Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Instructional Resource
Chapter 1: Introduction to the
Personal Computer
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 1: Objectives
Chapter Objectives
Explain IT industry certifications.
Describe a computer system.
Identify the names, purposes, and characteristics of cases and power supplies.
Identify the names, purposes, and characteristics of internal components.
Identify the names, purposes, and characteristics of ports and cables.
Identify the names, purposes, and characteristics of input devices.
Identify the names, purposes, and characteristics of output devices.
Explain system resources and their purposes.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Chapter 1: Critical Concepts
What is this chapter about and why is it important?
Professional certification proves to employers that the certificate holder has gained a level of
knowledge and experience that is confirmed by a respected third party. For example, the
successful completion of CompTIA’s A+ exams or EUCIP’s IT Administrator exams demonstrates
that the certificate holder has sufficient basic knowledge to work effectively in many different IT
positions.
A personal computer is designed to run software programs that help people work, play, and
learn. This chapter discusses the hardware that is required to build a desktop computer. It
covers the hardware components that are found in most personal computers. It explains the
unique purpose of each component and how these components work together.
This chapter is important because it provides the foundational information that is required to
build, upgrade, and repair personal computers. Successful completion of this course will be
excellent preparation for the CompTIA A+ Certification exam, the EUCIP IT Administrator
Certification for Modules 1 and 2, and for on-the-job performance.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Chapter 1: Activities
What activities are associated with this chapter?
1.1.2 Worksheet: Job Opportunities
1.4.7 Worksheet: Research Computer Components
Chapter 1 Quiz
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Chapter 1: New Terms
What terms are introduced in this chapter?
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
bus 1.4.1
cache 1.4.4
capacitor 1.3.2
chipset 1.4.1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
computer 1.2
connector 1.3.2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
firewall 16.1
FireWire 1.5
hardware 1.2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
keyboard 1.6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
monitor 1.7
motherboard 1.4.1
northbridge 1.4.1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
resistance ( r ) 1.3.2
socket 1.4.1
southbridge 1.4.1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Chapter 1: New Terms (continued)
What terms are introduced in this chapter?
speaker 1.7
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Chapter 1: Changes
What has changed from the previous version (4.0) of ITEPC?
1.3.2 Describe power supplies
•Voltage, wattage, and capacity
•Voltage selector switch
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Chapter 1: Changes (continued)
What has changed from the previous version (4.0) of ITEPC?
1.4.4 Identify the names, purposes, and characteristics of ROM and RAM
•SODIMM
•DDR3
•Single Channel vs. Dual Channel
•Speed: PC-100, PC-133, PC-2700, PC-3200, PC2-5300, PC3-12800
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Chapter 1: Changes (continued)
What has changed from the previous version (4.0) of ITEPC?
1.4.6 Identify the names, purposes, and characteristics of storage drives
•FDD Install
•HDD Install
•HDD: Solid State vs. Magnetic
•Blu-ray
•eSATA
•RAID Level Comparison
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Chapter 1: Changes (continued)
What has changed from the previous version (4.0) of ITEPC?
1.5 Identify the names, purposes, and characteristics of ports and cables
•RJ-45
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Chapter 1: Classroom Management
The instructor should ensure that students acquire as many hands-on
experiences as possible. If possible, have different types of computers and
computer parts available for students to view during class. Legacy or non-
functioning parts can be handled during class discussions.
Bring pictures and articles that deal with basic IT concepts and computers. Use
these articles to facilitate class discussions.
A tour through a data center or a physical inspection of computer parts that are
brought to class is recommended.
Assemble a computer in front of the students; it should not take more than 40
minutes to complete. Give a short explanation of the role and functionality of
each component prior to installation.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Chapter 1: Classroom Management
(continued)
Write the following terms on the board during discussion: power supply,
motherboard, CPU, ROM, RAM, adapter, hard drive, CD/DVD, serial port, USB
port, IEEE 1394 (FireWire) port, parallel port, Ethernet port, PS/2 mouse or
keyboard port, audio port, video port (VGA and DVI should be shown), and
internal modem port. This emphasizes the importance of the term.
Demonstrate the basic concepts related to electronics with a lemon, a penny,
and a nail. There are several experiments that can be done in class to help the
students understand simple circuits, stored energy, and magnetism. Do an
Internet search on the following terms: basic electronics lemon.
Taking simple voltage readings from the motherboard battery or from an unused
Molex power supply connector makes the term voltage more applicable to the
chapter.
Bring in a couple of diagrams of chipsets to show how they affect the
motherboard design. Have the students research the chipset for the
motherboard that is used in the classroom computers. Some example chipsets
are: Intel G31, Intel G45, AMD 780G.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Chapter 1: Teaching Analogies
When teaching the difference between hard drive and RAM memory, compare an
office space and a computer. The working person is like a CPU, the desk area is
similar to RAM memory, a file cabinet is similar to the hard drive, and files stored on
the hard drive compare with printed documents stored in the file cabinet.
• The larger the desk area, the greater the number of documents that can be opened on it at
the same time. If the desk is not large enough, the person (the CPU) must close a file and
properly store it inside the file cabinet before searching and opening a new one. This process
takes time.
The different types of memory that a computer uses, in order of fastest to slowest,
are as follows:
• memory inside CPU - L1 cache
• memory in the processor housing - L2 cache
• memory on the motherboard – RAM
• hard drive space that is used as memory – virtual memory
An analogy is similar to getting a drink of water: (1) Having a glass of water sitting
on your desk is similar to having L1 cache. (2) Having to go refill the glass from a
faucet is similar to having L2 cache. (3) Having to get bottled water from a drink
machine is similar to having RAM. (4) Having to go to a store and buy bottled water
is similar to having hard drive storage that is used as RAM.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Chapter 1: Suggested Class Discussions
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Chapter 1: Best Practices
Obtain computers and components from these possible sources for class:
• Technicians at school
• Computer repair stores
• Donations from students, parents, alumni, and advisory committee
members
• Goodwill
• E-mail faculty and staff requesting any extra computers and components
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Chapter 1: Best Practices (continued)
Organize computers and components for class:
• Use separate bins for good parts and bad parts.
• Use separate bins or paper boxes for categories of parts: motherboards,
PATA drives, video cards, floppy drives, CD/DVD drives, cables.
• Use rolling carts for computer storage and security. This allows flexibility
for storage and ease of use in the classroom.
• Place a unique number on a computer and corresponding storage bin.
When disassembling the computer, place the components in the storage
bin with the matching computer number to keep parts organized for that
computer. Students and instructors can quickly identify which
components belong to which computer.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Chapter 1: Outside Reading
Microsoft XP Website
Microsoft Vista Website
Microsoft Compatibility Checker
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26