Sei sulla pagina 1di 49

INFORMATION CHS N.C.

LEVEL : II
COMMON PERFORM COMPUTER OPERATIONS
SHEETS # 1 Module 1 LO. 1

UNIT OF COMPETENCY : PERFORM COMPUTER OPERATIONS

MODULE TITLE : Performing Computer Operations

MODULE DESCRIPTION : This module covers the knowledge, skills, attitudes and values needed to perform computer
operations which include inputting, accessing, producing, and transferring data using the
appropriate hardware and software.

NOMINAL :

CERTIFICATE LEVEL : NC II

PREREQUISITE :

SUMMARY OF LEARNING OUTCOMES:

LO 1. Plan and prepare for task to be taken / undertaken

LO 2. Input data into computer

LO 3. Access information using computer

LO 4. Produce output/data using computer systems

LO 5. Use basic functions of a Web browser to locate information

LO 6. Maintain computer equipment and systems

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 1 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON PERFORM COMPUTER OPERATIONS
SHEETS # 1 Module 1 LO. 1

MAIN TYPES OF COMPUTER


HISTORY OF COMPUTERS
It could rightly be called the first mechanical computing device. It was used as far back as 2,600 B.C and is still
ABACUS used today.

The first mechanical calculating machine that was developed by Blaise Pascal in the early 1600s. This device
PASCALINE could add and subtract. Later Gottfried von Leibnitz developed a calculator that could also multiply and divide.

This was invented by weaver Joseph Jacquered in LOOM the early 1800s that uses punched cards to record
AUTOMATED LOOM data.

This is where modern computer history began. This machine was proposed by Charles Babbage in ENGINE
DIFFERENCE ENGINE the 1800s which bears the resemble of today’s computers which is capable of computing and at the same time
print results.

The American chapter of computer history began when Herman Hollerith successfully completed his tabulating
ELECTROMECANICAL ENGINE machine for the Census Bureau in 1890.

ELECTRONIC COMPUTER John Anatasoff is generally credited with building the first electronic computer as lowa State University.

MARK I Was developed by Howard Aiken with the help of IBM, is the first large-scale, general-purpose,
electromechanical computer. It was completed in 1994.
This was the world’s first large-scale electronic digital computer which was developed by J. Presper Eckert and
ENIAC John Mauchly in 1946. This computer is designed to calculate missile trajectories.

EDSAC and EDVAC Was later developed by mathematician John von Neuman in the 1940s which runs in the concept of stored
programs.
UNIVAC This is the first commercial computer which was completed and delivered to the U.S. Census Bureau in 1951.

What are the Different Types of Computers?

There are many types of computers, but personal computers such as desktop and laptop computers are probably the two
type of computers that you think of first.

Desktop Computers

Example Desktop Computer

Many people use desktop computers, or desktops as they are often referred to, at work, home, school, or the library. They
can be small, medium, or large in style, and usually sit on a desk. The term desktop actually refers to the casing, or the
tower. Once you add a monitor, mouse, and a keyboard, you have what is typically known as a desktop computer.

Most desktop computers are easy to upgrade and expand, or add new parts. In addition to expandability, another benefit of
desktop computers is the cost. If you compare a desktop computer with 128 MB of RAM and a 2 GB hard drive to a laptop
with the same features, you will most likely find that the desktop computer is priced lower.

The term desktop computer originated when the computer case was wide and flat, and was designed specifically to fit on
your desktop with the monitor on top.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 2 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON PERFORM COMPUTER OPERATIONS
SHEETS # 1 Module 1 LO. 1

Laptop Computers

Example Laptop Computer

The second type of computer that you may be familiar with is a laptop computer, or laptops as they are often referred to.
Laptops are battery or AC-powered personal computers that can be easily carried and used in a variety of locations.

A quick glance at the size of a laptop and you might guess that it would be difficult to expand or upgrade. While the
desktop computer case is relatively easy to open and access internal components, the small laptop case makes this more
difficult in comparison; however, the primary benefit of a laptop computer is its small size and easy portability.

A laptop computer is sometimes called a notebook computer because of its size.

Types of Personal Computers

iMac all-in-one computer

Two popular types of personal computers are the IBM compatible and Macintosh computers. The first personal computer
was produced by IBM in 1981 and was called the IBM PC. In 1984, Apple Computer introduced the Macintosh, or Mac, and
it became the first widely sold personal computer with a graphical user interface or GUI (pronounced gooey). Although both
IBM and Apple computers are personal computers, the term PC came to refer to IBM or IBM-compatible personal
computers.

Apple now produces a Macintosh computer called the iMac, which is a desktop computer that features an all-in-one design.
This means all the internal components are located behind the monitor, rather than in a tower case, which is customary in
desktop computers.

While our training is intended for people who use PCs and the Windows operating system.

Other Types of Computers

You may hear someone refer to a computer as a workstation or a server, especially at work. You may wonder how these
two items are different from desktop computers.

Workstations are similar to desktop computers, but are more powerful and are usually connected to a network. Servers are
specialized computers that store and deliver, or “serve up,” information to other computers on a network.

There are many different types of servers such as file servers, database servers, and web servers. For example,
employees at a company might store all the business documents on a file server so that they can share files and access

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 3 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON PERFORM COMPUTER OPERATIONS
SHEETS # 1 Module 1 LO. 1

then from any computer on the network. When you use your browser to click a link, a web server delivers the page you
requested on the Internet, the biggest network in the world.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 4 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

PARTS OF THE COMPUTER


If you use a desktop computer, you might already know that there isn't any single part called the "computer." A computer is
really a system of many parts working together. The physical parts, which you can see and touch, are collectively called
hardware. (Software, on the other hand, refers to the instructions, or programs, that tell the hardware what to do.)

The illustration below shows the most common hardware in a desktop computer system. Your system may look a
little different, but it probably has most of these parts. A laptop computer has similar parts but combines them into
a single notebook-sized package.

System unit

The system unit is the core of a computer system. Usually it's a rectangular box placed on or underneath your desk. Inside
this box are many electronic components that process information. The most important of these components is the central
processing unit (CPU), or microprocessor, which acts as the "brain" of your computer. Another component is random access
memory (RAM), which temporarily stores information that the CPU uses while the computer is on. The information stored in
RAM is erased when the computer is turned off.

Almost every other part of your computer connects to the system unit using cables. The cables plug into specific ports
(openings), typically on the back of the system unit. Hardware that is not part of the system unit is sometimes called a

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 1 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

peripheral device or device.

Storage

Your computer has one or more disk drives—devices that store information on a metal or plastic disk. The disk preserves the
information even when your computer is turned off.

Hard disk drive

Your computer's hard disk drive stores information on a hard disk, a rigid platter or stack of platters with a magnetic surface.
Because hard disks can hold massive amounts of information, they usually serve as your computer's primary means of
storage, holding almost all of your programs and files. The hard disk drive is normally located inside the system unit.

CD and DVD drives

Nearly all computers today come equipped with a CD or DVD drive, usually located on the front of the system unit. CD drives
use lasers to read (retrieve) data from a CD, and many CD drives can also write (record) data onto CDs. If you have a
recordable disk drive, you can store copies of your files on blank CDs. You can also use a CD drive to play music CDs on
your computer.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 2 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD drive, you can watch movies on your
computer. Many DVD drives can record data onto blank DVDs.

Tip

If you have a recordable CD or DVD drive, periodically back up (copy) your important files to CDs or DVDs. That way, if your
hard disk ever fails, you won't lose your data.

Floppy disk drive

Floppy disk drives store information on floppy disks, also called floppies or diskettes. Compared to CDs and DVDs, floppy
disks can store only a small amount of data. They also retrieve information more slowly and are more prone to damage. For
these reasons, floppy disk drives are less popular than they used to be, although some computers still include them.

Why are floppy disks "floppy"? Even though the outside is made of hard plastic, that's just the sleeve. The disk inside is
made of a thin, flexible vinyl material.

Mouse

A mouse is a small device used to point to and select items on your computer screen. Although mice come in many shapes,
the typical mouse does look a bit like an actual mouse. It's small, oblong, and connected to the system unit by a long wire
that resembles a tail. Some newer mice are wireless.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 3 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

A mouse usually has two buttons: a primary button (usually the left button) and a secondary button. Many mice also have a
wheel between the two buttons, which allows you to scroll smoothly through screens of information.

When you move the mouse with your hand, a pointer on your screen moves in the same direction. (The pointer's appearance
might change depending on where it's positioned on your screen.) When you want to select an item, you point to the item
and then click (press and release) the primary button. Pointing and clicking with your mouse is the main way to interact with
your computer. For more information, see Using your mouse.

Keyboard

A keyboard is used mainly for typing text into your computer. Like the keyboard on a typewriter, it has keys for letters and
numbers, but it also has special keys:

 The function keys, found on the top row, perform different functions depending on where they are used.
 The numeric keypad, located on the right side of most keyboards, allows you to enter numbers quickly.
 The navigation keys, such as the arrow keys, allow you to move your position within a document or webpage.

You can also use your keyboard to perform many of the same tasks you can perform with a mouse. For more information,
see Using your keyboard.

Monitor

A monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the information
is called the screen. Like a television screen, a computer screen can show still or moving pictures.

There are two basic types of monitors: CRT (cathode ray tube) monitors and LCD (liquid crystal display) monitors. Both
types produce sharp images, but LCD monitors have the advantage of being much thinner and lighter. CRT monitors,
however, are generally more affordable.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 4 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

LCD monitor (left) CRT monitor (right)

Printer

A printer transfers data from a computer onto paper. You don't need a printer to use your computer, but having one allows
you to print e-mail, cards, invitations, announcements, and other materials. Many people also like being able to print their
own photos at home.

The two main types of printers are inkjet printers and laser printers. Inkjet printers are the most popular printers for the home.
They can print in black and white or in full color and can produce high-quality photographs when used with special paper.
Laser printers are faster and generally better able to handle heavy use.

Speakers

Speakers are used to play sound. They may be built into the system unit or connected with cables. Speakers allow you to
listen to music and hear sound effects from your computer.

Computer speakers

Modem

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 5 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

To connect your computer to the Internet, you need a modem. A modem is a device that sends and receives computer
information over a telephone line or high-speed cable. Modems are sometimes built into the system unit, but higher-speed
modems are usually separate components.

Cable modem

MAIN PARTS OF A COMPUTER

A typical PC contains the following hardware:

There are many other possible hardware components, such as a DVD, CD-RW, Zip drive or network card. There are also
many subcomponents of a PC, such as the cooling fan, printer port or reset switch to name a few. This article focuses on the
basic PC hardware. The hardware in the list above is nearly universal to a basic PC.

What are the main components of my computer and what are their function. An important question, also what should I be
looking for in my computer's components, here I will explain the main parts of a computer system and what each part does,
and some examples of some good ones to use.

Case + PSU

A computer case is what contains the entire computer's components, there will be space for drives, add-in cards and the
motherboard. In addition to this, space for the Power Supply Unit (PSU).

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 6 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Depending on the size of motherboard that you have and the need for space in your computer
there are a variety of computer case sizes to accomodate the computer's components.

Things to consider are desk space, cooling, room for expansion and cost. With these things in
mind you should have no problem selecting the correct case for your needs.

Listed below are the cases with the advantages and disadvantages of each, most cases cost more the larger they get
however very small cases are normally more expensive than the bigger ones!

Mini - Ideal for people who need a PC in a very small space, for the Micro ATX motherboards. Advantages - Look cool,
saves loads of space, added features. Disadvantages - Cost, little/no room for expansion, problems of overheating with fast
processors.

Slimline - Ideal for people who want a desktop computer, but dont want a huge box on their desk. Advantages - Look cool,
saves loads of space, added features. Disadvantages - Cost, little/no room for expansion.

Desktop - Cheap case solution for a PC. Advantages - Cheap to buy, loads of room for expansion. Disadvantages - They
are big, take up desk space. Can have overheating problems if the internal case design is poor.

Mini-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to buy, loads of room for
expansion. Disadvantages - Having it on the floor can make problems getting to the drives and cables that are too short.

Midi-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to buy, loads of room for
expansion. Disadvantages - Having it on the floor can make problems getting to the drives and cables that are too short.

Maxi-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to buy, loads of room for
expansion. Disadvantages - Having it on the floor can make problems getting to the drives and cables that are too short.

There are two basic common types for Computer Casing or chassis:

 Tower Case – it is designed to stand vertically that will lessen the space being occupied. It comes in three basic
sizes: full, midi and mini.

 Desktop Case – it is designed horizontally which are usually used for office or home PCs. It comes in two basic
sizes: standard and slimline.

STANDARD COMPUTER BOX LAYOUT

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 7 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1











CPU

The CPU or the Central Processing unit is the brain of the computer and the single most important chip in the computer.
Modern processors contain millions of transistors which are etched onto a tiny square silicon called a die, which is about the
with of a standard thumb.

The faster and better the processor the more quickly the computer will execute commands, so
your games will work faster and your applications will work more quickly and more responsively.

There are various chip producers the big two are Intel and AMD, both work well, though the Intel
chips still have a slight advantage on floating point calculations.

Central Processing Unit (CPU) or Microprocessor - The CPU is the first thing that comes to
mind when many people think about a computer's speed and performance. It is the ―heart and
brain of the computer”. The faster the processor, the faster the computer can think. In the early
days of PC computers, all processors had the same set of pins that would connect the CPU to
the motherboard, called the Pin Grid Array (PGA). These pins fit into a socket layout called
Socket 7. This meant that any processor would fit into any motherboard.
Current socket arrangements are often named for the number of pins in the PGA.
Commonly used sockets are:
 Socket LGA775 – For latest pentum 4, Pentum D, Series Core
Technologies
 Socket 478 - for older Pentium and Celeron processors
 Socket 754 - for AMD Sempron and some AMD Athlon processors
 Socket 939 - for newer and faster AMD Athlon processors
 Socket AM2 - for the newest AMD Athlon processors

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 8 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

 Socket A - for older AMD Athlon processors

With a processor, the faster the more expensive it is. Beware the price differences a lot for only a small increase in
performance, sometimes a clock speed increase of 0.2Ghz can cost £200 or more extra

RAM

RAM or Random Access Memory is the memory used by the computer while it is in operation, this memory is described as
volitile as it is wiped clean when the computer is shutdown. Again the more RAM that you have installed in your computer
the faster the computer will operate.

There are various types of RAM, they vary becuase of the increasing in processor speeds and the
need for the RAM to keep up.

You can get RAM modules in various sizes i.e. their logical sizes, the amount of data they can hold.
This range from 1MB, 2MB, 4MB, 8MB, 16MB, 32MB, 64MB, 128MB, 256MB, 512MB, 1GB, 2GB.
Nowadays you will normally only find RAM in sizes of 128MB or above.

SIMM or DIMM? The two main types of RAM are SIMM (Single Inline Memory Module) and DIMM (Dual Inline Memory
Module) all modern computers use the DIMM type of RAM.

There are 4 main types of RAM listed below and then within these there are even more types under each of these main
types.

The traditional RAM type is DRAM (dynamic RAM). The other type is SRAM (static RAM). SRAM continues to remember its
content, while DRAM must be refreshed every few milli seconds. DRAM consists of micro capacitors, while SRAM consists
of off/on switches. Therefore, SRAM can respond much faster than DRAM. SRAM can be made with a rise time as short as
4 ns. It is used in different versions in L2 cache RAM (for example pipe line BURST Cache SRAM).

DRAM is by far the cheapest to build. Newer and faster DRAM types are developed continuously. Currently, there are at
least four types:

 FPM (Fast Page Mode)


 ECC (Error Correcting Code)
 EDO (Extended Data Output)
 SDRAM (Synchronous Dynamic RAM)

Most Common DRAM used in PC’s are:

Synchronous Dynamic RAM (SDRAM)

1. Single Data Rate (SDR) SDRAM is a synchronous form of DRAM.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 9 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

2. Double data rate (DDR) SDRAM was a later development of SDRAM, used in PC memory from 2000
onwards. DDR2 SDRAM is a minor enhancement on DDR-SDRAM that mainly affords higher clock speeds and
somewhat deeper pipelining.

MotherboardThe motherboard is the main circuit board inside the PC which holds the processor, memory and expansion
slots and connects directly or indirectly to every part of the PC. It's made up of a chipset (known as the "glue logic"), some
code in ROM and the various interconnections or buses.

PC designs today use many different buses to link their various components. Wide, high-speed buses are difficult and
expensive to produce: the signals travel at such a rate that even distances of just a few centimetres cause timing problems,
while the metal tracks on the circuit board act as miniature radio antennae, transmitting electromagnetic noise that
introduces interference with signals elsewhere in the system.

Shown below is an anotated diagram of the motherboard.

The move recently is the have as much as possible on the board so there is little need for PCI and AGP expansion slots, i.e.
you have onboard sound, graphics, LAN, modem, wireless LAN and even SCSI and RAID.

Graphics Card

A video adapter (alternate terms include graphics card, display adapter, video card, video board and almost any combination
of the words in these terms) is an integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-
analog conversion, video RAM, and a video controller so that data can be sent to a computer's display. Today, almost all
displays and video adapters adhere to a common denominator de facto standard, Video Graphics Array (VGA). VGA
describes how data - essentially red, green, blue data streams - is passed between the computer and the display.

There are 3 main types of graphics card, and are divided into these types by the way that they
connect to the motherboard. They are listed below:

 PCI (Perhiperhal Component Interface) - This is the oldest type of connection and thus
the slowest, though performance is not that great it does the job fine for Windows non-
graphics applications. Often the graphics cards for PCI are very cheap.
 AGP (Accelerated Graphics Port) - With the need for faster graphics a new connector
was added to motherboard to allow faster graphics. The graphics cards available for
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 10 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

this are vastly faster than PCI offering better performance, though there is a price hike
too.
 PCI-Express - A new and most expensive type of card that fits into a PCI-Express slot
on a motherboard that supports it. The bandwidth to the card is much greater and thus
the performance of the card.

Monitor – an output device used for visual display of information.


If you are looking at your computer’s monitor for extended periods of time it is
important to find one which offers the maximum comfort for your eyes. The trend with
monitors is toward ever higher resolution with increased number of colors.

The table shows the types of monitor and their comparative features in terms of
resolution, scanning rate and number of colors.

TYPE OF Scanning
Resolution Color Palette
MONITOR Rate (KHz)
Monochrome
640 x 350 1 1 15.75
Composite
Color Composite 640 x 200 4 4 15.75
Monochrome (TTL) 720 x 350 1 1 18.40
RGA (CGA) 640 x 200 4 16 15.75
EGA 640 x 350 16 64 21.80
Multiscan 800 x 600 Unlimited Unlimited 15.5 to 35.0
PGA 640 x 480 Unlimited Unlimited 30
VGA 640 x 480 256 262.000 31.49
1200 x 800
Super High Varies Varies 30 to 75
+
1200 x 800
LCD Varies Varies 40 to 100
+
Sound Card 1200 x 800
Touch Screen Varies Varies 45 to 100
+
A type of expansion board on PC–compatible computers that allows the playback and recording of sound, such as from a
WAV or MIDI file or a music CD–ROM. Most PCs sold at retail include a sound card.

Quite commonly now motherboards come with built on sound cards, they seem to be perfectly
useable, although some of the older onboard sound cards are awful.

Any modern motherboard you should be okay with. If you want extra performance you can buy a
sound card, this fits in a spare PCI slot.

Network Card

A network card allows you to connect your PC to a network, it acts as the interface between the network medium (cable,
radio waves etc.) and your PC. There are various types of network cable, however now you will only really find UTP
(Unshielded Twisted Pair) CAT 5/5e/6 and wireless 802.11a/b/g network cards.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 11 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Again most motherboards have built on Network Cards and they are normally fine to use.

You can pick up a PCI network card for around £8 and up. Intel or 3com cards seem to be the
best and most stable in my experience, though they do cost a bit more.

You can connect two PCs together with some network cable or more than two with a hub/switch to which you connect more
PCs, see my networking section about this.

LAN Card/Ethernet Card/Network Interface Card (NIC) – an expansion card inserted in the computer to be connected into
a network.

Wireless LAN PCI LAN Card ISA LAN Card


Card
Router – an internetworking devices that passes data packets between networks and makes decision regarding the best
path for delivery of data on a network.

Networking Media
RJ 45 Connector

UTP Cable (Unshielded Twisted Pair)

Modems - (which is short for modulator/demodulator) converts the digital data signal of the PC into the
analog data signal that is used on the plain old telephone system (POTS) — which is also called the
public telephone switched network (PTSN).

Modems can be installed inside the PC in an expansion slot, or they can be attached to the PC externally
through a serial or USB port. An internal modem is installed like any other expansion card — into a compatible
expansion slot.

Internal Modem External Modem


Hub or Switch – a common connection point of a network

Floppy Disk Drive

A floppy disk is a data storage device that comprises a circular piece of thin, flexible (hence "floppy") magnetic storage
medium encased in a square or rectangular plastic wallet. Floppy disks are read and written by a floppy disk drive or FDD,
not to be confused with "fixed disk drive", which is an old IBM term for a hard disk drive.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 12 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Floppy disk drives use a small flat disk called a "diskette" the information is stored on it
magnetically.

There are various types of size of floppy disk, nowadays all you will find are High Density 1.44MB
3.5" disks. Below is a list of the various types of 3.5 Inch disks:

360KB - Single Density

720KB - Double Density

1.44MB - High Density

2.88MB - Ultra High Density

Floppy disks are on the way out, though they are still used when installing an OS on a computer, though with bootable CD-
ROMs even this use is on the way out it all seems to be going to CDs or USB pen drives (also called a "Think Stick.")

Hard Disk Drive

This is a non-volitile storage medium, all modern PCs will have one if not more than one. A magnetic disk that stores data.
Usually a fixed disk, permanently sealed in the drive, though possibly a removable hard disk. A hard disk can store a huge
amount of data up to 400GB on one disk. Access time is much faster than soft (floppy) disks. The head that reads the data
floats over the hard disk's surface, while the head of the floppy disk touches the disk's surface while reading or writing data.

The main thing that differenciates drives from one another, other than the size is the interface they
use to connect to the PC.

The two main PC interfaces are SCSI and IDE (ATA) they are listed below:

SCSI (Small Computer System Interface) most commonly found on servers or Apple Macintoshes
SCSI allows for the "daisy-chaining" of up to 7 devices per bus. It has always had the image of being
faster, more expandable and more reliable though IDE keeps getting better.

IDE (Integrated Drive Electronics) and ATA (AT Attachment) is what you will commonly need on your PC for home or small
office use a ATA drive is more than enough. It is cheaper to buy an ATA drive and ATA/IDE drive controllers are built on to
all motherboards as standard.

IDE drives are rated by ATA 33, ATA 66, ATA 100 and ATA 150 the larger the number the faster the drive can transfer data.

Hard drives are one of the computer components that have plumetted in price over the years, now you can get a 40GB drive
for under £40.

Removable Storage Drive

Removable storage drives, things kind of like a removable hard disk became very popular but now with the Internet and USB
memory sticks they seem to have gone out of favour again. The Iomega Zip drive was one of the most widely used, but
suffered from the problem that the storage capacity was small and the costs of the drive and media were expensive
especially for the larger sizes.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 13 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Often these drives work by having a hard disk drive like disk that is contained in a case
so it can be removed easily and transported protecting the disk and its contents.

A Iomega Zip Drive is around £80 and plugs into the USB port, nowdays to ensure there is no need for a Zip Drive on the
other computer you are moving data to, it just needs a USB port and away you go!

CD Drive
CD-ROM drives are necessary today for most programs. A single CD can store up to
650 MB of data (newer CD-Rs allow for 700 MB of data, perhaps more with
"overburn"). Fast CD-ROM drives have been a big topic in the past, but all of today's
CD-ROM drives are sufficiently fast. Of course, it's nice to have the little bits of extra
speed. However, when you consider CD-ROM drives are generally used just to install
a program or copy CDs, both of which are usually done rarely on most users'
computers, the extra speed isn't usually very important. The speed can play a big role
if you do a lot of CD burning at high speeds or some audio extraction from audio CDs
(i.e. converting CDs to MP3s).

CD-Writer Drive

CD-R (which stands for Recordable) drives (aka burners, writers) allow a user to create their own CDs of audio and/or data.
These drives are great for backup purposes (backup your computer's hard drive or backup your purchased CDs) and for
creating your own audio CD compilations (not to mention other things like home movies, multimedia presentations, etc.).

With a CD writer you can burn to a CD once, it works by WORM (Write Once Read
Many). You can make multiple sessions on a disk so you can write a bit one day and
a bit more another up to the storage capacity. But unlike CD-RW you can't erase it all
and start again.

Normal capacities for these CDs are 650MB/74Min or 700MB/80Min. Note some older drives will not support 700MB/80Min
discs.

CD-Writer & Re-Writer Drive

CD-R/RW (which stands for Recordable / ReWritable) drives (aka burners, writers) allow a user to create their own CDs of
audio and/or data. These drives are great for backup purposes (backup your computer's hard drive or backup your
purchased CDs) and for creating your own audio CD compilations (not to mention other things like home movies, multimedia
presentations, etc.).

With a CD-R/RW you can write to a CD then erase its contents and rewrite over it all
again.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 14 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Normal capacities for these CDs are 650MB/74Min or 700MB/80Min. Remeber RW discs will not always work in normal CD-
Drives and rarely work in Audio CD Players.

DVD-ROM Drive

DVD-ROM drives can store up to 4 GB of data or about 6 times the size of a regular CD (not sure on the exact size, but
suffice to say it's a very large storage medium). DVDs look about the same and are the same size as a CD-ROM. DVD
drives can also read CD-ROM drives, so you don't usually need a separate CD-ROM drive.

DVD drives have become low enough inprice that there isn't much point in
purchasing a CD-ROM drive instead of a DVD-ROM drive. Some companies even
make CD burner drives that will also read DVDs (all in one). DVD's most practical
use is movies.

The DVD format allows for much higher resolution digital recording that looks much clearer than VCR recordings.

DVD-Writer Drive

DVD recordable drives are available in a couple of different formats - DVD-R or DVD+R with a RW version of each. These
are slightly different discs and drives (although some drives support writing to both formats). One is not much better than the
other, so it really boils down to price of the media (and also availability of the media).

You can fit up to 4.3GB on a single DVD disc, and now some drives support
multiple layers with 2 x 4.3GB i.e. 8.6GB per disc.

All the CD standards are a bit confusing so here is a table showing them, note that some of these standards and the
equipment built to them have gone the way of Betamax and the Dinosaurs.

Now a run down of each of the standards and what each one can do.

Standard Description
Compact Disc Read Only Memory - This is a disc that only allows for reading can store up to 650MB or
CD-ROM
700MB.
Compact Disc Recordable - This disc allows for you to write once to a disc, i.e. you can erase it and
CD-R
start again. Stores up to 650/700MB.
Compact Disc ReWritable - This disc allows for you to write many times on one disc, i.e. you can erase
CD-RW
it and start again. Stores up to 650/700MB.
DVD-ROM Digital Versatile/Video Disc - This disc only allows for reading can store up to 4.3GB.
Digital Versatile/Video Disc - Recordable -This disc allows for you to write once to a disc, i.e. you can
DVD R+ erase it and start again, can store up to 4.3GB. Note that one is plus and one minus you need to select
the correct disc for your drive.
DVD R- Digital Versatile/Video Disc - Recordable - This disc allows for you to write once to a disc, i.e. you can
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 15 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

erase it and start again, can store up to 4.3GB. Note that one is plus and one minus you need to select
the correct disc for your drive.
Digital Versatile/Video Disc - ReWritable - This disc allows for you to write many times on one disc, i.e.
DVD RW+ you can erase it and start again. Stores up to 4.3GB. Note that one is plus and one minus you need to
select the correct disc for your drive.
Digital Versatile/Video Disc - ReWritable - This disc allows for you to write many times on one disc, i.e.
DVD RW- you can erase it and start again. Stores up to 4.3GB. Note that one is plus and one minus you need to
select the correct disc for your drive.
Digital Versatile/Video Disc - Random Access Memory - DVD-RAM has the best recording features but
DVD-RAM it is not compatible with most DVD-ROM drives and DVD-Video players. Think more of it as a
removable hard disk.
Any comments or suggestions please mail me, i'll try to update this page when I can, with more useful information about
computers and the like.

STORAGE DEVICES

USB Drive Floppy Disk Hard Disk Drive Other Storage Devices

Digital audio tape can also refer to a compact cassette with digital storage.

Digital Audio Tape (DAT or R-DAT) is a signal recording and playback medium developed by Sony in the mid 1980s. In
appearance it is similar to a compact audio cassette, using 4 mm magnetic tape enclosed in a protective shell, but is roughly
half the size at 73 mm × 54 mm × 10.5 mm.

A hard disk drive[1] (often shortened as "hard disk"[2] or "hard drive"[3]), is a main storage device of the computer or is a non-
volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces.

When installing two hard drives, it is necessary to check the jumper setting for the Master/Slave configuration. The jumper
pins for Master/Slave can be found between the power connector and IDE ribbon cable connector. Every hard drive
manufacturer has different pin configurations which is found on the information pasted in the hard drive itself

 Master is used for the first hard drive


 Slave is for the second hard drive.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 16 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

USB flash drive consists of a NAND-type flash memory data storage device integrated with a USB (universal serial bus)
interface. USB flash drives are typically removable and rewritable, much smaller than a floppy disk (1 to 4 inches or 2.5 to
10 cm), and most USB flash drives weigh less than an ounce (28g). [1] Storage capacities typically range from 64 MB to 128
GB[2] with steady improvements in size and price per gigabyte. Some allow 1 million write or erase cycles [3][4] and have 10-
year data retention,[5] connected by USB 1.1 or USB 2.0.

Different RAM Types and its uses

The type of RAM doesn't matter nearly as much as how much of it you've got, but using plain old SDRAM memory today will
slow you down. There are three main types of RAM: SDRAM, DDR and Rambus DRAM.

SDRAM (Synchronous DRAM)


Almost all systems used to ship with 3.3 volt, 168-pin SDRAM DIMMs. SDRAM is not an extension of older EDO DRAM but
a new type of DRAM altogether. SDRAM started out running at 66 MHz, while older fast page mode DRAM and EDO max
out at 50 MHz. SDRAM is able to scale to 133 MHz (PC133) officially, and unofficially up to 180MHz or higher. As
processors get faster, new generations of memory such as DDR and RDRAM are required to get proper performance.

DDR (Double Data Rate SDRAM)


DDR basically doubles the rate of data transfer of standard SDRAM by transferring data on the up and down tick of a clock
cycle. DDR memory operating at 333MHz actually operates at 166MHz * 2 (aka PC333 / PC2700) or 133MHz*2 (PC266 /
PC2100). DDR is a 2.5 volt technology that uses 184 pins in its DIMMs. It is incompatible with SDRAM physically, but uses a
similar parallel bus, making it easier to implement than RDRAM, which is a different technology.

Rambus DRAM (RDRAM)


Despite it's higher price, Intel has given RDRAM it's blessing for the consumer market, and it will be the sole choice of
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 17 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

memory for Intel's Pentium 4. RDRAM is a serial memory technology that arrived in three flavors, PC600, PC700, and
PC800. PC800 RDRAM has double the maximum throughput of old PC100 SDRAM, but a higher latency. RDRAM designs
with multiple channels, such as those in Pentium 4 motherboards, are currently at the top of the heap in memory throughput,
especially when paired with PC1066 RDRAM memory.

DIMMs vs. RIMMs


DRAM comes in two major form factors: DIMMs and RIMMS.

DIMMs are 64-bit components, but if used in a motherboard with a dual-channel configuration (like with an Nvidia nForce
chipset) you must pair them to get maximum performance. So far there aren't many DDR chipset that use dual-channels.
Typically, if you want to add 512 MB of DIMM memory to your machine, you just pop in a 512 MB DIMM if you've got an
available slot. DIMMs for SDRAM and DDR are different, and not physically compatible. SDRAM DIMMs have 168-pins and
run at 3.3 volts, while DDR DIMMs have 184-pins and run at 2.5 volts.

RIMMs use only a 16-bit interface but run at higher speeds than DDR. To get maximum performance, Intel RDRAM chipsets
require the use of RIMMs in pairs over a dual-channel 32-bit interface. You have to plan more when upgrading and
purchasing RDRAM.

DRAM

SDRAM

SIMM
PRINTER

Printer is an output device which is connected to computer to get permanent output. The output of printer is also called
Hard Copy. There are two types of printers (a) Impact printers (b) non-impact printers.

The main categories are:


- Laser printers,
- Ink-jets,
- Dot-matrix,
- Multifunctional, etc.
Normally home computer users will use ink-jets as they are relatively cheap but superior in quality to dot-matrix. Laser jets
and other printers created by new technology are more expensive and more commonly found in the offices.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 18 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Ink-jets(bubble-jets) p+rinters spray ionized tiny drops of ink onto a page to create an image. This is achieved by using
magnetized plates which direct the ink's path onto the paper in the desired pattern. Almost all ink-jets offer a color option
as standard, in varying degrees of resolution. Ink-jet printers are capable of producing high quality print which almost
matches the quality of a laser printer. A standard ink-jet printer has a resolution of 300 dots per inch, although newer
models have improved on that. As a rule color link-jet printers can also be used as a regular black and white printer.

Laser printers operate by shining a laser beam to produce an image on a drum. The drum is then
rolled through a pool, or reservoir, or toner, and the electrically charged portions of the drum pick up ink. Finally, using a
combination of heat and pressure, the ink on the drum is transferred onto the page. Laser printers print very fast, and the
supply cartridges work a long time. Color laser printers use the same toner-based printing process as black and white (
B/W) laser printers, except that they combine four different toner colors. Color laser printers can also be used as a regular
black and white laser printer.

Flatbed Scanners

Flatbed scanners will take up some desktop space but provide a lot of bang for the buck. They look like miniature printers
with a flip-up cover protecting the glass platen. Depending on their size, these can fit standard or legal-sized documents, and
the flexible cover allows you to scan large items such as books. These scanners are great for scanning the occasional
newspaper article, book chapter, or photograph; or for those who may need to scan or bulky items such as the cover of a
DVD. Flatbed scanners are often built into multifunction printers (MFPs). You can find decent flatbed scanners for $100 or
less.

Photo Scanners

Sheetfed scanners are smaller than flatbed scanners; as the name implies, you feed a document or photo into the scanner
rather than place it on top. You’ll win back some of that desktop space with a sheetfed scanner but you may sacrifice some
resolution in the process. If you’re only scanning documents, however, it may be a worthwhile trade, especially if you’ve got
a lot of them since you can feed them in bunches. With a flatbed scanner, you’ll have to scan one page at a time (unless it
comes with an automatic document feeder).

Portable Scanners

Portable scanners are small enough to bring on the road. In fact, some are small enough to put in your pocket; pen scanners
are just a bit bigger than fountain pens and can scan the text of a document line by line. Some are as wide as a page and roll
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 19 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

easily down the page. They’re not going to give high-resolution scans and so aren’t good for scanning photographs or other
applications where you need a high-quality result. Since they’re not cheaper than flatbed scanners, they’re probably only
useful if you are a student, a researcher, or a spy. Figure on spending about $150 for one.

KEYBOARD
- is an input device, partially modeled after the typewriter keyboard, which uses an arrangement of buttons or keys, which act
as mechanical levers or electronic switches. A keyboard typically has characters engraved or printed on the keys and each
press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and
holding several keys simultaneously or in sequence. While most keyboard keys produce letters, numbers or signs
(characters), other keys or simultaneous key presses can produce actions or computer commands.

Different types of computer keyboards:

ERGONOMIC: Often when someone refers to an "ergonomic", "split", or "natural" keyboard, they mean the type of
keyboard which has an empty area in between two sets of keys, which have a different layout intended to be more
ergonomic than typical keyboard types.

AT: The abbreviation "AT" can be used when referring to any keyboard made for AT-class (most computers made
since the mid-1990s) computers, including standard PS/2 keyboards. However, it is most frequently used to
describe keyboards with a large 5-pin connector; these fit some pre-Pentium and Pentium I/II computers, but
require an "AT-to-PS/2" adapter to be connected to most computers, because they have a different (PS/2) jack.

USB: Some newer keyboards connect to a computer's USB port (a small rectangular port) rather than a PS/2 port.
This doesn't offer any great benefit, as humans can't possibly type fast enough to take advantage of USB's faster
data transmission speeds. Some older computers lack USB ports.

ADB: This refers to a different type of accessory port/jack on some Apple computers which ADB keyboards can be
connected to. For computer types which don't have an ADB port, adapters are available which allow them to be
plugged into a USB port.

XT: Keyboards referred to with the abbreviation "XT" can be used with some older types of computers (8086/8088,
XT-286) but won't work with most computers being used at present. Many of them have fewer keys than modern
keyboards. AT/XT keyboards are more versatile; they can be used with both older and newer computers and usually
have an AT/XT switch on the back. XT and AT/XT keyboard types are more likely to have the larger, backward-"L"
shaped "Enter" key, rather than the smaller straight kind on many newer keyboards.
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 20 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

MOUSE

(Plural mouses, mice, or mouse devices) is a pointing device that functions by detecting two-dimensional motion
relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or
more buttons. It sometimes features other elements, such as "wheels", which allow the user to perform various system-
dependent operations, or extra buttons or features can add more control or dimensional input. The mouse's motion typically
translates into the motion of a pointer on a display, which allows for fine control of a Graphical User Interface.

LO1 PERFORM COMPUTER OPERATIONS

JOB SHEET # 1

DEMONSTRATION: Configure all parts you see below, give exact location (you can draw or label its components,
peripherals, and equipment)

1 2 3 4

5 6 7 8

9 10 11 12

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 21 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

COMPONENTS OF A COMPUTER
In this lesson, we take a look at the different components of a computer system.
After this lesson, you will be able to
 Define the primary components that make up a computer

Estimated lesson time: 10 minutes


As you might expect, the components of a computer reflect the function of the machine—specifically, the three stages of
computing, as outlined in Lesson 1. Let's examine the components.

Input Devices
The following table lists some examples of devices that are used to put information into a computer.

Device Description
Keyboard
The primary input device for a computer, allowing users to type information just
as they once did on a typewriter.

Mouse
Used with graphical interface environments to point to and select objects on the
system's monitor. Can be purchased in a variety of sizes, shapes, and
configurations.

Scanner
Converts printed or photographic information to digital information that can be
used by the computer. Works similar to the scanning process of a photocopy
machine.

Microphone

Works like the microphone on a tape recorder. Allows input of voice or music to
be converted to digital information and saved to a file.

CD-ROM/DVD drive
Compact disc–read only memory: stores large amounts of data on a CD that can
be read by a computer.

Processing

The central processing unit (CPU) is the heart and brain of the computer. This one component, or "chip," is responsible for
all primary number crunching and data management. It is truly the centerpiece of any computer. It is so important that whole
generations of computer technology are based and measured on each "new and improved" version of the CPU.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 22 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

When we refer to the CPU, we are usually speaking of the processor. However, the CPU requires several other components
that support it with the management of data to operate. These components, when working in harmony, make up the primary
elements of the PC we know today. The following table lists these fundamental support components.

Component Description
Motherboard

The main circuit board of the computer. The large circuit board found
inside the computer. Without it, a computer is just a metal box. The
motherboard contains all the remaining items in this table; for all practical
purposes, it is the computer.

Chip set
A group of computer chips or integrated circuits (ICs) that, when working
together, manage and control the com- puter system. This set includes
the CPU and other chips that control the flow of data throughout the
system.

Data bus

A group of parallel conductors (circuit traces) found on the motherboard


and used by the CPU to send and receive data from all the devices in the
computer.

Address bus A group of parallel conductors (circuit traces) found on the motherboard
and used by the CPU to "address" memory locations. Determines which
information is sent to, or received from, the data bus. An address bus is
a computer bus (a series of lines connecting two or more devices) that is
used to specify a physical address. When a processor or DMA-enabled
device needs to read or write to a memory location, it specifies that
memory location on the address bus (the value to be read or written is
sent on the data bus).
Expansion slots

Specialized sockets that allow additional devices called expansion cards


or, less commonly, circuit boards, to be attached to the motherboard.
Used to expand or customize a computer, they are extensions of the
computer's bus system.

Establishes the maximum speed at which the processor can execute


Clock commands. Not to be confused with the clock that keeps the date and
time.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 23 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Battery
Protects unique information about the setup of the computer against loss
when electrical power fails or is turned off. Also maintains the external
date and time (not to be confused with the CPU's clock).

Memory

Stores temporary information (in the form of data bits) that the CPU and
software need to keep running.

Output Devices

The following table lists some common devices, known as peripherals, used exclusively for output.

Device Description
Printer
Generates a "hard copy" of information. Includes dot matrix, ink jet, and
laser varieties.

Monitor

The primary output device. Visually displays text and graphics.

Plotter
Similar to a printer, but uses pens to draw an image. Most often used with
graphics or drawing programs for very large drawings.

Speakers

Reproduce sound. Optional high-quality speakers can be added to provide


improved output from games and multimedia software.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 24 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 25 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Input and Output

Some devices handle both input and output functions. These devices are called input/output (I/O) devices, a term you will
encounter quite often.

Device Description
Floppy disk drive
Mechanism for reading and writing to low-capacity, removable, magnetic
disks. Used to store and easily transport information.

Hard disk drive

High-capacity internal (and sometimes external) magnetic disks for storing


data and program files. Also called fixed disks.

Modem

Converts computer data to information that can be transmitted over


telephone wires and cable lines. Allows communication between
computers over long and short distances.

Network card
An expansion card that allows several computers to connect to each other
and share information and programs. Also called network interface card
(NIC).

CD recorder Also called CD-R. You can copy data to a CD with this device, but you can
only write to a section of the disc once. Variations on this type of device
include compact disc–rewritable (CD-RW) drives. These drives allow you
to read, write, and overwrite a special CD-ROM-type disc.
Tape drive
Large-capacity, magnetic, data storage devices. Ideal for backup and
retrieval of large amounts of data. Works like a tape recorder and saves
information in a linear format.

Other external storage devices include Iomega Zip drives, which allow users to store 100 MB or 250 MB of data on a single
Zip disk.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 26 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

Other Computer Parts and Accessories

the following table lists some examples of cable that are used to communicate to a system.

Cable/ Cord Description


IDE (ATA/PATA Cable) IDE is also known as ATA or PATA (Parallel ATA) and is a way of
handling a parallel data bus from a disk drive (well, usually a disk drive)
to a computer mother board where the disk controller is mostly
embedded in the disk drive.
SATA (Serial ATA) is an advance on this where the signals are sent
SATA/ATA over a serial bus not a parallel bus. The cable is much smaller and it will
run at higher speed and will support more than 2 drives on a bus.

Note: They are both ways to connect a disk drive to a computer. You
use the one that matches your computer mother board (old ones
support IDE only, newer ones will support SATA and may support both
SATA and IDE) and your disk drive (disk drives are either IDE or SATA,
never seen one with both available).
USB Cable

USB cable is a cable that is used to connect a device to a computer or


laptop or Printer, Video cameras, Mp3, mp4 even cell phone.

A/V Cable

A/V cable is to use for connect a device to tv and it has the video and
audio cable.

Heat Sink An environment capable of absorbing heat from an object with which it
is in thermal contact without a phase change or an appreciable change
in temperature.

A protective device that absorbs and dissipates the excess heat


generated by a system.
USB HUB
A device that increases the number of USB ports on a PC. However,
since the hub plugs into one of the USB ports on the computer, the total
number of additional ports is minus one. For example, a four-port hub
adds three new ports. USB hubs are typically used to extend USB
sockets to the top of the desk for conveniently connecting external
peripherals.

Power Cord
A power cord, line cord, or mains cable is a cord or cable that
temporarily connects an electrical appliance to the distribution circuits of
an electrical power source via a wall socket or extension cord.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 27 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

AVR (Automatic Voltage Regulator)


A voltage regulator is an electrical regulator designed to automatically
maintain a constant voltage level.

It may use an electromechanical mechanism, or passive or active


electronic components. Depending on the design, it may be used to
regulate one or more AC or DC voltages.

An uninterruptible power supply, also uninterruptible power


source, UPS or battery/flywheel backup, is an electrical apparatus
UPS (Uninterruptible Power Supply) that provides emergency power to a load when the input power source,
typically the utility mains, fails. A UPS differs from an auxiliary or
emergency power system or standby generator in that it will provide
instantaneous or near-instantaneous protection from input power
interruptions by means of one or more attached batteries and
associated electronic circuitry for low power users, and or by means of
diesel generators and flywheels for high power users. The on-battery
runtime of most uninterruptible power sources is relatively short—5–15
minutes being typical for smaller units—but sufficient to allow time to
bring an auxiliary power source on line, or to properly shut down the
protected equipment
Computer Fan
A computer fan is any fan inside a computer case used for cooling
purposes, and may refer to fans that draw cooler air into the case from
the outside, expel warm air from inside, or move air across a heatsink to
cool a particular component. The use of fans to cool a computer is an
example of active cooling.

Laptop/Notebook cooler A laptop/notebook cooler, cooler pad or chill mat is an accessory for
laptop computers that helps reduce their operating temperature.
Normally used when the laptop's fan device is unable to sufficiently cool
the laptop, a cooling pad may house active or passive cooling methods
and rests beneath the laptop. Active coolers move air or liquid to direct
heat away from the laptop quickly, while passive methods may rely on
thermally conductive materials or increasing passive airflow.
TV Tuner or TV Video Capture
A TV tuner card is a computer component that allows television signals
to be received by a computer. Most TV tuners also function as video
capture cards, allowing them to record television programs onto a hard
disk.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 28 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

SUPPORT HARDWARE

Lesson 2 covered the basic hardware that makes up a computer. There are, however, additional components needed to
support safe computer operation. In this lesson, we look at several devices that protect and enhance the value of a
computer.
After this lesson, you will be able to

 Identify additional support hardware for a computer


 Understand the functions of some of the add-on hardware

Estimated lesson time: 5 minutes


In addition to the devices that support a computer's data-processing functions, there are others that enhance its operation
and performance. The following table lists some of these devices.

Device Description
Power supply
Converts a local power source (typically 110 volts AC in the United States)
to 3.3, 5, or 12 volts DC. Most power supplies also perform some basic line
conditioning and surge-protection functions.

Surge suppressor

Used to prevent large power spikes (for instance, lightning) from damaging
a computer.

UPS
Uninterruptible power supply. Acts as both a surge suppresser (to prevent
high-power spikes) and a power leveler to provide the computer with a
constant source of power. Can even provide power during a power failure
or interruption (although the duration depends on the UPS and the
computer's power consumption) so that the user can safely save data
before shutting down.

Case
The box that houses most of the system must provide an environment that
minimizes electrical interference to other electronic devices in the area. It
should provide a proper heat level for safe operation and bays and
connections for drives, circuit boards, and I/O devices.

Don't let the term support hardware lead you to underestimate the importance of these components. How important are
roads to commerce, or water to a city? Without a reliable power source, modern PCs would not exist. The internal power
supply keeps a clean current running to the system.
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 29 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 2 Module 1 LO. 1

SELF CHECK # 3

The following questions are intended to reinforce key information presented in this chapter. If you are unable to answer a
question, review the appropriate lesson and then try the question again. Answers to the questions can be found in Appendix
A, "Questions and Answers."

1. Describe the three stages of computing and the role of each.


2. What is the purpose of the central processing unit (CPU)?
3. Describe two devices that process information inside a computer.
4. What is a chip set?
5. Name and describe three input devices.
6. What type of device is a scanner?
7. Describe three output devices.
8. What is I/O?
9. Name three I/O devices.

ANSWER SELF CHECK # 3

1. Describe the three stages of computing and the role of each.


The three stages of computing are input, processing, and output. Input receives data from outside the
current process, or the machine. Processing is the phase where the data received from input is operated
on by the application code. Output is the result of the process. The output may actually be the input for
another process.
2. What is the purpose of the central processing unit (CPU)?
The central processing unit (CPU) is the heart and brain of the computer. This one component or "chip"
does all the number crunching and data management.
3. Describe two devices that process information inside a computer.
The CPU and the chip set process information inside a computer.
4. What is a chip set?
A chip set is a group of computer chips or ICs (integrated circuits) that, when working in harmony,
manage and control the computer system.
5. Name and describe three input devices.
The mouse, keyboard, microphone, and scanner are examples of input devices. The keyboard accepts
character data that is converted from impulses into an inert value, representing the character on the
individual key. A microphone converts analog pulses into a digital format that can be used or stored by
the computer. A scanner uses an optical array to convert data into a graphic format that can be used or
edited.
6. What type of device is a scanner?
A scanner is an input device.
7. Describe three output devices.
The printer, monitor, and speakers are examples of output devices. A printer produces a hard copy form of
the contents of a file, the monitor produces a visual representation of the user interface, and the speakers
convert digital information into an analog form that is understood as sound by the human ear.
8. What is I/O?
Many devices can handle both input and output functions. These devices are called I/O devices.

Name three I/O devices.


The floppy disk drive, hard disk drive, mo

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
QA
Performing Computer Operations
Revision: 0 Page 30 of 30
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 3 Module 1 LO. 1

Common Types of Computer Software

Computer Software is the languages of the computer. And like the human languages, there are many different computer
languages. Essentially, Computer software can be divided into three main groups depending on their use and application
these are:

1. System software or Operating System software

Is the software used by the computer to translate inputs from various sources into a language which a machine
can understand. Basically the System software or the operating system software coordinates the different
hardware components of a computer. There are many OS in the market. The most popular OS are from the stable
of Windows, Microsoft has migrated to Vista, its latest offering in the market. It may come as a surprise to some `
that there are other operating systems used by others. Among these UNIX is use for large office setups with
extensive networking. XENIX is software which has now become redundant. HP –UX and AIX are some operating
system used by HP computers. Apache OS is quite popular with web servers. IBM is still uses proprietary
operating system for its main frames. Proprietary systems are generally built with the help of a variant of UNIX
operating system.

2. Application software

A normal user rarely gets to see the operating system or to work with it. But all of us are familiar with application
software which we must use to interact with computer. Popular example of application software are the Microsoft
office suite which include word, excel, and PowerPoint. We have use this application extensively. Internet
explorer , Mozilla Firefox is two applications software used to access the internet.

Application Software - also provides support to the physical components of computers. System software
coordinates all external devices of computer system like printer, keyboard, displays etc.

Application software is used for commercial purpose. The application software is widely used in educational,
business and medical fields. Computer games are the most popular forms of application software. Industrial
automation, databases, business software and medical software prove to be of great help in the respective fields.
Educational software is widely used in educational institutes across the globe.

3. Programming Languages;
Programmers use the programming software to develop the programming languages necessary to run computer
software. Compliers, interpreters, linkers and text editors are some of the basic tools used in programming
software.

Programming program or Programming Languages

Now this a kind of computer software which is used exclusively by computer programmers. Unless we are also
programmers, we are unlikely to come across programming languages. A simple way to understand programming
languages is to think of them as bricks which can be used to create application and operating system. C++, Java
and SIMLAB are some popular programming languages. Generally java is used for internet application. C++ is a
language of a professional developers and used extensively in developing operating system. PHP is another
languages used for internet applications. There is a new class of languages which are utilized for mobiles. These
are light weight, modular languages which are used to design mobile application.

Computer software fall under three basic categories; system software or operating system software, application
software, and Programming languages. We usually use application on a day to day basis. These application are
themselves created using programming languages.

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
Computer Software
QA Revision: 0 Page 1 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 3 Module 1 LO. 1

OTHER TYPES OF SOFTWARE

There are many different types of software, which can be a little confusing for the uninitiated. Following is a brief definition of
each type, and the differences between them.

Retail software: This type of software is sold off the shelves of retail stores. It includes expensive packaging designed to
catch the eye of shoppers and, as such, is generally more expensive. An advantage of retail software is that it comes with
printed manuals and installation instructions, missing in hard-copy form from virtually every other category of software.
However, when hard-copy manuals and instructions are not required, a downloadable version off the Internet will be less
expensive, if available.

OEM software: OEM stands for "Original Equipment Manufacturer" and refers to software sold in bulk to resellers,
designed to be bundled with hardware. For example, Microsoft has contracts with various companies including Dell
Computers, Toshiba, Gateway and others. Microsoft sells its operating systems as OEM software at a reduced price, minus
retail packaging, manuals and installation instructions. Resellers install the operating system before systems are sold and
the OEM CD is supplied to the buyer. The "manual" consists of the Help menu built into the software itself. OEM software is
not legal to buy unbundled from its original hardware system.

Shareware: This software is downloadable from the Internet. Licenses differ, but commonly the user is allowed to try the
program for free, for a period stipulated in the license, usually thirty days. At the end of the trial period, the software must be
purchased or uninstalled. Some shareware incorporates an internal clock that disables the program after the trial period
unless a serial number is supplied. Other shareware designs continue to work with "nag" screens, encouraging the user to
purchase the program.

Crippleware: This software is similar to shareware except that key features will cease to work after the trial period has
ended. For example, the "save" function, the print function, or some other vital feature necessary to use the program
effectively may become unusable. This "cripples" the program. Other types of crippleware incorporate crippled functions
throughout the trial period. A purchase is necessary to unlock the crippled features.

Demo software: Demo software is not intended to be a functioning program, though it may allow partial functioning. It is
mainly designed to demonstrate what a purchased version is capable of doing, and often works more like an automated
tutorial. If a person wants to use the program, they must buy a fully functioning version.

Adware: This is free software that is supported by advertisements built into the program itself. Some adware requires a live
Internet feed and uses constant bandwidth to upload new advertisements. The user must view these ads in the interface of
the program. Disabling the ads is against the license agreement. Adware is not particularly popular.

Spyware: Spyware software is normally free, but can be shareware. It clandestinely "phones home" and sends data back to
the creator of the spyware, most often without the user's knowledge. For example, a multimedia player might profile what
music and video files the software is called upon to play. This information can be stored with a unique identification tag
associated with the specific program on a user's machine, mapping a one-to-one relationship. The concept of spyware is
very unpopular, and many programs that use spyware protocols were forced to disclose this to users and offer a means to
turn off reporting functions. Other spyware programs divulge the protocols in their licenses, and make acceptance of the
spyware feature a condition of agreement for using the software.

Freeware: Freeware is also downloadable off the Internet and free of charge. Often freeware is only free for personal use,
while commercial use requires a paid license. Freeware does not contain spyware or adware. If it is found to contain either of
these, it is reclassified as such.

Public domain software: This is free software, but unlike freeware, public domain software does not have a specific
copyright owner or license restrictions. It is the only software that can be legally modified by the user for his or her own
purposes. People are encouraged to read licenses carefully when installing software, as they vary widely.
TESDA Document No. ICT/CBLM
OCTAVS Issued by: Date: 06-10-2010
Computer Software
QA Revision: 0 Page 2 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 3 Module 1 LO. 1

GENERAL SECURITY, PRIVACY LEGISLATION AND COPYRIGHT

The security of software is threatened at various points throughout its life cycle, both by inadvertent and intentional choices
and actions taken by “insiders”—individuals closely affiliated with the organization that is producing, deploying, operating, or
maintaining the software, and thus trusted by that organization—and by “outsiders” who have no affiliation with the
organization. The software’s security can be threatened:

 during its development: A developer may corrupt the software—intentionally or unintentionally—in ways that will
compromise the software’s dependability and trustworthiness when it is operational.
 during its deployment (distribution and installation): If those responsible for distributing the software fail to
tamperproof the software before shipping or uploading, or transmit it over easily intercepted communications
channels, they leave the software vulnerable to intentional or unintentional corruption. Similarly, if the software’s
installer fails to “lock down” the host platform, or configures the software insecurely, the software is left vulnerable
to access by attackers.
 during its operation: Once COTS and open source software has gone operational, vulnerabilities may be
discovered and publicized; unless security patches and updates are applied and newer supported versions (from
which the root causes of vulnerabilities have been eliminated) are adopted, such software will become increasingly
vulnerable. Non-commercial software and open source software (OSS) may also be vulnerable, especially as it
may manifest untrustworthy behaviors over time due to changes in its environment that stress the software in ways
that were not anticipated and simulated during its testing. Any software system that runs on a network-connected
platform has its vulnerabilities exposed during its operation. The level of exposure will vary depending on whether
the network is public or private, Internet-connected or not, and whether the software’s environment has been
configured to minimize its exposure. But even in highly controlled networks and “locked down” environments, the
software may be threatened by malicious insiders (users, administrators, etc.).
 during its sustainment: If those responsible for addressing discovered vulnerabilities in released software fail to
issue patches or updates in a timely manner, or fail to seek out and eliminate the root causes of the vulnerabilities
to prevent their perpetuation in future releases of the software, the software will become increasingly vulnerable to
threats over time. Also, the software’s maintainer may prove to be a malicious insider, and may embed malicious
code, exploitable flaws, etc., in updated versions of the code.

Both research and real-world experience indicate that correcting weaknesses and vulnerabilities as early as possible in the
software’s life cycle is far more cost-effective over the lifetime of the software than developing and releasing frequent
security patches for deployed software.

Software Assurance

The main objective of software assurance is to ensure that the processes, procedures, and products used to produce and
sustain the software conform to all requirements and standards specified to govern those processes, procedures, and
products. Software security and secure software are often discussed in the context of software assurance. Software
assurance in its broader sense refers to the assurance of any required property of software. For software practitioners at th e
National Aeronautics and Space Administration (NASA), software assurance refers to the assurance of safety as a property
of software. Similarly, in other communities, software assurance may refer to assurance of reliability or quality. In the context
of this article, software assurance is concerned with assuring the security of software.

An increasingly agreed-upon approach for assuring the security of software is the software security assurance case, which is
intended to provide justifiable confidence that the software under consideration

(1) is free of vulnerabilities;


(2) functions in the “intended manner,” and this “intended manner” does not compromise the security or any other required
properties of the software, its environment, or the information it handles; and
(3) can be trusted to continue operating dependably under all anticipated circumstances, including anomalous and hostile

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
Computer Software
QA Revision: 0 Page 3 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 3 Module 1 LO. 1

environmental and utilization circumstances—which means that those who build the software need to anticipate such
circumstances and design and implement the software to be able to handle them gracefully. Such circumstances include

 the presence of unintentional faults in the software and its environment


 the exposure of the operational software to accidental events that threaten its security
 the exposure of the software to intentional choices or actions that threaten its security during its development,
deployment, operation, or sustainment

Software is more likely to be assuredly secure when security is a key factor in the following aspects of its development and
deployment:

 Development principles and practices: The practices used to develop the software and the principles that
governed its development are expressly intended to encourage and support the consideration and evaluation of
security in every phase of the software’s development life cycle. Some secure development principles and
practices for software are suggested later in this article.
 Development tools: The programming language(s), libraries, and development tools used to design and
implement the software are evaluated and selected for their ability to avoid security vulnerabilities and to support
secure development practices and principles.
 Testing practices and tools: The software is expressly tested to verify its security, using tools that assist in such
testing.
 Acquired components: Commercial off-the-shelf (COTS) and OSS components are evaluated to determine
whether they contain vulnerabilities, and if so whether the vulnerabilities can be remediated through integration to
minimize the risk they pose to the software system.
 Deployment configuration: The installation configuration of the software minimizes the exposure of any residual
vulnerabilities it contains.
 Execution environment: Protections are provided by the execution environment that can be leveraged to protect
the higher level software that operates in that environment.
 Practitioner knowledge: The software’s analysts, designers, developers, testers, and maintainers are provided
with the necessary information (e.g., through training and education) to give them sufficient security awareness
and knowledge to understand, appreciate, and effectively adopt the principles and practices that will enable them
to produce secure software.

Self-Check # 4

1. Enumerate the common types of software?

2. What is the assurance of software?

3. Safety for the Software?

TESDA Document No. ICT/CBLM


OCTAVS Issued by: Date: 06-10-2010
Computer Software
QA Revision: 0 Page 4 of 4
SYSTEM
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

DIFFERENT PARTS OF A COMPUTER KEYBOARD

The computer keyboard works much like a mouse; many keyboard shortcuts can eliminate the need for a mouse. Keys are
split into different parts of the keyboard, each providing a specific function.

Function Keys

number, ranging from F1 to F12. Each of the Function Keys performs a specific operation based upon what software is being
used.

Numeric Keypad

through 9, an asterisk, a slash, a dash, a plus sign, an enter key and a period. There is also is a "Num Lock" key, which is
used to turn on and off the Numeric Keypad.

Navigation Keys

Navigation Keys are the up, down, left and right arrows.

Typewriter Keyboard

with these keys.

Special Keys
to insert the curser) and the Shift
key (used to make capital letters or symbols that are located on the number keys).

Escape
The Escape key is located in the upper left-hand corner of the keyboard. It is used to cancel operations.

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 1 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

KEYBOARD BASICS

Keyboards differ by manufacturer and the operating system they are


designed for.

A keyboard's primary function is to act as an input device. Using a keyboard, a


person can type a document, use keystroke shortcuts, access menus, play games
and perform a variety of other tasks. Keyboards can have different keys depending
on the manufacturer, the operating system they're designed for, and whether they
are attached to a desktop computer or part of a laptop. But for the most part, these
keys, also called keycaps, are the same size and shape from keyboard to
keyboard. They're also placed at a similar distance from one another in a similar
pattern, no matter what language or alphabet the keys represent.

Most keyboards have between 80 and 110 keys, including:

 Typing keys
 A numeric keypad
 Function keys
 Control keys

The typing keys include the letters of the alphabet, generally laid out in the same pattern used for typewriters. According to
legend, this layout, known as QWERTY for its first six letters, helped keep mechanical typewriters' metal arms from colliding
and jamming as people typed. Some people question this story -- whether it's true or not, the QWERTY pattern had long
been a standard by the time computer keyboards came around.

Keyboards can also use a variety of other typing key arrangements. The most widely known is Dvorak, named for its
creator, August Dvorak. The Dvorak layout places all of the vowels on the left side of the keyboard and the most common
consonants on the right. The most commonly used letters are all found along the home row. The home row is the main row
where you place your fingers when you begin typing. People who prefer the Dvorak layout say it increases their typing speed
and reduces fatigue. Other layouts include ABCDE, XPeRT, QWERTZ and AZERTY. Each is named for the first keys in the
pattern. The QWERTZ and AZERTY arrangements are commonly used in Europe.

The numeric keypad is a more recent addition to the computer keyboard. As the use of computers in business
environments increased, so did the need for speedy data entry. Since a large part of the data was numbers, a set of 17 keys,
arranged in the same configuration found on adding machines and calculators, was added to the keyboard.

The Apple keyboard's control keys include the "Command" key.


Other common control keys include:
 Home  Page Down
 End  Control (Ctrl)
 Insert  Alternate (Alt)
 Delete  Escape (Esc)
 Page Up

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 2 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

The Windows keyboard adds some extra control keys: two Windows or Start keys, and an Application key. Apple
keyboards, on the other hand, have Command (also known as "Apple") keys. A keyboard developed for Linux users
features Linux-specific hot keys, including one marked with "Tux" the penguin -- the Linux logo/mascot.

INSIDE THE KEYBOARD


A keyboard is a lot like a miniature computer. It has its own processor and circuitry that carries information to and from that
processor. A large part of this circuitry makes up the key matrix.

The microprocessor and controller circuitry of a keyboard

The key matrix is a grid of circuits underneath the keys. In all keyboards (except for capacitive models, which we'll discuss
in the next section), each circuit is broken at a point below each key. When you press a key, it presses a switch, completing
the circuit and allowing a tiny amount of current to flow through. The mechanical action of the switch causes some vibration,
called bounce, which the processor filters out. If you press and hold a key, the processor recognizes it as the equivalent of
pressing a key repeatedly.

When the processor finds a circuit that is closed, it compares the location of that circuit on the key matrix to the character
map in its read-only memory (ROM). A character map is basically a comparison chart or lookup table. It tells the processor
the position of each key in the matrix and what each keystroke or combination of keystrokes represents. For example, the
character map lets the processor know that pressing the a key by itself corresponds to a small letter "a," but the Shift and a
keys pressed together correspond to a capital "A."

The key matrix

A computer can also use separate character maps, overriding the one found in the keyboard. This can be useful if a person
is typing in a language that uses letters that don't have English equivalents on a keyboard with English letters. People can
also set their computers to interpret their keystrokes as though they were typing on a Dvorak keyboard even though their
actual keys are arranged in a QWERTY layout. In addition, operating systems and applications have keyboard accessibility
settings that let people change their keyboard's behavior to adapt to disabilities.

KEYBOARD SWITCHES
Keyboards use a variety of switch technologies. Capacitive switches are considered to be non-mechanical because they do
not physically complete a circuit like most other keyboard technologies. Instead, current constantly flows through all parts of
the key matrix. Each key is spring-loaded and has a tiny plate attached to the bottom of it. When you press a key, it moves
this plate closer to the plate below it. As the two plates move closer together, the amount of current flowing through the
matrix changes. The processor detects the change and interprets it as a key press for that location. Capacitive switch
keyboards are expensive, but they have a longer life than any other keyboard. Also, they do not have problems with bounce
since the two surfaces never come into actual contact.

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 1 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

All of the other types of switches used in keyboards are mechanical in nature. Each provides a different level of audible and
tactile response -- the sounds and sensations that typing creates. Mechanical key switches include:

 Rubber dome
 Membrane
 Metal contact
 Foam element

This keyboard uses rubber dome switches.

Rubber dome switches are very common. They use small, flexible rubber domes, each with a hard carbon center. When
you press a key, a plunger on the bottom of the key pushes down against the dome, and the carbon center presses against
a hard, flat surface beneath the key matrix. As long as the key is held, the carbon center completes the circuit. When the key
is released, the rubber dome springs back to its original shape, forcing the key back up to its at-rest position. Rubber dome
switch keyboards are inexpensive, have pretty good tactile response and are fairly resistant to spills and corrosion because
of the rubber layer covering the key matrix.

Rather than having a switch for each key, membrane keyboards use a continuous membrane that stretches from one end to
another. A pattern printed in the membrane completes the circuit when you press a key. Some membrane keyboards use a
flat surface printed with representations of each key rather than keycaps. Membrane keyboards don't have good tactile
response, and without additional mechanical components they don't make the clicking sound that some people like to hear
when they're typing. However, they're generally inexpensive to make.

Metal contact and foam element keyboards are increasingly less common. Metal contact switches simply have a spring-
loaded key with a strip of metal on the bottom of the plunger. When the key is pressed, the metal strip connects the two parts
of the circuit. The foam element switch is basically the same design but with a small piece of spongy foam between the
bottom of the plunger and the metal strip, providing a better tactile response. Both technologies have good tactile response,
make satisfyingly audible "clicks," and are inexpensive to produce. The problem is that the contacts tend to wear out or
corrode faster than on keyboards that use other technologies. Also, there is no barrier that prevents dust or liquids from
coming in direct contact with the circuitry of the key matrix.

FROM THE KEYBOARD TO THE COMPUTER


As you type, the processor in the keyboard analyzes the key matrix and determines what characters to send to the
computer. It maintains these characters in its memory buffer and then sends the data.

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 2 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

A PS/2 type keyboard connector.

Many keyboards connect to the computer through a cable with a PS/2 or USB (Universal Serial Bus) connector. Laptops use
internal connectors. Regardless of which type of connector is used, the cable must carry power to the keyboard, and it must
carry signals from the keyboard back to the computer.

Wireless keyboards, on the other hand, connect to the computer through infrared (IR), radio frequency (RF) or Bluetooth
connections. IR and RF connections are similar to what you'd find in a remote control. Regardless of which sort of signal they
use, wireless keyboards require a receiver, either built in or plugged in to the USB port, to communicate with the computer.
Since they don't have a physical connection to the computer, wireless keyboards have an AC power connection or use
batteries for power.

Microsoft wireless keyboard

This Microsoft wireless keyboard is battery-powered.

Whether it's through a cable or wireless, the signal from the keyboard is monitored by the computer's keyboard controller.
This is an integrated circuit (IC) that processes all of the data that comes from the keyboard and forwards it to the operating
system. When the operating system (OS) is notified that there is data from the keyboard, it checks to see if the keyboard
data is a system level command. A good example of this is Ctrl-Alt-Delete on a Windows computer, which reboots the
system. Then, the OS passes the keyboard data on to the current application.

The application determines whether the keyboard data is a command, like Alt-f, which opens the File menu in a Windows
application. If the data is not a command, the application accepts it as content, which can be anything from typing a
document to entering a URL to performing a calculation. If the current application does not accept keyboard data, it simply
ignores the information. This whole process, from pressing the key to entering content into an application, happens almost
instantaneously.

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 3 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

THE MAGIC BEHIND KEYBOARDING

There really is no "magic" or secret about good typing ability. It just takes time and lots and lots of practice. However there
are some important things that will help you in the process:

**NOTE It is also important to strike the keys with a short quick stroke.

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 4 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

TIPS AND TRICKS


Please Read the following:

Learning to keyboard is not easy. It will take lots of self


discipline and patience. Sometimes it takes weeks to show
just small improvements. If you look at keyboarding as a skill
that can be mastered with lots of practice you will do fine. One
key factor to mastering keyboarding is good technique.

Correct technique is the most important skill any


beginning typist can learn. Speed and accuracy are all built
around good technique.
List of
the keyboard shortcuts that are available in Windows XP

General keyboard shortcuts


 CTRL+C (Copy)  CTRL+F4 (Close the active document in
 CTRL+X (Cut) programs that enable you to have multiple
 CTRL+V (Paste) documents open simultaneously)
 CTRL+Z (Undo)  ALT+TAB (Switch between the open items)
 DELETE (Delete)  ALT+ESC (Cycle through items in the order
 SHIFT+DELETE (Delete the selected item that they had been opened)
permanently without placing the item in the  F6 key (Cycle through the screen elements in a
Recycle Bin) window or on the desktop)
 CTRL while dragging an item (Copy the  F4 key (Display the Address bar list in My
selected item) Computer or Windows Explorer)
 CTRL+SHIFT while dragging an item (Create a  SHIFT+F10 (Display the shortcut menu for the
shortcut to the selected item) selected item)
 F2 key (Rename the selected item)  ALT+SPACEBAR (Display the System menu
 CTRL+RIGHT ARROW (Move the insertion for the active window)
point to the beginning of the next word)  CTRL+ESC (Display the Start menu)
 CTRL+LEFT ARROW (Move the insertion point  ALT+Underlined letter in a menu name
to the beginning of the previous word) (Display the corresponding menu)
 CTRL+DOWN ARROW (Move the insertion  Underlined letter in a command name on an
point to the beginning of the next paragraph) open menu (Perform the corresponding
 CTRL+UP ARROW (Move the insertion point command)
to the beginning of the previous paragraph)  F10 key (Activate the menu bar in the active
 CTRL+SHIFT with any of the arrow keys program)
(Highlight a block of text)  RIGHT ARROW (Open the next menu to the
 SHIFT with any of the arrow keys (Select more right, or open a submenu)
than one item in a window or on the desktop, or  LEFT ARROW (Open the next menu to the left,
select text in a document) or close a submenu)
 CTRL+A (Select all)  F5 key (Update the active window)
 F3 key (Search for a file or a folder)  BACKSPACE (View the folder one level up in
 ALT+ENTER (View the properties for the My Computer or Windows Explorer)
selected item)  ESC (Cancel the current task)
 ALT+F4 (Close the active item, or quit the  SHIFT when you insert a CD-ROM into the CD-
active program) ROM drive (Prevent the CD-ROM from
 ALT+ENTER (Display the properties of the automatically playing)
selected object)  CTRL+SHIFT+ESC (Open Task Manager)
 ALT+SPACEBAR (Open the shortcut menu for
the active window)

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 5 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

Dialog box keyboard shortcuts


If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an
arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to
adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself
when you move the focus to another control.

 CTRL+TAB (Move forward through the tabs)


 CTRL+SHIFT+TAB (Move backward through the tabs)
 TAB (Move forward through the options)
 SHIFT+TAB (Move backward through the options)
 ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
 ENTER (Perform the command for the active option or button)
 SPACEBAR (Select or clear the check box if the active option is a check box)
 Arrow keys (Select a button if the active option is a group of option buttons)
 F1 key (Display Help)
 F4 key (Display the items in the active list)
 BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft natural keyboard shortcuts

 Windows Logo (Display or hide the Start menu)


 Windows Logo+BREAK (Display the System Properties dialog box)
 Windows Logo+D (Display the desktop)
 Windows Logo+M (Minimize all of the windows)
 Windows Logo+SHIFT+M (Restore the minimized windows)
 Windows Logo+E (Open My Computer)
 Windows Logo+F (Search for a file or a folder)
 CTRL+Windows Logo+F (Search for computers)
 Windows Logo+F1 (Display Windows Help)
 Windows Logo+ L (Lock the keyboard)
 Windows Logo+R (Open the Run dialog box)
 Windows Logo+U (Open Utility Manager)

Accessibility keyboard shortcuts

 Right SHIFT for eight seconds (Switch FilterKeys either on or off)


 Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
 Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
 SHIFT five times (Switch the StickyKeys either on or off)
 NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
 Windows Logo +U (Open Utility Manager)

Windows Explorer keyboard shortcuts

 END (Display the bottom of the active window)


 HOME (Display the top of the active window)
 NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
 NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
 NUM LOCK+Minus sign (-) (Collapse the selected folder)
 LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
 RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
TESDA STS Document No. ICT/CBLM
Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 1 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

Shortcut keys for Character Map


After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:

 RIGHT ARROW (Move to the right or to the beginning of the next line)
 LEFT ARROW (Move to the left or to the end of the previous line)
 UP ARROW (Move up one row)
 DOWN ARROW (Move down one row)
 PAGE UP (Move up one screen at a time)
 PAGE DOWN (Move down one screen at a time)
 HOME (Move to the beginning of the line)
 END (Move to the end of the line)
 CTRL+HOME (Move to the first character)
 CTRL+END (Move to the last character)
 SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC) main window keyboard shortcuts

 CTRL+O (Open a saved console)


 CTRL+N (Open a new console)
 CTRL+S (Save the open console)
 CTRL+M (Add or remove a console item)
 CTRL+W (Open a new window)
 F5 key (Update the content of all console windows)
 ALT+SPACEBAR (Display the MMC window menu)
 ALT+F4 (Close the console)
 ALT+A (Display the Action menu)
 ALT+V (Display the View menu)
 ALT+F (Display the File menu)
 ALT+O (Display the Favorites menu)

Microsoft Internet Explorer navigation

 CTRL+B (Open the Organize Favorites dialog box)


 CTRL+E (Open the Search bar)
 CTRL+F (Start the Find utility)
 CTRL+H (Open the History bar)
 CTRL+I (Open the Favorites bar)
 CTRL+L (Open the Open dialog box)
 CTRL+N (Start another instance of the browser with the same Web address)
 CTRL+O (Open the Open dialog box, the same as CTRL+L)
 CTRL+P (Open the Print dialog box)
 CTRL+R (Update the current Web page)
 CTRL+W (Close the current window)

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 2 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

PART OF A COMPUTER MOUSE

MOUSE
In computing, a mouse is a pointing device that functions by detecting two-dimensional motion relative
to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands,
with one or more buttons. (Although traditionally a button is typically round or square, modern mice
have spring-loaded regions of their top surface that operate switches when pressed down lightly.) It
sometimes features other elements, such as "wheels", which allow the user to perform various system-
dependent operations, or extra buttons or features that can add more control or dimensional input. The
mouse's motion typically translates into the motion of a cursor on a display, which allows for fine control
of a graphical user interface.
CONNECTIVITY AND COMMUNICATION PROTOCOLS

To transmit their input, typical cabled mice use a thin electrical cord terminating in a standard connector, such as RS-232C,
PS/2, ADB or USB. Cordless mice instead transmit data via infrared radiation (see IrDA) or radio (including Bluetooth),
although many such cordless interfaces are themselves connected through the aforementioned wired serial buses.

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 3 of 11
INFORMATION CHS N.C. LEVEL : II
COMMON Perform Computer Operations
SHEETS # 4 Module 1 LO. 1

While the electrical interface and the format of the data transmitted by commonly available mice is currently standardized on
USB, in the past it varied between different manufacturers. A bus mouse used a dedicated interface card for connection to
an IBM PC or compatible computer.

Serial interface and protocol


Standard PC mice once used the RS-232C serial port via a D-subminiature connector, which provided power to run the
mouse's circuits as well as data on mouse movements. The Mouse Systems Corporation version used a five-byte protocol
and supported three buttons. The Microsoft version used an incompatible three-byte protocol and only allowed for two
buttons. Due to the incompatibility, some manufacturers sold serial mice with a mode switch: "PC" for MSC mode, "MS" for
Microsoft mode.[29]

PS/2 interface and protocol


For more details on this topic, see PS/2 connector. With the arrival of the IBM PS/2 personal-computer series in 1987, IBM
introduced the eponymous PS/2 interface for mice and keyboards, which other manufacturers rapidly adopted. The most
visible change was the use of a round 6-pin mini-DIN, in lieu of the former 5-pin connector. In default mode (called stream
mode) a PS/2 mouse communicates motion, and the state of each button, by means of 3-byte packets.[30] For any motion,
button press or button release event, a PS/2 mouse sends, over a bi-directional serial port, a sequence of three bytes, with
the following format:
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
Byte 1 YV XV YS XS 1 MB RB LB
Byte 2 X movement
Byte 3 Y movement
Here, XS and YS represent the sign bits of the movement vectors, XV and YV indicate an overflow in the respective vector
component, and LB, MB and RB indicate the status of the left, middle and right mouse buttons (1 = pressed). PS/2 mice also
understand several commands for reset and self-test, switching between different operating modes, and changing the
resolution of the reported motion vectors. In Linux, a PS/2 mouse is detected as a /dev/psaux device.

For 3-D (or 6-degree-of-freedom) input, vendors have made many extensions both to the hardware and to software. In the
late 90's Logitech created ultrasound based tracking which gave 3D input to a few millimeters accuracy, which worked well
as an input device but failed as a profitable product. In 2008, Motion4U introduced its "OptiBurst" system using IR tracking
for use as a Maya (graphics software) plugin.

USB
The industry-standard USB protocol and its connector have become widely used for mice; it's currently among the most
popular types.[33]

Cordless or Wireless
Cordless or wireless mice transmit data via infrared radiation (see IrDA) or radio (including Bluetooth). The receiver is
connected to the computer through a serial or USB port. The newer nano receivers were designed to be small enough to
remain connected in a laptop or notebook computer during transport.[34]

SELF CHECK #

Question: Give at least 25 keyboard shortcut keys and give its function

TESDA STS Document No. ICT/CBLM


Computer Keyboard Parts and
QA Issued by: Date: 06-10-2010
SYSTEM Functions Revision: 0 Page 4 of 11

Potrebbero piacerti anche