
used OS.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 33 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
M i crosoft W i n d o w s originated i n 1 9 8 5 as a n application runn i n g o n t op of M S -
D O S , w h i c h w a s t h e s t a n d a r d o p e r a t i n g s y s t e m s h i p p e d o n m o s t In t e l
architecture personal c o m p u t e r s at the time. In 1995, W i n d o w s 9 5 w a s released
w h i c h on l y u s e d M S -D O S as a bootstrap. F o r b a c k w a r d s com pat ibili t y, W i n 9 x
coul d run real-m o d e M S -D O S a n d 1 6 bits W i n d o w s 3.x drivers. W i n d o w s M e ,
rel eas ed i n 200 0, w a s t he last versi on i n th e W i n 9 x famil y. La t er versi ons h a v e
all b e e n b a s e d o n t h e W i n d o w s N T k e r n e l . C u r r e n t v e r s i o n s o f W i n d o w s r u n
o n IA -3 2 and x 8 6 -64 microprocessors , al t hou gh Windows 8 will
s u p p o r t A R M architect ure. I n t h e past , W i n d o w s N T s u p p o r t e d n o n -Int el
a rc h i t ect ur es.

S e r v e r e d i t i o n s o f W i n d o w s a r e w i d e l y u s e d . I n r e c e n t ye a r s , M i c r o s o f t h a s
e x p e n d e d s i gn i f i c a n t c ap i t al i n a n ef fort t o p r o m o t e t h e u s e o f W i n d o w s a s a
s e rv e r o p e r a t i n g e n v i r o n m e n t . H o w e v e r , W i n d o w s ' u s a g e o n se r ve rs i s n o t a s
wi des pread as o n personal com put ers, as W i n d o w s c o m p e t e s against Li n u x a n d
B S D for server m a rk et share.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 34 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
SELF-CHECK NO. 1.1-3
A. IDENTIFICATION
Direction: Identify t he Precautions a n d Procedures writ e T R U E if the statement
is correct and F A L S E if the statement is wrong.
________1) A n operating s ystem is a set of programs that m ana ge comput er
hardwa re resources an d provide c o m m o n services for application
software.
________2) Operating system is not a vital component of the system software in
a com put e r s yst em . Appl i cati on p r o gr a m s require a n oper a ting
s ys t e m w h i c h ar e usuall y sep ar at e p r o gr a m s , but c a n b e c o m b i n e d
in si m pl e s yst em s.
________3) Ti m e-sharing operating systems schedule time for efficient
use of t he s yst em a n d m a y also i ncl ude ac c o u nti ng for cost
allocation o f processor tim e, m a s s storage, printing, a n d other
r esourc es.
_ _ _ _ _ _ _ _4) F o r soft ware functions such as input and output a n d
m e m o r y allocation, t he operati ng s ys t e m acts a s a n i nt erm ediar y
b e t w e e n appl i cati on p r o g r a m s a n d t he c o m p u t e r h a rd wa r e.
________5) Operating s ystems are found on almost an y device that contains a
com put er — from cellular phones an d vi deo ga m e consoles to
s u p e r c o m p u t e r s a n d w e b servers

C o m p a r e y o u r an s w er s w i th th e A n s w e r K e y o n th e n ext p age. If y ou
get 8 0 % a n d a b ov e , t h e n y o u m a y p r o c e e d to t h e n e x t acti vi ty b u t if
n ot, m a s t e r th e l e ss on a n d t a k e th e S el f -C h e c k a g a i n

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 35 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
ANSWER KEY 1.1-3

IDENTIFICATION

1. TRUE
2. FALSE
3. FALSE
4. FALSE
5. TRUE

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 36 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
INFORMATION SHEET NO. 1.1-4
COMPUTER COMPONENTS AND DEVICES

LEARNING OBJECTIVES:
After reading this Information Sheet, you should be able to:
1. Classify of the hardware and software components of a computer with its
corresponding functions.
2. Determine the various computer components and peripherals

A computer system is a special subsystem of an organization's overall


information system. It is an integrated assembly of devices, centered on at least
one processing mechanism utilizing digital electronics, which are used to input,
process, store, and output data and information.
Putting together a complete computer system, however, is more involved than
just connecting computer devices. In an effective and efficient system,
components are selected and organized with an understanding of the inherent
tradeoffs between overall system performance and cost, control, and complexity.

CONCEPT DEVELOPMENT:
Basic Hardware Components of Computer System
Today, almost everyone in our information society has a basic
understanding of what a computer is and what it can do. A contemporary
computer system consists of a central processing unit, primary storage,
secondary storage, input devices, output devices, and communications devices
that work together with software to perform calculations, organize data, and
communicate with other computers.
A computer is an electronic machine, operating under the control of instructions
stored in its own memory, that can be programmed to accept data (input),
process it into useful information (output), and store it away in a secondary
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 37 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
storage device (store) for safekeeping or later reuse. T he processing of input into
output is directed b y the soft ware but per fo rm ed b y the h a r d w a re. Fi gure b e l o w
s h o w s s o m e c o m m o n c om p ut e r h a rd w ar e com po n ent s.

C o m m o n com pu t e r ha rd w a re c o m p o n e n t s

C o m p u t e r s ys t e m h a r d w a r e c o m p o n e n t s i n c l u d e de vi ce s t hat p e r f o r m t h e
f u n c t i o n s o f i n put , p r o c e s s i n g, d a t a s t o r a ge ; o u t p u t a n d c o m m u n i c a t i o n . T h e
devices responsible for these five areas are as follows:

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 38 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
 I n p u t d e v i c e s . In p u t d e v i c e s a l l o w y o u t o ent e r d a t a o r c o m m a n d s i n a
form that the computer can use; they send the data or commands to the
processing unit. Commonly-used input devices include keyboard, mouse,
microphone, scanner, digital camera, and PC camera.

 O u t p u t d e v i c e s . O u t p u t d e v i c e s s h o w p e o p l e t h e p r o c e s s e d d a t a --
information --in understandable and useful form. Four commonly used
output devices are a printer, a monitor, speakers, and a portable media
player. Input/output devices are playing an increasingly significant role in
our lives. The number and variety of input/output devices are expanding.

 Pr o c e s s i n g d e vi ce s . P r o c e s s i n g de vi c es a r e t he c o m p u t e r el ect roni c
circuitry housed in the system unit. The circuitry in the system unit is
part of a circuit board called the motherboard. Two major components on
the motherboard are the processor and memory. The processor, formally
known as the central processing unit (CPU), has electronic circuitry that
manipulates input data into the information people want. Computer
instructions are actually are executed in the central processing unit.
Memory is a series of electronic elements that temporarily holds data and
program instructions while they are being processed by the CPU. Both the
processor and memory consist of chips. A chip is an electronic device that
contains many microscopic pathways designed to carry electrical current.
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 39 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
 Storage devices. Storage usually means secondary storage that can
store data and programs outside the computer itself. Storage devices hold
data, information, and programs permanently. These devices supplement
memory (also called primary storage) that can hold data and programs only
temporarily. Common storage devices include a hard disk, USB flash
drives, CDs, DVDs, and memory cards. A drive is a device that reads from
and writes onto a storage medium. A storage medium is the physical
material on which data, information, and program are stored. Some
portable devices, such as digital cameras, use memory cards as the storage
media.

 C o m m u n i c a t i o n s d evices. C om m uni c at i ons d evi ces provide connecti ons


between the computer and communications networks, and enable
computer users to communicate and to exchange data, information, and
programs with other computers. Communications devices transmit these
items over transmission media such as cables, telephone lines, satellites,
and cellular radio. A widely used communications device is a modem.
In summary, we communicate with computers through input/output devices.
Input devices translate our data and communications into a form that the
computer can understand. The computer then processes these data, and an
output device translates them back into a form we can understand. The central
processing unit manipulates data and controls the other parts of the computer
system. Memory (primary storage) temporarily stores data and program
instructions during processing, while secondary storage feeds data and
instructions into the central processor and stores data for future use.
The System Unit
The Motherboard
The system unit is a box-like case that houses the processor, memory and other
electronic components of the computer that are used to process data. All other
computer system devices, such as the monitor, keyboard, and mouse, are linked
either directly or indirectly into the system unit.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 40 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Fi gu r e b e l o w s h o w s s o m e of t he c o m p o n e n t s insi de t he s ys t e m unit o n a
typical P C , including the processor, m e m o r y, expansion cards, drive bays, po we r
suppl y, ports a n d connectors. T h e processor is the devi ce that execut es p r o gr a m
i ns t ructi ons. T h e m e m o r y d e v i c e is a p a c k a g e t hat h o l d s t e m p o r a r i l y d a t a a n d
p r o g r a m i nst ru ct i on s d u r i n g p r o c e s s i n g. A n e x p a n s i o n c a r d is a ci rcuit b o a r d
t hat a d d s d e v i c e s o r capabi l i t i es t o t h e c o m p u t e r . Fi n al l y, d e v i c e s o u t s i d e t h e
s ys t e m uni t , s u c h a s a k e yb o a r d , m o u s e , m o n i t o r , print er, o r m i c r o p h o n e , a r e
at t ached b y a cabl e t o a port or co nn e ct o r o n t he s ys t e m unit.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 41 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
To conserve on space, all-in-one computer houses the system unit in the same
physical case as the monitor. On notebook computers, the keyboard and
pointing device often occupy the area on the top of the system unit. The display
attaches to the system unit by a hinge. The system unit on a handheld computer
usually consumes the entire device. On these devices, the display is part of the
system unit too.
When the cover of a system unit is removed, the motherboard, also called
system board, can be seen inside the housing. The motherboard, a single circuit
board, provides the path through which the processor communicates with
memory components, other components, and peripheral devices. In a typical
personal computer, the components attached to the motherboard include
processor, memory chips, support electronic circuitry, and expansion boards. It
is the processor that is the most important component of the motherboard.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 42 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Many electronic components attach to the motherboard

A computer chip is a small piece of semi conducting material, usually silicon,


on which one or more integrated circuits are etched. The various chips have
standard-sized pin connectors that allow them to be attached to the motherboard
and, there, to a common electrical path, called bus, that enables data flow
between the various system components.
An integrated circuit (IC) contains many microscopic pathways capable of
carrying electrical current. Each integrated circuit can contain millions of
elements such as resistors, capacitors, and transistors. Transistors act as
electronic switches that may or may not allow current to pass through. If current
passes through, the switch is on, representing the 1 bit. If current does not pass
through, the switch is off, representing a 0 bit. Thus, combinations of transistors
can stand for combinations of bits, which represent numbers, letters, and other
characters. The motherboard in the system unit contains many different types
of chips. A miniaturized central processing unit can be etched on a chip, then
the term computer on a chip.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 43 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
A central processing unit on a chip is called a microprocessor. On a
personal computer, the central processing unit (CPU) usually is contained on a
single chip. On the larger computers such as mainframes and supercomputer,
the various functions performed by CPU are spread across many separate chips.
Today's popular Pentium microprocessor contains more than one hundred
million transistors.
Ultimately, the type of processor and the amount of RAM placed on the
motherboard define the computer’s speed and capacity. The processor is
generally not made by the manufacturers of PCs. It is made by companies that
specialized in the development and manufacture of microprocessors. A number
of companies make microprocessors, including Intel, IBM, Motorola, Advanced
Micro Devices (AMD), and Cyrix. Most chips are no bigger than one-half-inch
square. Manufacturer’s package chips so the chips can be attached to a circuit
board such as a motherboard, memory module, or adapter card.
A variety of chip packages exist.
One type, called a dual inline
package (DIP), consists of two
parallel rows of pints that attach
the chip package to the circuit
board. A pin grid array (PGA)
package holds a larger number of
pins because the pins are mounted
on the surface of the package. A
flip chip-PGA (FC-PGA) package
is a higher-performance PGA
packaging that places the chip on
the opposite side of the pins.
Another high performance
packaging technique does not use
pins. A single edge contact (SEC)
cartridge connects to the Some common chip packages
motherboard on one of its edges.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 44 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
The Central Processing Unit
The central processing unit (CPU), also called processor, interprets and carries
out the basic instructions that operate a computer. The CPU significantly
impacts overall computing power and manages most of a computer's operations.
On larger computers, such as mainframes and supercomputers, the various
functions performed by the processor extend over many separate chips and often
multiple circuit boards. On a personal computer, all functions of the processor
usually are on a single chip.
Most processor chip manufacturers now offer multi-core processors. A multi-core
processor is a single-chip with two or more separate processors. Two common
multi-core processors used today are dual-core and quad-core. A dual-core
processor is a chip that contains tow separate processors. Similarly, a quad-core
processor is a chip with four-separate processors. Each processor on a multi-
core chip generally runs at a slower clock speed than a single-core processor,
but multi-core ships typically increase overall performance.
Memory
While performing a processing operation, a processor needs a place to
temporarily store instructions to be executed and the data to be used with those
instructions. The CPU cannot process data on an input device or disk directly;
the data must first be available in memory. A computer's memory in the system
unit, located physically close to the CPU (to decrease access time), provides the
CPU with a working storage area for program instructions, data and information.
Memory is also known as primary storage or internal storage. Memory
usually consists of one or more chips on the motherboard or some other circuit
board in the computer.
The major feature of memory is that it rapidly provides the instructions and data
to the CPU. Memory stores three basic categories of items: (1) the operating
system and other system software that control or maintain the computer and its
devices; (2) application programs that carry our a specific task such as word
processing; and (3) the data being processed by the application programs and
resulting information.
This role of memory to store both data and programs is known as the stored
program concept.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 45 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Memory and storage sizes
Programs and data are placed in memory before processing, between processing
steps, and after processing has ended, prior to being returned to secondary
storage or released as output. Recall that a character is stored in the computer
as a group of 0s and 1s, called a byte. Thus, a byte is the basic storage unit in
memory. Like the CPU, memory components contain thousands of circuits
imprinted on a silicon chip. Each circuit is either conducting electrical current
(on) or not (off). By representing data as a combination of on or off circuit states,
the data is stored in memory. When application program instructions and data
are transferred into memory from storage devices, each of bytes is placed in a
precise location in memory, called an address. This address is simply a unique
number identifying the location of the byte in memory. To access data or
instructions in memory, the computer references the addresses that contain
bytes of data. The size of memory is measured by the number of bytes available
for use (Figure 4-17). A kilobyte of memory is equal to exactly 1,024 bytes. To
make storage definitions easier to identify, computer users often round a kilobyte
down to 1,000 bytes. A megabyte (MB) is equal to approximately 1 million bytes.
A gigabyte (GB) equals approximately 1 billion bytes. A terabyte (TB) is equal to
approximately 1 trillion bytes.
The system unit contains two types of memory: volatile and nonvolatile. The
contents of volatile memory are lost when the computer power is turned off. In
nonvolatile memory, the combination of circuit states is fixed, and therefore the
contents of nonvolatile memory are not lost when power is removed from the
computer. RAM is the most common type of volatile memory. Examples of
nonvolatile memory include ROM, flash memory and CMOS. The following sub-
sections discuss these types of memory.

RAM

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 46 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
R a n d o m Access M e m o r y ( R A M ) is the m e m o r y chips that are m ount ed directly
o n the motherboard or m o u n t ed o n peripheral cards that plug into the
motherboard. T h e R A M chips consist of millions of switches that are sensitive to
changes i n electric current. W h e n the co m put er is p ow e r ed on, certain operating
system files are loaded from a storage device such as a hard disk into R A M . These
files rem ai n in R A M as long as the com p ut er is running. A s additional p r o gra m s
and data are requested, t he y are read from storage into R A M . T h e processor acts
upo n the data whil e it is in R A M . Duri ng the running time, the contents of R A M
m a y c h a n g e as t he p r o g r a m is ex ecut ed.
R A M c o m e s in m a n y different varieties. Th re e basic t ypes of R A M are d ynam i c
R AM , static R A M , and magnetoresistive R A M . Dynami c R A M ( D R A M ) must be
r e f r e s h e d ( o r r e c h a r g e d ) c o n s t a n t l y b y t h e C P U o r it l o s e s its co nt ent s. M a n y
variations of D R A M chips exist, m ost of whi ch are faster than the basic D R A M .
One type of D R A M is Synchronous D R A M (S DRAM ) , which is much faster than
D R A M because it is synchronized t o the system clock. Doubl e Data Rate (D D R )
S D R A M chips are eve faster than S D R A M chips because they transfer data twice
for e ac h cl ock cycle, instead of just o n ce, a n d D D R 2 a n d D D R 3 are ev e n faster
than D D R . Dual channel S D R A M is faster than single channel S D R A M because
it delivers twice the amount of data to the processor. R a mb u s D R A M ( R D R A M )
is yet ano t h e r t yp e o f D R A M that is m u c h fast er t h a n S D R A M b e c a u s e it us e s
pipelining techniques. Most personal computers today use som e form of S D R A M
chips or R D R A M chips.
Static R A M (SRAM) is faster and more reliable than any form of DR AM. The term
static refers to the fact that it does not have to be re-energized as often as D R A M .
S R A M is m u c h m o r e ex pensi ve t h a n D R A M , t hus it is usual l y u s e d for speci al
purpose, such as used in cache.
A newer type of R A M, called magnetoresistive R A M (M R A M ), stores data using
magneti c charges instead of electrical charges. Manufacturers claim that M R A M
h a s great er st orage c apaci t y, c o n s u m e s l ess p o w e r , a n d h a s faster a c c e s s t i m es
t han electronic R A M . Al so, M R A M retains its cont ents after p o w e r is r e m o v e d
f r o m t h e c o m p u t e r , w h i c h c o u l d p r e v e n t l oss o f d a t a f or u s e rs. A s t h e c o s t o f
M R A M declines, experts predict M R A M could replace both D R A M and SR AM.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 47 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
RAM chips usually are packaged on
a small circuit board, called memory
module, which is inserted into the
motherboard (Figure 4-19). Three
types of memory modules are SIMMs,
DIMMs, and RIMMs. A single inline
memory module (SIMM) has pins on
opposite sides of the circuit board
that connect together to form a single
set of contacts. With a dual inline
memory module (DIMM), the pins on
opposite sides of the circuit board do
not connect and thus form two sets
of contacts. SIMMs and DIMMs
typically hold SDRAM chips. A
Rambus inline memory module
(RIMM) houses RDRAM chips. A me m o r y mo d u l e being inserted in a

The amount of RAM a computer mo t h e r b o a r d .


requires often depends on the types
of applications you plan to use on the computer. A computer only can
manipulate data that is in memory. A computer needs a certain amount of
memory to store programs, data, and information. The more RAM a computer
has, the faster the computer will respond.
A software package usually indicates the minimum amount of RAM it requires.
If you want the application to perform optimally, typically you need more than
the minimum specifications on the software package. The necessary amount of
RAM varies according to the type of work you do and the type of software
applications you are using. The amount of RAM on your computer determines
how many programs and how much data a computer can handle at one time and
thus affects overall performance. Generally, home users running Windows Vista
and using basic application software such as word processing should have at
least 1GB of RAM. Most business users who work with accounting, financial, or
spreadsheet programs, and programs requiring multimedia capabilities should
have 1 to 4 GB of RAM. Users creating professional Web sites or using graphics-
intensive applications will want 4GB or more of RAM. The amount of RAM in
computers purchased today ranges from 1GB to 64GB. In an advertisement,

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 48 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
manufacturers specify the maximum amount of RAM a computer can hold, for
example, 1GB expandable to 2GB.
ROM
Read-only memory (ROM) refers to memory chips storing permanent data and
instructions. That is, the items stored in ROM chips cannot be modified--hence,
the name read-only. ROM is usually nonvolatile. In ROM, the combination of
circuit states is fixed, and therefore its contents are not lost if the power is
removed. The data, instructions, or information stored on ROM chips often are
recorded when the chip is manufactured. ROM chips that contain permanently
written data, instructions, or information are called firmware. Firmware can be
read and used, but cannot be changed by user. For example, ROM contains the
programs that direct the computer to load the operating system and other files
when the computer is turned on. In addition to computers, many devices contain
ROM chips. For example, ROM chips in printers contain data for fonts.
Programmable read-only memory (PROM) is a blank ROM chip on which you
can permanently place data and programs. Once the data and instructions are
programmed into PROM chip, the chip functions like a regular ROM and cannot
be erased or changed. A variation of the PROM chip, called electrically erasable
programmable read-only memory (EEPROM) chip, allows a programmer to
erase the microcode with an electric signal. EEPROM chips are where the CPU's
data and instructions change, but only infrequently, such as an industrial robot
used in an automobile manufacturer.
Flash Memory
Another type of nonvolatile memory is called flash memory. Flash memory is a
chip that keeps its memory when the power is shut off. Similar to a EEPROM
chip, flash memory can be erased electronically and reprogrammed. Most
computers use flash memory to hold their startup instructions because it allows
the computer easily to update its contents. For example, when the computer
changes from standard time to day-light savings time, the contents of a flash
memory chip (and the real-time clock chip) change to reflect the new time.
Flash memory chips also store data and programs on many mobile computers
and devices, such as smart telephones, digital cameras, pagers, PDAs,
automotive devices, portable media players, digital voice recorders, and
printers. When you enter names and addresses in a smart phone or PDA, a flash

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 49 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
memory chip stores the data. Some portable media players such as MP3 players
store music on flash memory chips; others store music on tiny hard disks or
flash memory cards. The logic capabilities of these devices can be upgraded by
simply downloading new software from the Internet or a vendor-supplied disk to
flash memory.
CMOS
Some RAM chips, flash memory chips, and other types of memory chips use
complementary metal-oxide semiconductor (CMOS) technology because it
provides high speeds and consumes little power. CMOS technology uses battery
power to retain information even when the power to the computer is off. Battery-
backed CMOS memory chips, for example, can keep the calendar, date, and time
current even when the computer is off. The flash memory chips that store a
computer's startup information often use CMOS technology.
Expansion Slots and Adapter Cards

An expansion slot is a
socket on the motherboard
that can hold an adapter
card. An adapter card,
also called expansion card,
is a circuit board that
enhances functions of a
component of the system
unit and/or provides
connections to
peripherals. A peripheral
is a device that connects to
the system unit and is
controlled by the processor
in the computer. Examples An adapter card being inserted in an expansion slot
of peripherals are
modems, disk drives, printers, scanners, and keyboards. The adapter cards
contain the electronic circuitry for many supplemental capabilities, such as more
memory, higher-quality sound devices, a modem, extra ports, or graphics

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 50 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
capabilities. Figure shows an expansion card being plugged into an expansion
slot on a personal computer motherboard.
Figure below lists currently used types of adapter cards. Sometimes, all
functionality is built in the adapter card. With others, a cable connects the
adapter card to a device, such as a digital video camera, outside the system unit.
Some motherboards
include all necessary
capabilities and do
not require adapter
cards. Other
motherboards may
require adapter
cards to provide
capabilities such as
sound and video. A
sound card is used
to enhance the
sound-generating
capabilities of a
personal computer
by making two basic
Currently used adapter cards and their functions
functions possible.
First it enables
sounds to be captured and stored on disk. Second, it enables sounds to be played
through external speakers. The sound card can add realism to computer games
with stereo music and sound effects.
It also allows us to speak commands and enter words to our PCs via speech
recognition. The typical sound card will have receptacles for a microphone, a
headset, an audio output, and a joystick. A video card, also called video
adapter or graphics card, converts computer output into a video signal that is
sent through a cable to the monitor, which displays an image on the screen.
In the past, installing a card was not easy and required you to set switches and
other elements on the motherboard. Today, many computers support Plug and
Play, which refers to the computer's capability to automatically configure
adapter cards and other peripherals as you install them. Having Plug and Play
support means that a user can plug in a new component turn on the computer,
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 51 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
and then use or play the component without having to configure the system
manually.
There are four widely used types of removable flash memory devices: flash
memory cards, USB flash drives, PC cards, and ExpressCard modules. Unlike
adapter cards that require you to open the system unit and install the card on
the motherboard, you can change a removable flash memory device without
having to open the system unit or restart the computer. This feature, called hot
plugging, allows you to insert and remove the removable flash memory and other
devices while the computer is running.

Flash memory cards and USB flash drive


A flash memory card is a removable flash memory device, which you inset and
remove from a slot in a computer, mobile device, or card reader/writer. Many
mobile and consumer devices, such as smart phones, digital cameras, portable
media players, and PDAs use these memory cards. Some printers and computers
have built-in card readers/writers or slots that read flash memory cards. In
addition, you can purchase an external card reader/writer that attaches to any
computer. Flash memory cards are available in a variety of shapes, sizes and
capacities.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 52 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
A USB flash drive is a flash memory storage device that plugs in a USB port on
a computer or portable device. A special type of USB flash drive, called a U3
smart drive, includes preinstalled software accessed through a Window-type
interface.
Many computers have a PC Card slot or an Express Card slot, which is a special
type of expansion slot that holds a PC Card or an Express Card module,
respectively. A PC Card is a thin, credit card-sized removable flash memory
device that primarily is used today to enable notebook computers to access the
Internet wirelessly. Express Card modules are the next generation of PC Cards.
An Express Card module, which can be used as a removable flash memory
device, adds memory, communications, multimedia, and security capabilities to
computers. Both PC Cards and Express Card modules conform to standards
developed by the Personal Computer Memory Card International Association.
These standards help to ensure the interchangeability of PC Cards and Express
Card modules among personal computers.
Other Components
Buses
As previously explained, a computer
processes and stores data as a series
of electronic bits. These bits are
transferred internally within the
circuitry of the computer along
electrical channels. Each channel,
called a bus, allows the various
devices inside and attached to the
system unit to communicate with A PC Card slides in a PC Card slot
each other. Just as vehicles travel on
a highway to move from one destination to another, bits travel on a bus.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 53 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Buses are used to
transfer bits from
input devices to
memory, from
memory to the CPU,
from the CPU to
memory, and from
memory to output
or storage devices.
All buses consist of
two parts: a data
bus and an address
bus. The data bus
transfers actual
data and the
address bus
transfers
information about
Just as vehicles travel on a highway, bits travel on a bus where the data
should go in
memory.
A bus is measured by its size. The size of a bus, called the bus width, determines
the number of bits that can be transmitted at one time. For example, a 32-bit
bus can transmit 32 bits (4 bytes) at a time. On a 64-bit bus, 64 bits (8 bytes)
are transmitted from one location to another at a time. The larger the number of
bits handled by the bus, the faster the computer transfers data. If a number in
memory occupies 64 bits, it must be transmitted in two separate steps when
using a 32-bit bus: once for the first 32 bits and once for the second 32 bits.
Using a 64-bit bus, however, the number can be transmitted in a single step,
transferring all 64 bits at once. The wider the bus, the fewer number of transfer
steps required and the faster the transfer of data. Most personal computers today
use a 64-bit bus.
Every bus also has a clock speed. Just like the processor, the clock speed for a
bus is measured in megahertz. The higher the bus clock speed, the faster the
transmission of data, which results in applications running faster. Most of
today's processors have a bus clock speed of 400, 533, 667, 800, 1066, or 1333
MHz.
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 54 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Buses allow the various devices inside and attached to the system unit to
communicate with each other

Two basic types of buses are found in a computer: a system bus and an
expansion bus. A system bus is part of the motherboard and connects the CPU
to main memory. An expansion bus allows the CPU to communicate with
peripheral devices. Data transmitted to the CPU travels from the expansion bus
and the system bus. When computer professionals use the term bus by itself,
they usually are referring to the system bus. Since the types of expansion buses
on a motherboard determine the types of expansion cards you can add, you
should understand the expansion buses commonly found in today's personal
computers:

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 55 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
 A n ol d a n d sl owest e x p a n s i on b u s is t he I S A ( I n d u s t r y S t a n d a r d
Architecture) bus. A mouse, modem card, sound card, and low-speed
network card are examples of devices that connect to the ISA bus directly
or through an ISA bus expansion slot.
 Th e P C I (Peripheral C o mp o n e n t Interconnect) b u s is a high-speed
expansion bus that connects higher speed devices. Types of cards inserted
into a PCI bus expansion slot include video cards, sound cards, SCSI
cards, and high-speed network cards. The PCI bus transfers data about
four times faster than the ISA bus. Most current personal computers have
a PCI bus.
 T h e P C I E x p r e s s ( P C I e ) b u s is a n e x p a n s i o n b u s t hat e x p a n d s o n a n d
doubles the speed of the original PCI bus. Nearly all video cards today use
the PCI Express bus, as well as many hard disks and network cards.
Experts predict the PCI Express bus eventually will replace the PCI bus
completely.
 The Accelerated Gr aphi cs Port ( A G P) is actually a bus designed b y Intel
to improve the speed with which 3-D graphics and video are transmitted.
When an AGP video card is inserted in an AGP bus slot, the AGP bus
provides a faster, dedicated interface between the video card and memory.
Newer processors support AGP technology.
 T h e Un i v e rs al S eri al B u s ( U S B ) a n d Fi r e W i r e b u s are buses that
eliminate the need to install expansion cards into expansion slots. In a
computer equipped with a USB, USB devices are connected to each other
outside the system unit and then a single cable attaches to the USB port.
The USB port then connects to USB, which connects to the PCI bus on the
motherboard. The USB hot plug feature allows peripheral devices to be
connected to or removed from the USB port while the PC is running. The
FireWire bus works in a similar fashion. With these buses, expansion slots
are available for devices not compatible with USB or FireWire.
 T h e e x p a n s i o n b u s fo r a P C C a r d i s t h e P C C a r d b u s . W i t h a P C C a r d
inserted into a PC Card slot, data travels on the PC Card bus to the PCI
bus.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 56 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
A system unit has many ports

Ports and Connectors


A port is the point at which a peripheral attaches to or communicates with a
system unit so that the peripheral can send data to or receive information from
the computer. An peripheral device, such as a keyboard, monitor, printer,
mouse, digital camera, and microphone, often attaches by a cable to a port on
the system unit. Most of the time, ports are located on the back of the system
unit, but they also can be placed on the front .
A connector joins a cable to a port. A connector at one end of a cable attaches
to a port on the system unit, and a connector at the other end of the cable
attaches to a port on the peripheral. Most connectors are available in one of two
genders: male and female. Male connectors have one or more exposed pins.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 57 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Female connectors have matching holes to accept the pints on a male
connector. Manufacturers often identify the cables by their connector types to
assist you with purchasing a cable to connect a computer to a peripheral. Figure
show the different types of connectors you may find on a system unit. Notice that
some are color-coded to help you match the connector to the correct port. Some
system units include these connectors when you buy the computer. You add
other connectors by inserting adapter cards on the motherboard. Certain adapter
cards have ports that allow you to attach a peripheral to the adapter card.
The motherboard is designed with several port options, including at least one
serial port and parallel port each, several USB ports, and a FireWire port.
 A seri al p o r t is a t yp e o f i nt er f a c e t hat c o n n e c t s a d e v i c e t o t h e s ys t e m
unit by transmitting data one bit at a time. It usually used to connect
devices that do not required fast data transmission rates, such as a mouse
or keyboard. The COM port (short for communications port) on the system
unit is one type of serial port. Some modems, which connect the system
unit to a telephone line, use a serial port because the telephone line
expects the data in a serial form. Serial ports conform to either the RS-232
or RS-422 standard with 9-pin or 25-pin. One of the 9 or 25 lines carries
the serial signal to the peripheral device, and another line carries the
signal from the device. The other lines carry control signals.
 Parall el p o r ts al l ow the parallel t ransm issi on o f data; that is, several bits
are transmitted simultaneously. Figure also shows how 8-bit bytes travel
in parallel over 8 separate lines. Extra lines carry control signals. Parallel
ports use the same 25-pin RS-232C connect

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 58 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
or or the 36-pin Centronics connector. These ports provide the interface
for such devices as high-speed printers, external magnetic tape or disk
backup units, and other computers. Two newer types of parallel ports, the
EPP (Enhanced Parallel Port) and the ECP (Extended Capabilities Port),
use the same connectors as the Centronics port, but are more than 10
times faster.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 59 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
A serial port a nd parallel port

 U S B ( U n i v e r s a l S e r i a l B u s ) p o r t s a r e u s e d i n h i g h -s p e e d d e v i c e
interfaces. U p t o 1 2 7 peripheral devi c es c a n b e dai s y- ch ai n e d t o a si ngl e
U S B port. U S B ports are ideal for digital cam eras, scanners, g a m e s
controll ers, M P 3 m u s i c pl a yer, C D & D V D , r e m o v a b l e h a r d disk, P D A ,
smart phone, a nd high-speed m o d e m s . M a n y s ys t em units have six to
eight U S B ports. S o m e newer peripheral devices m a y attach onl y to a U S B
port. Ot hers attach to either a serial or parallel port, as well as a U S B port.
W h e n connecting a device to a U S B port, yo u d o not need to install a card
in t he c o m p uter. S i m p l y p l u g o n e e n d of t he cabl e into t he U S B port a n d
the other en d into the device. T o attach multiple peripherals using a single
U S B port, yo u c a n u se a U S B hub. A U S B h u b is a devi ce that pl u gs i n a
U S B p o r t o n t h e s ys t e m u n i t a n d c o n t a i n s m u l t i p l e U S B port s i n w h i c h
you plug cables from U S B devices. S o m e U S B hubs are wireless. The latest
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 60 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
version of USB, called USB 2.0, is a more advanced and faster USB, with
speeds 40 times higher than that of its predecessor.
 Fi r eWi re ports ,
also called IEEE
1394 port, are
similar to the
USB port and
can connect
multiple types of
devices that
require faster
data
transmission
speeds such as
digital video USB and FireWire ports are replacing traditional ports
cameras, digital
VCRs color printer, scanners, digital cameras, and DVD drives to a single
connector. Up to 63 devices can be connected together using a FireWire
port. The latest FireWire version, called FireWire 800, is much more
advanced than its predecessor, FireWire 400. The FireWire also supports
Plug and Play. Many computer professionals believe that ports such as
USB and FireWire someday will replace serial and parallel ports
completely. Having standard ports and connectors, such as USB and
FireWire, greatly simplify the process of attaching devices to a computer.
In general, FireWire has replaced parallel and SCSI ports, and USB ports
have replaced mouse, keyboard, serial, audio, and parallel ports. Some
newer computers do not have a serial or parallel port. Users plug the device
in a USB or FireWire port. Figure 4-32 shows how USB and FireWire are
replacing other ports completely.
There are five special-purpose ports available: MIDI, eSATA, SCSI, IrDA, and
Bluetooth. These ports are not included in typical computers. For a computer to
have these ports, you often must customize the computer purchase order. MIDI
(Musical Instrument Digital Interface) ports connect the system unit to a
musical instrument, such as an electronic keyboard. The electronic music
industry has adopted MIDI as a standard to define how devices, such as sound
cards and synthesizers, represent sounds electronically. A synthesizer, which
can be a peripheral or a chip, creates sound from digital instructions. A system
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 61 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
unit with a MIDI port has the capability of recording sounds that have been
created by a synthesizer and the processing the sounds to create new sounds.
Nearly every sound card supports the MIDI standard, so you can play and
manipulate on one computer sounds that originally were created on another
computer.
An eSATA (external Serial Advanced Technology Attachment) port, allows
you to connect an external SATA hard disk to a computer. SATA hard disks are
popular because of their fast data transmission speeds. eSATA connections
provide up to six times faster data transmission speeds than external hard disks
attached to a computer's USB or FireWire port.
SCSI (Small Computer System Interface) ports are special high-speed parallel
port and provide a parallel interface that enables faster data transmission than
serial and parallel ports. Also up to 15 SCSI peripheral devices can be daisy-
chained to a single SCSI port; that is, they are connected along a single cable.
The first SCSI device connects to the computer, the second SCSI device connects
to the first SCSI device, and so on. SAS (serial-attached SCSI) is a newer type of
SCSI that transmits at much faster speeds than parallel SCSI.
Power Supply, Cooling Technology
Many personal computers plug in standard wall outlets, which supply an
alternating current (AC) of 115 to 120 volts. This type of power is unsuitable for
use with a computer, which requires a direct current (DC) ranging from 5 to 12
volts. The power supply is the component of the system unit that converts the
wall outlet AC power into DC power. Different motherboards and computers
require different wattages on the power supply. If a power supply is not providing
the necessary power, the computer will not function properly.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 62 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Built into the power supply is a fan that keeps the power supply cool. Many
newer computers have additional fans near certain components in the system
unit such as the processor, hard disk, and ports. Processor chips generate quite
a bit of heat, which could cause the chip to burn up. Although the computer’s
main fan generates airflow, many of today’s processors require additional
cooling. A heat sink is a small ceramic or metal component with fins on its
surface that absorbs and disperses heat produced by electrical components such
as a processor. Because a heat sink consumes extra space, smaller device called
a heat pipe cools processors in notebook computers.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 63 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
T AS K SHEET. 1.1-4

Title: Identify the Different C om p ut er C o m p o ne n t s a n d Peripherals

Pe r f o r ma n c e O b jec ti ve In the tool shop, gi ven the supplies, com put e r


c o m p o n e n t s a n d peri pherals, m at eri al s, a n d e q u i p m e n t , yo u are
requi red t o identify t he different c o m p u t e r c o m p o n e n t s a n d peripherals
a n d their specificati ons in 1 5 M i n u t e s .

Supplies/Materials: P ap e r a n d P e n

Eq uip ment:

1. C o m p u t e r
2. P P E

S tep s / Pr o c e d u r e:
1. P roceed to the station (wit h P C Unit) a ssi gned to yo u
2. Identify the different c o m p o n e n t s a n d write the specifications of
e ac h c o m p o n e n t o n yo u r paper.
3 . S u b m i t o u t p u t t o t rainer for ev al u at i o n

As s es s men t M e t h o d : Practicum with interview

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 64 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
PERFORMANCE CRITERIA CHECKLIST TASK 1.1-4
Criteria Yes No

C o m p u t e r c o m p o n e n t s a n d peripherals are identified


correctly
Qu es t i on s a b o u t t he c o m p u t e r c o m p o n e n t s a n d peri pheral s
are ans wer ed correctly
Personal Protective Equipment (PPE) w e r e used properl y

The objective of the activity are achieved accordingly

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 65 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
INFORMATION SHEET 1.1-5
TOOLS AND EQUIPMENTS

LEARNING OBJECTIVES:
After readi ng this Inform ation S heet , yo u should be abl e to:
1. Identif y t h e different t ool s a n d e q u i p m e n t us e d in c o m p u t e r s ys t e m s
and networks
2. D e t e r m i n e t he di fferent u s e a n d funct io n s of t hese t ools a n d e q u i p m e n t
O n e i m p o r t a nt t hi n g t o consi d er b e f o r e e x e c u t i n g a w e l l -p l a n n e d c o m p u t e r
installation i s that o n e m u s t b e k n o w l e d g e a b l e i n t he different tool s a n d
e q u i p m e n t u s e d i n c o m p u t e r s ys t e m s a n d n e t w o r k s . F u r t h e r m o r e , t h e i d e a o n
h o w t h e s e t o o l s a n d e q u i p m e n t a r e p r o p e r l y u s e d is a n o t h e r i m p o r t a n t
consi derati on i n installing c o m p ut e r s yst em s.

H ard w ar e Tools/Eq uipment a n d Illustratio ns


their Fu n c t i o n s

Pro tective E y ew ea r

enclos e o r protect the e ye area in


order to prev ent particulates,
infectious fluids, or chemi cals
from striking the e ye s

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 66 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Multi-tester or Mul ti-meter

A mu l ti -me t e r or a mu l ti -tester,
also known as a V O M (Volt-O h m
meter), is an electronic m e as ur i n g
i ns t ru m e nt that c o m b i n e s several
m e a s u r e m e n t funct i ons in o n e
unit

Pliers (Assorted)

Pli ers is a h a n d tool u s e d to hol d


objects firmly, for bending,
or physical com pr ess i on .

Screwdriver

A screwdriver is a tool for


driving s crews and often rotating
other m a c h i n e el em e nt s wi t h t he
m ati ng drive s yst em

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 67 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Soldering Gu n

A soldering gu n is
a tool for soldering m et al s using
tin-bas ed solder to a chi eve a
highl y conductive contact

Desoldering T ool

Desoldering tools are used for


r em o vi n g the m ol t en solder s o that
t he joint m a y b e separated.

Allen Wrench

A h ex k ey , All en k e y , or Allen
w ren ch (also k n o w n b y various
other s yn on ym s ) is a tool of
hex a go n al cross -sect ion us ed to
drive bolts a n d s cr e ws that h a v e a
hex a go n al socket in th e h e a d
(internal-wrenching hex agon drive)

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 68 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Flashlight

A flashlight (or torch in British


Engl is h ) is a h a n d -hel d portable
electric-powered light source.
Us ual l y t he light sou rce is a
s m al l incandescent light
bulb or light-emitting diode (LED)

I C Insertion a n d Extraction T ool

U s e d for extracting a n d inserting


BIOS Chip

Mirror

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 69 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
In ha rdwa re servicing a mirror is
us ed for inspecting t he peripherals

T weezers

T w ee z e rs are tools used for


picking u p objects too small to be
easily handl ed wi t h
the h u m a n hands

Antistatic Wrist S trap

A n antistatic w ri st strap, E S D
wrist strap, or g rou n d bracelet is
a n antistatic d e v i c e u s e d t o
safely ground a person worki n g on
very
sensitive electronic e quipment , to
prevent t he bui l dup of static
electricity o n their body, whi ch
c a n result i n electrostatic
discharge (ESD)

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 70 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Gloves
A gloves are garm ent s for covering
a n d protecting t h e w h o l e h a n d

Printer

a printer is a peripheral w h i c h
produces a text or graphics o f
d o c u m e n t s st ored i n
electronic form , usuall y on
ph ys i cal print m e d i a s u c h as
p a p e r o r t r a nsp a r en c i es

Computer

A computer is
a p r o g r a m m able m a chi n e desi gned
to aut om at i call y c arr y out a
sequence of arithmetic or logical
o p erations

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 71 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Wi n d ow s Operating S ystem
CD/DVD

A n operat ing s ys t e m is used as a n


interm ediar y b e t w e e n ha rd wa r e
and software

Devi ce D ri v e r
CD/DVD

A n application used
to install the device
a n d peripherals of a
c o m p u t e r s ys t e m s
a n d net w or ks

R S 232 pin
insertion/extraction
to ol

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 72 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
R S 2 3 2 and D -S u b
P i n Ins ert i on a n d
Removal Tool

Co mp u te r N etw ork i ng
T ools a n d Devi ce a n d
Illustratio ns
their Fu n c t i o n s

Crimping Tool

A cri mp in g tool is a tool


desi gned to c ri mp or
connect a conne ct or t o the
end of a cable. For
example, net wo rk cables
a n d p h o n e cabl es a r e
creat ed us i n g a cri m pi ng
tool to connect t he R J -
4 5 a n d R J -1 1 co nn e ct o rs
to the e n d of the cable. In
t he pi ct ure t o t he right, is
an ex a m pl e of w h at a
crimping tool looks like.
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 73 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
This exampl e shows a tool
capable o f crimpi ng bot h
R J -1 1 a n d R J -4 5
conn ect ors.

LAN Tester

A Device used for


t est ing n e t w o r k
cable connectivity

U T P Unshielded
Twisted Pair Cat 5
Cable

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 74 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
A cable used for
c o m p u t er
networking

R J 4 5 C o n n ector

A plastic connector
used for UTP Cable
to connect
computers in a
net work

E th ern et S w i t ch

A network
s w i t ch or sw i tch i n g
h u b is a c o m p u t e r
networking
d e v i c e t hat
connects net work
s egm ent s or net wo rk
devices

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 75 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
R e f e ren c es
1. h t t p : / / w w w . w o r kc o v e r . n s w . go v . a u / O H S / d e f a u l t . h t m
2. www.cengageasia.com
3. www.wikipedia.com
SELF-CHECK NO. 1.1-5

A. IDENTIFICATION.
Direction: Identify the Precautions a n d Procedures write T R U E if the
statem ent is correct a n d F A L S E if the statem ent is wron g.

________1. Protective Eyewear enclose or protect the nose area in order to


prevent particulates, infectious fluids, o r chem i cal s

________2. Uni -tester is an electronic device for m easuring instrument that


c o m b i n e s several m e a s u r e m e n t a n d funct ions

________3. Fliers are hand tool used to hold objects firmly for beding or physical
C om p r essi on

________4. A screw is a tool for driving screws and often rotating other machine
el em ents wi t h the m at i ng dri ve s yst em
________5. A Soldering G u n is a tool for soldering metals using tin-based solder
to achieve a highl y conductive cont act

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 76 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
B. MATCHING TYPE
Direction: Sel ect yo ur answer o n the choices b el o w that will correspond on the
statem ent. W ri t e the letter of yo ur an sw e r o n the space provi ded.

1. Mirror
2 . F l a s h l i ght
3. Gloves
4. Tweezers
5. IC Insertion a n d Extracting To ol

______ 1. A hand held portable electric light source


______ 2. Used for extracting and inserting B IO S Chip
______ 3. Used for inspecting peripherals
___ __ _ 4. Intended for pi cking up objects too sm all for h u m a n hands
______ 5. Used for hand protection

C o m p a r e y o u r an s w er s w i th th e A n s w e r K e y o n th e n ext p age. If y ou
get 8 0 % a n d a b ov e , t h e n y o u m a y p r o c e e d to t h e n e x t acti vi ty b u t if
n ot, m a s t e r t h e l ess on a n d t a k e t h e S elf -C h e c k a gai n .

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 77 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
ANSWER KEY 1.1-5

C. IDENTIFICATION

1. FALSE
2. FALSE
3. FALSE
4. FALSE
5. TRUE
D. MULTIPLE CHOICE

1. G
2. J
3. F
4. I
5. H

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 78 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
EVIDENCE PLAN

QUALIFICATION: COMPUTER SYSTEM SERVICING – NC II


Title of Eval uati on INSTALL AND CONFIGURE COMPUTER
SYSTEMS
Units of INSTALL AND CONFIGURE COMPUTER
competency SYSTEMS
cov ered

W a y s in w h i c h evi den ce will b e collected:

Written Exam i nati on

Dem onst rat i on wi t h


[tick the column]

Observation wi th
Questioni ng

Questioni ng
T h e e v i d e n c e m u s t s h o w th at t h e trai n ee …
P l ans a n d prepares unit a s s e m b l y to ensu re O H & S
policies a n d procedures , sequences the w or k
X X X
appropri atel y in ac c ordance w i t h s yst em s
requirements
Identifies a n d obtains m aterials necessary t o com pl et e
the w o r k i n ac co rd a nc e wi t h es tablished procedu res X X X
a n d c h e c k s agai nst s ys t e m s re qui r em en t s
Obt ai ns tools, e q u i p m e n t a n d testing devi ces i n
installation w o r k w h i c h est ablishes proc edures a n d t o X X
com pl y wi t h requirements
As s em bl es c om put e r hardw are in accordance wi t h
X X
es t abli shed p r o c e d u r e s a n d s ys t e m s r e q u i r e m e n t s

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 79 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Obt ai ns tools, eq ui p m en t a n d testing devi ces w h i c h
n e e d s t o carr y o u t installation w o r k that est abli shes X X X
a n d checks p rocedu r e for correct operation a n d safet y

Configures Basic-input-output-s ystem ( B IOS ) in


X X X
a cc o rd an c e wi t h h a r d w a r e requi rem ent s
Creat es portable bootable devices in accordance wit h
s of t w a r e m an uf a ct ur e r i nst ruct ion X X

P repares c ust om i z ed installers i n accord a nce wi t h


s oft ware utilization gui de a n d e n d user a gr e em ent X X X

Carri es out installation o f port able appli cations i n X


accordance wi t h software user gui de a nd software
license

Installs Operating system (OS) in accordance with X


established installation procedures and to com pl y with
e n d -us er r e q u i r e m e n t s

Installs and configures p eripherals/devices drivers in X X


a c c o r d a n c e w i t h m a n u f a c t u r e r ’ s i nst ructi ons a n d / o r
O S installation procedures.

Acces s es a n d installs O S a n d drivers X X


upd at es / p at ch es i n a c c o r d a n c e w i t h m a n u f a c t u r e r ’ s
r e c o m m e n d a t i o n s a n d r e qui r em ent s

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 80 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Undertakes o n -going checks of the qu ality of the w or k
in ac co rd an c e wi t h established p ro c e du re s X X

X X
Installs a pplication software b ased o n software
installation gui d es , e n d -use r r eq ui r em en t s a n d
software license agre em ent

X X
Carries out v ariation to application soft ware
installation i n a c c o r d a n c e t o cust om er/ c l i ent
r equ i r em ent s

X X X
Ac c es s es a n d installs s oft war e updat es i n accord anc e
wi t h m anufact ure r’s r e c o m m e n d a t i o ns a n d
r equ i r em ent s

T e s t s d e v i c e s / s ys t e m s a n d / o r inst all at ion t o X


det erm ine whet h e r it con f or m s to requi rem ent s

X
C o n d u c t s s tress test to ensure reliabilit y of e q u i pm e n t
in a c c o r d a n c e w i t h m an u fa ct u re r ’s i nst ructi ons a n d
s ys t e m r equi rem ent s

X X X
F ollo w s 5 S and 3 R s according to environmental
policies

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 81 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
X X
F o r w a r d s d o c u m e n t a t i o n to appropri at e personnel a n d
/or aut hori t y i n rel ati on t o t he test i n a c c o r d a n c e w i t h
r equ i r em ent s

Identifies t he different com put er operating s yst em s


X X X

Enu m e r at ed t he different peripheral devices


X X
Application packages & use of application pro gram s
X

Identifies m ot h e rboard properl y


X X
Identifies video cards properl y
X X

Identifies s o u n d card
X X

NOTE: *Critical aspects of competency

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 82 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
Table of Specification
Objectives/ # of
Content Area/ Knowledge Co mp reh en si ve Application Items/ %
Topics o f test

Unit assembly
is p l a n n e d a n d
prepared to
ens ure O H & S
policies a n d
p r o c e d u r e s a r e (5) (2) (3) (10)
followed, the
w o r k is 10% 4% 6% 20%
appropriatel y
sequenced in
a cc o r dance with
r eq u i re men ts

Operating
system (OS) is
installed in
accordance with
established (2) (3) (5) (10)
installation 4% 6% 10% 20%
procedures and
to comply with
end-user
requirements

Documentation
in relation to
the test is
forwarded to (1) (1) (3) (5)
appropriate 2% 2% 6% 10%
personnel
and/or
authority in
accordance

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 83 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
with
r equ i r em ent s

Computer
h a r d w a r e is
assembled in (2) (3) (10) (15)
a c c or d a nc e wi t h
est abl ished 4% 6% 20% 30%
procedures and
s ys t e ms
r e qui r e ment s
T oo ls,
e q u i p men t a n d
testing devices
n e e d e d to carry
o u t t he
installation
w o rk are
obtained in
(5) (3) (2) (10)
a cc o r dance with
es t abli shed 10% 6% 4% 20%
procedures and
c h e c k e d for
correct
operation and
safety

(15) (12) (23) (50)


TOTAL
34% 24% 42% 100%

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 84 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
PERFORMANCE TEST

Trainee: ______________________________________ Score: _____________


Qualification: __________________________________ Date: ______________

UNIT OF COMPETENCY: ASSEMBLE COMPUTER HARDWARE

I. MULTIPLE CHOICE
DIRECTION: Select the best answer f rom a m o n g the choices given. W ri t e
yo u r a n s w e r o n yo u r a n s w e r sheet s. ( 1 5 m i n u t e s t i m e l i mi t. 1 0 i t e m s e a c h )

1. In O H S policies a n d procedures, O H S st ands for:


A. Occupat ional Heal t h a n d Safet y
B. Operat ional Heal th a n d S afet y
C . Occupati onal H e l p and Safet y
D. None of Above
2. Before starting the ________, read carefully the docum entat ion
a n d pro ce du r es o n a n y h a r d w a r e a n d so f t w ar e s ettings t hat m a y
be required.
A. Inspection
B. Installation
C . Intonation
D. None of the Above
3. Fail ure t o d o t he pr op e r j u m p e r setting m a y c a u s e d a m a g e t o
your ________.
A. Monitor

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 85 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
B. Printer
C. CPU
D. All of the Above

4. Without an effective ________, the C P U can overheat and cause


d a m a g e to bot h C P U a n d t he m ot herboard.
A. Cooling Fan
B. Heat Sink
C. Motherboard
D. All of the Above

5. E a c h b a n k m u s t hav e the s a m e _ _ _ _ _ a n d t ype of m e m o r y


installed i n pairs.

A. Size
B. Speed
C. Accuracy
D. All of the Above

6. B e fo r e a ddi n g a n d r e m o v i n g a n y other s ys t e m com po ne nt s, m a k e


sure that you unplug your _________.

A. Motherboard
B. UPS
C. P ower Suppl y
D. All of the Above

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 86 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
7. Fail ure t o d o s o m a y c a u s e d a m a g e t o yo u r m o t h e r b o a r d a n d i n
the _________.

A. Solar S yst em
B. S ys t em C o m p o n e n t
C . S hoot S ys t e m
D. None of the Above

8. T e s t t h e c o m p uter, i ns ur i n g t hat it m e e t s t he n e c e s s a r y s y s t e m
requirements before _________.

A. Booting U p
B. Heating U p
C. W arm i ng U p
D. All of the Above

9. If the computer does not pass any of the ________________ (POST),


the computer will receive an irregular_________________. An
irregular P O S T is a beep code whi ch is different f r o m the
st andard b e e p w h i c h c a n either b e n o b e e p s at all or a
combination of different beeps.

A. Power on Self-Test
B. P ow er on Suppl y-Test
C. P ower on S yst em -Test
D. None of the Above

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 87 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
10. S o m e effects of comput ers relating to the violation of privacy,
the i m pact o n the __ ___ __ , health risks, a n d the i m pact o n t he
envi r onm ent .
A. Strike Force
B. Lightning Force
C. Labor Force
D. None of the Above.

II. MATCHING TYPE


Directions: M a t c h the appropriate description of the following. Refer to the
selection o f w o r d s o n the t op a n d m a t c h t h e m t o the questionnaires b e l o w .
W r i t e t he letter o f yo u r a n s w e r i n yo u r a n s w e r sheets. (1 0 m i n u t e s t i me limit.
10 items each)

A . Fu nd am ent al s of Operati ng S ys t e m

A. Operating S ys t e m
B. Application P rogram s
C . Ti m e -Sharing Operating S ys t e m
D. Multi-User Operating S ys t e m
E. Single-Tasking S ys t em
F. Dist ri but ed Ope r a t i n g S ys t e m
G. E m b e d d e d Operat ing S ys t em
H. K en Tho m ps on
I. M a c O S X
J. Li n u s T o r v a l d
CBLM Computer System Date Developed: Document No. DHS CSS-001-16
March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 88 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
1. R e q u i r e a n operat i ng s ys t e m w h i c h a r e usual l y sep arat e
pr o gr am s, but c a n b e c o m b i n e d i n si m pl e s yst em s.
2. Is a set o f p r o g r a m s t hat m a n a g e c o m p u t e r h a r d w a r e
resources a n d provide c o m m o n services for application
software.
3. It al l ow s m u l t i p l e users t o a c ce ss a c o m p u t e r s ys t e m
concurrentl y. T i m e -sharing s ys t e m c an b e classified as m ul ti -
us er s ys t e m s a s t h e y e n a b l e a m ul t i pl e u se r a c c e s s t o a
c o m p u t e r t h r ou gh t he shari n g of t i m e.
4. H e b e g a n t he Li n u x kernel project i n 1991, i n a universit y i n
Fi nl and.
5. Is a line of o p e n core graphi cal operati ng s yst em s developed,
m a rketed, a n d sold b y A p p l e Inc., t he latest of w h i c h is pre-
l oaded o n all current l y shi ppi ng Ma ci n t o sh com put e rs.
6. H e wrote B, m ai nly bas ed o n B C P L, w hi c h he used to write
Unix, based on his experience in the M U L T IC S project.
7. A n operating s ys t e m de si gn ed to b e u se d i n e m b e d d e d
c o m p u t e r s yst em s.
8. A n operat i ng s ys t e m t yp e that m a n a g e s a gr o u p of i n de p en de nt
c o m p u t e r s a n d m a k e s t h e m a p p e a r t o b e a si ngl e c o m p u t e r .
9. W h e n onl y a single p r o g r a m is al l ow e d to r un at a time, t he
s ys t e m is g r o u p e d u n d e r this s ys t e m .
10. A n operati ng sys t e m t ype that sche dul e t asks for efficient
use of the s ys t e m a n d m a y also i ncl ude account i ng for cost
allocation o f processor tim e, m a s s storage, printing, a n d other
r esourc es.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 89 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
III. TRUE OR FALSE
Directions: Write T R U E if the statement is T R U E . If the statement is FA LS E.
W r i t e yo u r a n s w e r s i n yo u r a n s w e r sheet s. (5 m i n u t e s t i m e limi t. 5 i t e m s
each).

A. Qualification for a C om put er Hard war e Servicing Personnel

___________ 1. Anyone can do an installation as long as he knows how to


do it.
___________ 2. The Departm ent of Education, Culture and Sports conducts
the assessm ent for N C II C om put e r Ha rd ware Servicing.
___________ 3. Computer Technicians need not to have a strong oral
com m uni cat i on skill.
___________ 4. Companies prefer candidates with previous pc repair
experience, a n d t he y m a y l ook for candi dates wi t h
experi ence i n repai ri ng b r an d ed com put e r.
____________ 5. P C Technicians must be able to jump, bend and reach to
acc ess t he c o m p u t e r e q u i p m e n t requi ri ng repair.

IV. Modified TRUE OR FALSE


Directions: Write T R U E if the statement is TR U E . If the statement is F A LS E
ch an ge t he underli ned w o r d a n d write t he correct answer. W r i t e yo u r a ns w er s
i n yo u r a n s w e r sheet s. (1 0 m i n u t e s t i m e li mi t. 1 5 i t e m s e a c h . W r o n g
spelling w rong)
A. C o m p u t e r Devi ces a n d Peripherals
1. A c o m p u t er is a n elect roni c m a c h i n e , operat i ng u n d e r t he cont rol
of instructions st ored in its o w n m e m o r y, that c a n b e p r o g r a m m e d

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 90 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
to accept data (input), process it into useful information (output),
and store it a w a y in a secondar y storage device (store) for
safekeepi n g o r later reuse.
2. T h e e n c o d i n g o f i nput into out p ut is di rect ed b y t he sof t wa r e b ut
perform ed b y the hardware. Fi gure b el ow sh ow s s o m e c o m m o n
c o m p u t e r h a r d w a r e c o m p o n e n t s.
3. C o m p u t e r s ys t e m h a r d w a r e c o m p o n e n t s i ncl ud e d evi c es t hat
p e r f o r m t he functio n s of input, processi ng, d a t a storage; o ut p ut
a n d transfer.
4. I n p u t d evi c es a l l o w yo u t o ent er dat a or c o m m a n d s i n a f o r m that
t he c o m p u t e r c a n us e; t h e y s e n d t he d at a o r c o m m a n d s t o t he
processi n g unit.
5. I n p u t d evi c es s h o w pe op l e t he p ro c e sse d dat a --inform at i on --in
und e rst a nd abl e a n d useful f o r m .
6. P rocessi n g devi c e s are the c o m p ut e r electronic circuitry h o u s e d in
t he s y s t e m p r o c e s s i n g .
7. T h e circuit r y i n t he s ys t e m uni t is part o f a circuit b o a r d c al l ed t he
moth erboard.
8. T h e m e m o r y , fo r m al l y k n o w n a s t he c en t r al p r o c e s s i n g u n i t
( C P U ) , has electronic circuitry that m anipul at es i nput dat a into the
i nform at i on peopl e wa nt . C o m p u t e r instructions a r e actuall y are
ex e cut e d i n t he cent ral pr o ce ssi n g unit.
9. M e m o r y is a series o f electronic el ement s that t em porari l y hol ds
dat a a n d p r o g r a m instructions w h i l e t he y are b ei n g proc esse d b y
the C P U. –t
1 0. B ot h the processor a n d m e m o r y consist o f chips. A chip is
a n electric d e v i c e t hat cont ai ns m a n y m i c r o s c o p i c p a t h w a ys
desi gned t o carr y electrical current.

1 1. S t or a ge usual l y m e a n s p r i m a r y s t o r a g e that c a n store d at a


a n d p r o g r a m s out si de t he c o m p u t e r itself.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 91 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
1 2. C o m m u n i c a t i o n s d evi ces p rovi de connect ions b e t w e e n the
c o m p u t e r a n d c o m m u n i c a t i o n s n et wo rk s , a n d en a bl e c o m p u t e r
users t o c o m m u n i c a t e a n d to e x c h a n g e dat a, i nform at i on, a n d
p r o gr a m s w i t h other com put ers.
1 3. T h e s y s t e m u n i t is a b o x -like c as e that h o u s e s t h e
processor, m e m o r y a n d other electronic c o m p o n e n t s of the
c o m p u t e r t hat a r e u s e d t o p r o c e s s dat a .
1 4. W h e n the cover of a s yst em unit is rem oved, the
m ot h e rb oa r d , also calle d s y s t e m b o a r d , ca n b e s ee n inside t he
hou s i ng.
1 5. A n interior circuit (IC) contains m a n y m icroscopic
pat hw a ys capabl e of carr ying electrical current.

V. COMPLETION

C om pl et e t he sent ence b y giving t he right a ns w er in the blanks. W ri t e you r


a n s w e r i n yo u a n s w e r she et s . ( 1 0 m i n u t e s t i m e li mit. 1 0 i t e m s e a c h . W r o n g
spelling w rong)
A. Tool s and Eq ui p m en t
1. en cl os e or prot ect t he e ye ar ea i n or d e r t o pr e ve nt parti cul ates,
infectious fluids, or chemicals is called___________.
2. A n el ect roni c m e a s u r i n g i n st rum e nt t hat c o m b i n e s several
measurement functions in one unit is called_____________.
3. A h an d tool used to hol d objects firmly, for b endi ng, or physi cal
compression is called_________.
4. A tool for driving screws an d often rotating ot her m achi ne
elements with the mating drive system is called___________.
5. A tool for soldering m et al s usi ng tin-based sol der to achi eve a
highly conductive contact is called_______________.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 92 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
6. Too l s u se d for r e m o v i n g the m ol t e n solder s o that the joint m a y b e
separated are called_______________.
7. A is a h a n d -held portabl e electric-p o w e r e d light source is
called__________.
8. Tool s us ed for picki ng u p objects t oo sm al l to b e easil y h a ndl ed
with the human hands are called _________________.
9. A ga rm ent u s e d for coveri n g a n d prot ecting t he w h o l e h a n d is
called___________.
10. A peripheral w h i c h produces a text or graphics o f d o c u m e n t s
stored in electroni c f orm , usuall y o n physi cal print m e d i a such as
paper or transparencies is called________________.

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 93 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
ANSWER KEYS
I. MULTIPLE CHOICE
1. A
2. B
3. C
4. A
5. A
6. C
7. B
8. A
9. A
10. C

II. MATCHING TYPE


A.
1. B
2. A
3. D
4. J
5. I
6. H
7. G
8. F
9. E
10. C

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 94 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
III. TRUE OR FALSE
A.
1. FALSE
2. FALSE
3. FALSE
4. TRUE
5. FALSE
IV. Modified TRUE or FALSE
A.
1. TRUE
2. PROCESSING
3. COMMUNICATION
4. TRUE
5. OUTPUT DEVICE
6. SYSTEM UNIT
7. TRUE
8. PROCESSOR
9. TRUE
10. ELECTRONIC DEVICE
11. SECONDARY STORAGE
12. TRUE
13. TRUE
14. TRUE
15. INTEGRATED CIRCUIT

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 95 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0
V. COMPLETION

A.

1. PROTECTIVE EYEWEAR
2. MULTI-METER OR MULTI-TESTER OR VOM METER
3. PLIER
4. SCREWDRIVER
5. SOLDERING GUN OR IRON
6. DESOLDERING TOOLS
7. FLASHLIGHT
8. TWEEZERS
9. GLOVE
10. PRINTER

CBLM Computer System Date Developed: Document No. DHS CSS-001-16


March 2,2016
Servicing,NC II Issued by:
Date Revised:

Installing and Developed by: Page 96 of 96


Configuring Computer Donald B. Mandac
Systems Revision # 0

Potrebbero piacerti anche